diff --git a/.github/ISSUE_TEMPLATE/bug_report.md b/.github/ISSUE_TEMPLATE/bug_report.md new file mode 100644 index 00000000..9aed3456 --- /dev/null +++ b/.github/ISSUE_TEMPLATE/bug_report.md @@ -0,0 +1,51 @@ +--- +name: Bug report +about: Create a report to help us improve + +--- + +Thanks for stopping by to let us know something could be better! + +**PLEASE READ**: If you have a support contract with Google, please create an issue in the [support console](https://cloud.google.com/support/) instead of filing on GitHub. This will ensure a timely response. + +Please run down the following list and make sure you've tried the usual "quick fixes": + + - Search the issues already opened: https://github.com/googleapis/java-secretmanager/issues + - Check for answers on StackOverflow: http://stackoverflow.com/questions/tagged/google-cloud-platform + +If you are still having issues, please include as much information as possible: + +#### Environment details + +1. Specify the API at the beginning of the title. For example, "BigQuery: ..."). + General, Core, and Other are also allowed as types +2. OS type and version: +3. Java version: +4. secretmanager version(s): + +#### Steps to reproduce + + 1. ? + 2. ? + +#### Code example + +```java +// example +``` + +#### Stack trace +``` +Any relevant stacktrace here. +``` + +#### External references such as API reference guides + +- ? + +#### Any additional information below + + +Following these steps guarantees the quickest resolution possible. + +Thanks! diff --git a/.github/ISSUE_TEMPLATE/feature_request.md b/.github/ISSUE_TEMPLATE/feature_request.md new file mode 100644 index 00000000..754e30c6 --- /dev/null +++ b/.github/ISSUE_TEMPLATE/feature_request.md @@ -0,0 +1,21 @@ +--- +name: Feature request +about: Suggest an idea for this library + +--- + +Thanks for stopping by to let us know something could be better! + +**PLEASE READ**: If you have a support contract with Google, please create an issue in the [support console](https://cloud.google.com/support/) instead of filing on GitHub. This will ensure a timely response. + +**Is your feature request related to a problem? Please describe.** +What the problem is. Example: I'm always frustrated when [...] + +**Describe the solution you'd like** +What you want to happen. + +**Describe alternatives you've considered** +Any alternative solutions or features you've considered. + +**Additional context** +Any other context or screenshots about the feature request. diff --git a/.github/ISSUE_TEMPLATE/support_request.md b/.github/ISSUE_TEMPLATE/support_request.md new file mode 100644 index 00000000..99586903 --- /dev/null +++ b/.github/ISSUE_TEMPLATE/support_request.md @@ -0,0 +1,7 @@ +--- +name: Support request +about: If you have a support contract with Google, please create an issue in the Google Cloud Support console. + +--- + +**PLEASE READ**: If you have a support contract with Google, please create an issue in the [support console](https://cloud.google.com/support/) instead of filing on GitHub. This will ensure a timely response. diff --git a/.github/PULL_REQUEST_TEMPLATE.md b/.github/PULL_REQUEST_TEMPLATE.md new file mode 100644 index 00000000..0bd0ee06 --- /dev/null +++ b/.github/PULL_REQUEST_TEMPLATE.md @@ -0,0 +1 @@ +Fixes # (it's a good idea to open an issue first for context and/or discussion) \ No newline at end of file diff --git a/.github/release-please.yml b/.github/release-please.yml new file mode 100644 index 00000000..dce2c845 --- /dev/null +++ b/.github/release-please.yml @@ -0,0 +1,2 @@ +releaseType: java-yoshi +bumpMinorPreMajor: true \ No newline at end of file diff --git a/.kokoro/build.bat b/.kokoro/build.bat new file mode 100644 index 00000000..a3241eb9 --- /dev/null +++ b/.kokoro/build.bat @@ -0,0 +1,3 @@ +:: See documentation in type-shell-output.bat + +"C:\Program Files\Git\bin\bash.exe" github/java-secretmanager/.kokoro/build.sh diff --git a/.kokoro/build.sh b/.kokoro/build.sh new file mode 100755 index 00000000..dc2936ef --- /dev/null +++ b/.kokoro/build.sh @@ -0,0 +1,66 @@ +#!/bin/bash +# Copyright 2019 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +set -eo pipefail + +## Get the directory of the build script +scriptDir=$(realpath $(dirname "${BASH_SOURCE[0]}")) +## cd to the parent directory, i.e. the root of the git repo +cd ${scriptDir}/.. + +# Print out Java version +java -version +echo ${JOB_TYPE} + +mvn install -B -V \ + -DskipTests=true \ + -Dclirr.skip=true \ + -Denforcer.skip=true \ + -Dmaven.javadoc.skip=true \ + -Dgcloud.download.skip=true \ + -T 1C + +# if GOOGLE_APPLICATION_CREDIENTIALS is specified as a relative path prepend Kokoro root directory onto it +if [[ ! -z "${GOOGLE_APPLICATION_CREDENTIALS}" && "${GOOGLE_APPLICATION_CREDENTIALS}" != /* ]]; then + export GOOGLE_APPLICATION_CREDENTIALS=$(realpath ${KOKORO_ROOT}/src/${GOOGLE_APPLICATION_CREDENTIALS}) +fi + +case ${JOB_TYPE} in +test) + mvn test -B -Dclirr.skip=true -Denforcer.skip=true + bash ${KOKORO_GFILE_DIR}/codecov.sh + bash .kokoro/coerce_logs.sh + ;; +lint) + mvn com.coveo:fmt-maven-plugin:check + ;; +javadoc) + mvn javadoc:javadoc javadoc:test-javadoc + ;; +integration) + mvn -B ${INTEGRATION_TEST_ARGS} \ + -DtrimStackTrace=false \ + -Dclirr.skip=true \ + -Denforcer.skip=true \ + -fae \ + verify + bash .kokoro/coerce_logs.sh + ;; +clirr) + mvn -B -Denforcer.skip=true clirr:check + ;; +*) + ;; +esac diff --git a/.kokoro/coerce_logs.sh b/.kokoro/coerce_logs.sh new file mode 100755 index 00000000..5cf7ba49 --- /dev/null +++ b/.kokoro/coerce_logs.sh @@ -0,0 +1,38 @@ +#!/bin/bash +# Copyright 2019 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +# This script finds and moves sponge logs so that they can be found by placer +# and are not flagged as flaky by sponge. + +set -eo pipefail + +## Get the directory of the build script +scriptDir=$(realpath $(dirname "${BASH_SOURCE[0]}")) +## cd to the parent directory, i.e. the root of the git repo +cd ${scriptDir}/.. + +job=$(basename ${KOKORO_JOB_NAME}) + +echo "coercing sponge logs..." +for xml in `find . -name *-sponge_log.xml` +do + echo "processing ${xml}" + class=$(basename ${xml} | cut -d- -f2) + dir=$(dirname ${xml})/${job}/${class} + text=$(dirname ${xml})/${class}-sponge_log.txt + mkdir -p ${dir} + mv ${xml} ${dir}/sponge_log.xml + mv ${text} ${dir}/sponge_log.txt +done diff --git a/.kokoro/common.cfg b/.kokoro/common.cfg new file mode 100644 index 00000000..78a49e0c --- /dev/null +++ b/.kokoro/common.cfg @@ -0,0 +1,13 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Download trampoline resources. These will be in ${KOKORO_GFILE_DIR} +gfile_resources: "/bigstore/cloud-devrel-kokoro-resources/trampoline" + +# All builds use the trampoline script to run in docker. +build_file: "java-secretmanager/.kokoro/trampoline.sh" + +# Tell the trampoline which build file to use. +env_vars: { + key: "TRAMPOLINE_BUILD_FILE" + value: "github/java-secretmanager/.kokoro/build.sh" +} diff --git a/.kokoro/continuous/common.cfg b/.kokoro/continuous/common.cfg new file mode 100644 index 00000000..081520f8 --- /dev/null +++ b/.kokoro/continuous/common.cfg @@ -0,0 +1,25 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Build logs will be here +action { + define_artifacts { + regex: "**/*sponge_log.xml" + regex: "**/*sponge_log.txt" + } +} + +# Download trampoline resources. +gfile_resources: "/bigstore/cloud-devrel-kokoro-resources/trampoline" + +# Use the trampoline script to run in docker. +build_file: "java-secretmanager/.kokoro/trampoline.sh" + +env_vars: { + key: "TRAMPOLINE_BUILD_FILE" + value: "github/java-secretmanager/.kokoro/build.sh" +} + +env_vars: { + key: "JOB_TYPE" + value: "test" +} diff --git a/.kokoro/continuous/dependencies.cfg b/.kokoro/continuous/dependencies.cfg new file mode 100644 index 00000000..09ec3603 --- /dev/null +++ b/.kokoro/continuous/dependencies.cfg @@ -0,0 +1,12 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Configure the docker image for kokoro-trampoline. +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/java8" +} + +env_vars: { + key: "TRAMPOLINE_BUILD_FILE" + value: "github/java-secretmanager/.kokoro/dependencies.sh" +} diff --git a/.kokoro/continuous/integration.cfg b/.kokoro/continuous/integration.cfg new file mode 100644 index 00000000..3b017fc8 --- /dev/null +++ b/.kokoro/continuous/integration.cfg @@ -0,0 +1,7 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Configure the docker image for kokoro-trampoline. +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/java8" +} diff --git a/.kokoro/continuous/java11.cfg b/.kokoro/continuous/java11.cfg new file mode 100644 index 00000000..709f2b4c --- /dev/null +++ b/.kokoro/continuous/java11.cfg @@ -0,0 +1,7 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Configure the docker image for kokoro-trampoline. +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/java11" +} diff --git a/.kokoro/continuous/java7.cfg b/.kokoro/continuous/java7.cfg new file mode 100644 index 00000000..cb24f44e --- /dev/null +++ b/.kokoro/continuous/java7.cfg @@ -0,0 +1,7 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Configure the docker image for kokoro-trampoline. +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/java7" +} diff --git a/.kokoro/continuous/java8-osx.cfg b/.kokoro/continuous/java8-osx.cfg new file mode 100644 index 00000000..a096f09a --- /dev/null +++ b/.kokoro/continuous/java8-osx.cfg @@ -0,0 +1,3 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +build_file: "java-secretmanager/.kokoro/build.sh" diff --git a/.kokoro/continuous/java8-win.cfg b/.kokoro/continuous/java8-win.cfg new file mode 100644 index 00000000..cdb3a103 --- /dev/null +++ b/.kokoro/continuous/java8-win.cfg @@ -0,0 +1,3 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +build_file: "java-secretmanager/.kokoro/build.bat" diff --git a/.kokoro/continuous/java8.cfg b/.kokoro/continuous/java8.cfg new file mode 100644 index 00000000..3b017fc8 --- /dev/null +++ b/.kokoro/continuous/java8.cfg @@ -0,0 +1,7 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Configure the docker image for kokoro-trampoline. +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/java8" +} diff --git a/.kokoro/continuous/lint.cfg b/.kokoro/continuous/lint.cfg new file mode 100644 index 00000000..6d323c8a --- /dev/null +++ b/.kokoro/continuous/lint.cfg @@ -0,0 +1,13 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Configure the docker image for kokoro-trampoline. + +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/java8" +} + +env_vars: { + key: "JOB_TYPE" + value: "lint" +} \ No newline at end of file diff --git a/.kokoro/continuous/propose_release.cfg b/.kokoro/continuous/propose_release.cfg new file mode 100644 index 00000000..7924a2d6 --- /dev/null +++ b/.kokoro/continuous/propose_release.cfg @@ -0,0 +1,53 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Build logs will be here +action { + define_artifacts { + regex: "**/*sponge_log.xml" + } +} + +# Download trampoline resources. +gfile_resources: "/bigstore/cloud-devrel-kokoro-resources/trampoline" + +# Use the trampoline script to run in docker. +build_file: "java-secretmanager/.kokoro/trampoline.sh" + +# Configure the docker image for kokoro-trampoline. +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/node:10-user" +} + +env_vars: { + key: "TRAMPOLINE_BUILD_FILE" + value: "github/java-secretmanager/.kokoro/continuous/propose_release.sh" +} + +# tokens used by release-please to keep an up-to-date release PR. +before_action { + fetch_keystore { + keystore_resource { + keystore_config_id: 73713 + keyname: "github-magic-proxy-key-release-please" + } + } +} + +before_action { + fetch_keystore { + keystore_resource { + keystore_config_id: 73713 + keyname: "github-magic-proxy-token-release-please" + } + } +} + +before_action { + fetch_keystore { + keystore_resource { + keystore_config_id: 73713 + keyname: "github-magic-proxy-url-release-please" + } + } +} diff --git a/.kokoro/continuous/propose_release.sh b/.kokoro/continuous/propose_release.sh new file mode 100755 index 00000000..edfcfcae --- /dev/null +++ b/.kokoro/continuous/propose_release.sh @@ -0,0 +1,29 @@ +#!/bin/bash + +# Copyright 2019 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# https://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +set -eo pipefail + +export NPM_CONFIG_PREFIX=/home/node/.npm-global + +if [ -f ${KOKORO_KEYSTORE_DIR}/73713_github-magic-proxy-url-release-please ]; then + # Groom the release PR as new commits are merged. + npx release-please release-pr --token=${KOKORO_KEYSTORE_DIR}/73713_github-magic-proxy-token-release-please \ + --repo-url=googleapis/java-secretmanager \ + --package-name="secretmanager" \ + --api-url=${KOKORO_KEYSTORE_DIR}/73713_github-magic-proxy-url-release-please \ + --proxy-key=${KOKORO_KEYSTORE_DIR}/73713_github-magic-proxy-key-release-please \ + --release-type=java-yoshi +fi diff --git a/.kokoro/dependencies.sh b/.kokoro/dependencies.sh new file mode 100755 index 00000000..56fdc974 --- /dev/null +++ b/.kokoro/dependencies.sh @@ -0,0 +1,31 @@ +#!/bin/bash +# Copyright 2019 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +set -eo pipefail + +cd github/java-secretmanager/ + +# Print out Java +java -version +echo $JOB_TYPE + +export MAVEN_OPTS="-Xmx1024m -XX:MaxPermSize=128m" + +# this should run maven enforcer +mvn install -B -V \ + -DskipTests=true \ + -Dclirr.skip=true + +mvn -B dependency:analyze -DfailOnWarning=true diff --git a/.kokoro/linkage-monitor.sh b/.kokoro/linkage-monitor.sh new file mode 100755 index 00000000..7f8f5ddd --- /dev/null +++ b/.kokoro/linkage-monitor.sh @@ -0,0 +1,33 @@ +#!/bin/bash +# Copyright 2019 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +set -eo pipefail +# Display commands being run. +set -x + +cd github/java-secretmanager/ + +# Print out Java version +java -version +echo ${JOB_TYPE} + +mvn install -DskipTests=true -Dmaven.javadoc.skip=true -Dgcloud.download.skip=true -B -V + +# Kokoro job cloud-opensource-java/ubuntu/linkage-monitor-gcs creates this JAR +JAR=linkage-monitor-latest-all-deps.jar +curl -v -O "https://storage.googleapis.com/cloud-opensource-java-linkage-monitor/${JAR}" + +# Fails if there's new linkage errors compared with baseline +java -jar ${JAR} com.google.cloud:libraries-bom diff --git a/.kokoro/nightly/common.cfg b/.kokoro/nightly/common.cfg new file mode 100644 index 00000000..081520f8 --- /dev/null +++ b/.kokoro/nightly/common.cfg @@ -0,0 +1,25 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Build logs will be here +action { + define_artifacts { + regex: "**/*sponge_log.xml" + regex: "**/*sponge_log.txt" + } +} + +# Download trampoline resources. +gfile_resources: "/bigstore/cloud-devrel-kokoro-resources/trampoline" + +# Use the trampoline script to run in docker. +build_file: "java-secretmanager/.kokoro/trampoline.sh" + +env_vars: { + key: "TRAMPOLINE_BUILD_FILE" + value: "github/java-secretmanager/.kokoro/build.sh" +} + +env_vars: { + key: "JOB_TYPE" + value: "test" +} diff --git a/.kokoro/nightly/dependencies.cfg b/.kokoro/nightly/dependencies.cfg new file mode 100644 index 00000000..09ec3603 --- /dev/null +++ b/.kokoro/nightly/dependencies.cfg @@ -0,0 +1,12 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Configure the docker image for kokoro-trampoline. +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/java8" +} + +env_vars: { + key: "TRAMPOLINE_BUILD_FILE" + value: "github/java-secretmanager/.kokoro/dependencies.sh" +} diff --git a/.kokoro/nightly/integration.cfg b/.kokoro/nightly/integration.cfg new file mode 100644 index 00000000..3b017fc8 --- /dev/null +++ b/.kokoro/nightly/integration.cfg @@ -0,0 +1,7 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Configure the docker image for kokoro-trampoline. +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/java8" +} diff --git a/.kokoro/nightly/java11.cfg b/.kokoro/nightly/java11.cfg new file mode 100644 index 00000000..709f2b4c --- /dev/null +++ b/.kokoro/nightly/java11.cfg @@ -0,0 +1,7 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Configure the docker image for kokoro-trampoline. +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/java11" +} diff --git a/.kokoro/nightly/java7.cfg b/.kokoro/nightly/java7.cfg new file mode 100644 index 00000000..cb24f44e --- /dev/null +++ b/.kokoro/nightly/java7.cfg @@ -0,0 +1,7 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Configure the docker image for kokoro-trampoline. +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/java7" +} diff --git a/.kokoro/nightly/java8-osx.cfg b/.kokoro/nightly/java8-osx.cfg new file mode 100644 index 00000000..a096f09a --- /dev/null +++ b/.kokoro/nightly/java8-osx.cfg @@ -0,0 +1,3 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +build_file: "java-secretmanager/.kokoro/build.sh" diff --git a/.kokoro/nightly/java8-win.cfg b/.kokoro/nightly/java8-win.cfg new file mode 100644 index 00000000..cdb3a103 --- /dev/null +++ b/.kokoro/nightly/java8-win.cfg @@ -0,0 +1,3 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +build_file: "java-secretmanager/.kokoro/build.bat" diff --git a/.kokoro/nightly/java8.cfg b/.kokoro/nightly/java8.cfg new file mode 100644 index 00000000..3b017fc8 --- /dev/null +++ b/.kokoro/nightly/java8.cfg @@ -0,0 +1,7 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Configure the docker image for kokoro-trampoline. +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/java8" +} diff --git a/.kokoro/nightly/lint.cfg b/.kokoro/nightly/lint.cfg new file mode 100644 index 00000000..6d323c8a --- /dev/null +++ b/.kokoro/nightly/lint.cfg @@ -0,0 +1,13 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Configure the docker image for kokoro-trampoline. + +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/java8" +} + +env_vars: { + key: "JOB_TYPE" + value: "lint" +} \ No newline at end of file diff --git a/.kokoro/presubmit/clirr.cfg b/.kokoro/presubmit/clirr.cfg new file mode 100644 index 00000000..ec572442 --- /dev/null +++ b/.kokoro/presubmit/clirr.cfg @@ -0,0 +1,13 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Configure the docker image for kokoro-trampoline. + +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/java8" +} + +env_vars: { + key: "JOB_TYPE" + value: "clirr" +} \ No newline at end of file diff --git a/.kokoro/presubmit/common.cfg b/.kokoro/presubmit/common.cfg new file mode 100644 index 00000000..f2be8c1c --- /dev/null +++ b/.kokoro/presubmit/common.cfg @@ -0,0 +1,34 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Build logs will be here +action { + define_artifacts { + regex: "**/*sponge_log.xml" + regex: "**/*sponge_log.txt" + } +} + +# Download trampoline resources. +gfile_resources: "/bigstore/cloud-devrel-kokoro-resources/trampoline" + +# Use the trampoline script to run in docker. +build_file: "java-secretmanager/.kokoro/trampoline.sh" + +env_vars: { + key: "TRAMPOLINE_BUILD_FILE" + value: "github/java-secretmanager/.kokoro/build.sh" +} + +env_vars: { + key: "JOB_TYPE" + value: "test" +} + +before_action { + fetch_keystore { + keystore_resource { + keystore_config_id: 73713 + keyname: "dpebot_codecov_token" + } + } +} diff --git a/.kokoro/presubmit/dependencies.cfg b/.kokoro/presubmit/dependencies.cfg new file mode 100644 index 00000000..09ec3603 --- /dev/null +++ b/.kokoro/presubmit/dependencies.cfg @@ -0,0 +1,12 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Configure the docker image for kokoro-trampoline. +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/java8" +} + +env_vars: { + key: "TRAMPOLINE_BUILD_FILE" + value: "github/java-secretmanager/.kokoro/dependencies.sh" +} diff --git a/.kokoro/presubmit/integration.cfg b/.kokoro/presubmit/integration.cfg new file mode 100644 index 00000000..141f90c1 --- /dev/null +++ b/.kokoro/presubmit/integration.cfg @@ -0,0 +1,31 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Configure the docker image for kokoro-trampoline. +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/java8" +} + +env_vars: { + key: "JOB_TYPE" + value: "integration" +} + +env_vars: { + key: "GCLOUD_PROJECT" + value: "gcloud-devel" +} + +env_vars: { + key: "GOOGLE_APPLICATION_CREDENTIALS" + value: "keystore/73713_java_it_service_account" +} + +before_action { + fetch_keystore { + keystore_resource { + keystore_config_id: 73713 + keyname: "java_it_service_account" + } + } +} diff --git a/.kokoro/presubmit/java11.cfg b/.kokoro/presubmit/java11.cfg new file mode 100644 index 00000000..709f2b4c --- /dev/null +++ b/.kokoro/presubmit/java11.cfg @@ -0,0 +1,7 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Configure the docker image for kokoro-trampoline. +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/java11" +} diff --git a/.kokoro/presubmit/java7.cfg b/.kokoro/presubmit/java7.cfg new file mode 100644 index 00000000..cb24f44e --- /dev/null +++ b/.kokoro/presubmit/java7.cfg @@ -0,0 +1,7 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Configure the docker image for kokoro-trampoline. +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/java7" +} diff --git a/.kokoro/presubmit/java8-osx.cfg b/.kokoro/presubmit/java8-osx.cfg new file mode 100644 index 00000000..a096f09a --- /dev/null +++ b/.kokoro/presubmit/java8-osx.cfg @@ -0,0 +1,3 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +build_file: "java-secretmanager/.kokoro/build.sh" diff --git a/.kokoro/presubmit/java8-win.cfg b/.kokoro/presubmit/java8-win.cfg new file mode 100644 index 00000000..cdb3a103 --- /dev/null +++ b/.kokoro/presubmit/java8-win.cfg @@ -0,0 +1,3 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +build_file: "java-secretmanager/.kokoro/build.bat" diff --git a/.kokoro/presubmit/java8.cfg b/.kokoro/presubmit/java8.cfg new file mode 100644 index 00000000..3b017fc8 --- /dev/null +++ b/.kokoro/presubmit/java8.cfg @@ -0,0 +1,7 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Configure the docker image for kokoro-trampoline. +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/java8" +} diff --git a/.kokoro/presubmit/linkage-monitor.cfg b/.kokoro/presubmit/linkage-monitor.cfg new file mode 100644 index 00000000..bc4b48ea --- /dev/null +++ b/.kokoro/presubmit/linkage-monitor.cfg @@ -0,0 +1,12 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Configure the docker image for kokoro-trampoline. +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/java8" +} + +env_vars: { + key: "TRAMPOLINE_BUILD_FILE" + value: "github/java-secretmanager/.kokoro/linkage-monitor.sh" +} \ No newline at end of file diff --git a/.kokoro/presubmit/lint.cfg b/.kokoro/presubmit/lint.cfg new file mode 100644 index 00000000..6d323c8a --- /dev/null +++ b/.kokoro/presubmit/lint.cfg @@ -0,0 +1,13 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Configure the docker image for kokoro-trampoline. + +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/java8" +} + +env_vars: { + key: "JOB_TYPE" + value: "lint" +} \ No newline at end of file diff --git a/.kokoro/release/bump_snapshot.cfg b/.kokoro/release/bump_snapshot.cfg new file mode 100644 index 00000000..51d8ef64 --- /dev/null +++ b/.kokoro/release/bump_snapshot.cfg @@ -0,0 +1,53 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Build logs will be here +action { + define_artifacts { + regex: "**/*sponge_log.xml" + } +} + +# Download trampoline resources. +gfile_resources: "/bigstore/cloud-devrel-kokoro-resources/trampoline" + +# Use the trampoline script to run in docker. +build_file: "java-secretmanager/.kokoro/trampoline.sh" + +# Configure the docker image for kokoro-trampoline. +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/node:10-user" +} + +env_vars: { + key: "TRAMPOLINE_BUILD_FILE" + value: "github/java-secretmanager/.kokoro/release/bump_snapshot.sh" +} + +# tokens used by release-please to keep an up-to-date release PR. +before_action { + fetch_keystore { + keystore_resource { + keystore_config_id: 73713 + keyname: "github-magic-proxy-key-release-please" + } + } +} + +before_action { + fetch_keystore { + keystore_resource { + keystore_config_id: 73713 + keyname: "github-magic-proxy-token-release-please" + } + } +} + +before_action { + fetch_keystore { + keystore_resource { + keystore_config_id: 73713 + keyname: "github-magic-proxy-url-release-please" + } + } +} diff --git a/.kokoro/release/bump_snapshot.sh b/.kokoro/release/bump_snapshot.sh new file mode 100755 index 00000000..cbbde1e4 --- /dev/null +++ b/.kokoro/release/bump_snapshot.sh @@ -0,0 +1,30 @@ +#!/bin/bash + +# Copyright 2019 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# https://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +set -eo pipefail + +export NPM_CONFIG_PREFIX=/home/node/.npm-global + +if [ -f ${KOKORO_KEYSTORE_DIR}/73713_github-magic-proxy-url-release-please ]; then + # Groom the snapshot release PR immediately after publishing a release + npx release-please release-pr --token=${KOKORO_KEYSTORE_DIR}/73713_github-magic-proxy-token-release-please \ + --repo-url=googleapis/java-secretmanager \ + --package-name="secretmanager" \ + --api-url=${KOKORO_KEYSTORE_DIR}/73713_github-magic-proxy-url-release-please \ + --proxy-key=${KOKORO_KEYSTORE_DIR}/73713_github-magic-proxy-key-release-please \ + --snapshot \ + --release-type=java-auth-yoshi +fi diff --git a/.kokoro/release/common.cfg b/.kokoro/release/common.cfg new file mode 100644 index 00000000..8c690b25 --- /dev/null +++ b/.kokoro/release/common.cfg @@ -0,0 +1,49 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Download trampoline resources. +gfile_resources: "/bigstore/cloud-devrel-kokoro-resources/trampoline" + +# Use the trampoline script to run in docker. +build_file: "java-secretmanager/.kokoro/trampoline.sh" + +# Configure the docker image for kokoro-trampoline. +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/java8" +} + +before_action { + fetch_keystore { + keystore_resource { + keystore_config_id: 70247 + keyname: "maven-gpg-keyring" + } + } +} + +before_action { + fetch_keystore { + keystore_resource { + keystore_config_id: 70247 + keyname: "maven-gpg-passphrase" + } + } +} + +before_action { + fetch_keystore { + keystore_resource { + keystore_config_id: 70247 + keyname: "maven-gpg-pubkeyring" + } + } +} + +before_action { + fetch_keystore { + keystore_resource { + keystore_config_id: 70247 + keyname: "sonatype-credentials" + } + } +} diff --git a/.kokoro/release/common.sh b/.kokoro/release/common.sh new file mode 100755 index 00000000..6e3f6599 --- /dev/null +++ b/.kokoro/release/common.sh @@ -0,0 +1,50 @@ +#!/bin/bash +# Copyright 2018 Google Inc. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +set -eo pipefail + +# Get secrets from keystore and set and environment variables +setup_environment_secrets() { + export GPG_PASSPHRASE=$(cat ${KOKORO_KEYSTORE_DIR}/70247_maven-gpg-passphrase) + export GPG_TTY=$(tty) + export GPG_HOMEDIR=/gpg + mkdir $GPG_HOMEDIR + mv ${KOKORO_KEYSTORE_DIR}/70247_maven-gpg-pubkeyring $GPG_HOMEDIR/pubring.gpg + mv ${KOKORO_KEYSTORE_DIR}/70247_maven-gpg-keyring $GPG_HOMEDIR/secring.gpg + export SONATYPE_USERNAME=$(cat ${KOKORO_KEYSTORE_DIR}/70247_sonatype-credentials | cut -f1 -d'|') + export SONATYPE_PASSWORD=$(cat ${KOKORO_KEYSTORE_DIR}/70247_sonatype-credentials | cut -f2 -d'|') +} + +create_settings_xml_file() { + echo " + + + ossrh + ${SONATYPE_USERNAME} + ${SONATYPE_PASSWORD} + + + sonatype-nexus-staging + ${SONATYPE_USERNAME} + ${SONATYPE_PASSWORD} + + + sonatype-nexus-snapshots + ${SONATYPE_USERNAME} + ${SONATYPE_PASSWORD} + + +" > $1 +} \ No newline at end of file diff --git a/.kokoro/release/drop.cfg b/.kokoro/release/drop.cfg new file mode 100644 index 00000000..593ccddb --- /dev/null +++ b/.kokoro/release/drop.cfg @@ -0,0 +1,6 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +env_vars: { + key: "TRAMPOLINE_BUILD_FILE" + value: "github/java-secretmanager/.kokoro/release/drop.sh" +} diff --git a/.kokoro/release/drop.sh b/.kokoro/release/drop.sh new file mode 100755 index 00000000..5c4551ef --- /dev/null +++ b/.kokoro/release/drop.sh @@ -0,0 +1,32 @@ +#!/bin/bash +# Copyright 2018 Google Inc. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +set -eo pipefail + +# STAGING_REPOSITORY_ID must be set +if [ -z "${STAGING_REPOSITORY_ID}" ]; then + echo "Missing STAGING_REPOSITORY_ID environment variable" + exit 1 +fi + +source $(dirname "$0")/common.sh +pushd $(dirname "$0")/../../ + +setup_environment_secrets +create_settings_xml_file "settings.xml" + +mvn nexus-staging:drop -B \ + --settings=settings.xml \ + -DstagingRepositoryId=${STAGING_REPOSITORY_ID} diff --git a/.kokoro/release/promote.cfg b/.kokoro/release/promote.cfg new file mode 100644 index 00000000..bff54517 --- /dev/null +++ b/.kokoro/release/promote.cfg @@ -0,0 +1,6 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +env_vars: { + key: "TRAMPOLINE_BUILD_FILE" + value: "github/java-secretmanager/.kokoro/release/promote.sh" +} diff --git a/.kokoro/release/promote.sh b/.kokoro/release/promote.sh new file mode 100755 index 00000000..1fa95fa5 --- /dev/null +++ b/.kokoro/release/promote.sh @@ -0,0 +1,34 @@ +#!/bin/bash +# Copyright 2018 Google Inc. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +set -eo pipefail + +# STAGING_REPOSITORY_ID must be set +if [ -z "${STAGING_REPOSITORY_ID}" ]; then + echo "Missing STAGING_REPOSITORY_ID environment variable" + exit 1 +fi + +source $(dirname "$0")/common.sh + +pushd $(dirname "$0")/../../ + +setup_environment_secrets +create_settings_xml_file "settings.xml" + +mvn nexus-staging:release -B \ + -DperformRelease=true \ + --settings=settings.xml \ + -DstagingRepositoryId=${STAGING_REPOSITORY_ID} diff --git a/.kokoro/release/publish_javadoc.cfg b/.kokoro/release/publish_javadoc.cfg new file mode 100644 index 00000000..f24089cb --- /dev/null +++ b/.kokoro/release/publish_javadoc.cfg @@ -0,0 +1,19 @@ +# Format: //devtools/kokoro/config/proto/build.proto +env_vars: { + key: "STAGING_BUCKET" + value: "docs-staging" +} + +env_vars: { + key: "TRAMPOLINE_BUILD_FILE" + value: "github/java-secretmanager/.kokoro/release/publish_javadoc.sh" +} + +before_action { + fetch_keystore { + keystore_resource { + keystore_config_id: 73713 + keyname: "docuploader_service_account" + } + } +} diff --git a/.kokoro/release/publish_javadoc.sh b/.kokoro/release/publish_javadoc.sh new file mode 100755 index 00000000..2bc33957 --- /dev/null +++ b/.kokoro/release/publish_javadoc.sh @@ -0,0 +1,55 @@ +#!/bin/bash +# Copyright 2019 Google Inc. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +set -eo pipefail + +if [[ -z "${CREDENTIALS}" ]]; then + CREDENTIALS=${KOKORO_KEYSTORE_DIR}/73713_docuploader_service_account +fi + +if [[ -z "${STAGING_BUCKET}" ]]; then + echo "Need to set STAGING_BUCKET environment variable" + exit 1 +fi + +# work from the git root directory +pushd $(dirname "$0")/../../ + +# install docuploader package +python3 -m pip install gcp-docuploader + +# compile all packages +mvn clean install -B -DskipTests=true + +NAME=google-cloud-secretmanager +VERSION=$(grep ${NAME}: versions.txt | cut -d: -f3) + +# build the docs +mvn site -B + +pushd target/site/apidocs + +# create metadata +python3 -m docuploader create-metadata \ + --name ${NAME} \ + --version ${VERSION} \ + --language java + +# upload docs +python3 -m docuploader upload . \ + --credentials ${CREDENTIALS} \ + --staging-bucket ${STAGING_BUCKET} + +popd diff --git a/.kokoro/release/snapshot.cfg b/.kokoro/release/snapshot.cfg new file mode 100644 index 00000000..506f1c9a --- /dev/null +++ b/.kokoro/release/snapshot.cfg @@ -0,0 +1,6 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +env_vars: { + key: "TRAMPOLINE_BUILD_FILE" + value: "github/java-secretmanager/.kokoro/release/snapshot.sh" +} \ No newline at end of file diff --git a/.kokoro/release/snapshot.sh b/.kokoro/release/snapshot.sh new file mode 100755 index 00000000..098168a7 --- /dev/null +++ b/.kokoro/release/snapshot.sh @@ -0,0 +1,33 @@ +#!/bin/bash +# Copyright 2019 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +set -eo pipefail + +source $(dirname "$0")/common.sh +MAVEN_SETTINGS_FILE=$(realpath $(dirname "$0")/../../)/settings.xml +pushd $(dirname "$0")/../../ + +# ensure we're trying to push a snapshot (no-result returns non-zero exit code) +grep SNAPSHOT versions.txt + +setup_environment_secrets +create_settings_xml_file "settings.xml" + +mvn clean install deploy -B \ + --settings ${MAVEN_SETTINGS_FILE} \ + -DperformRelease=true \ + -Dgpg.executable=gpg \ + -Dgpg.passphrase=${GPG_PASSPHRASE} \ + -Dgpg.homedir=${GPG_HOMEDIR} diff --git a/.kokoro/release/stage.cfg b/.kokoro/release/stage.cfg new file mode 100644 index 00000000..4314e93b --- /dev/null +++ b/.kokoro/release/stage.cfg @@ -0,0 +1,44 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +env_vars: { + key: "TRAMPOLINE_BUILD_FILE" + value: "github/java-secretmanager/.kokoro/release/stage.sh" +} + +# Need to save the properties file +action { + define_artifacts { + regex: "github/java-secretmanager/target/nexus-staging/staging/*.properties" + strip_prefix: "github/java-secretmanager" + } +} + +# Fetch the token needed for reporting release status to GitHub +before_action { + fetch_keystore { + keystore_resource { + keystore_config_id: 73713 + keyname: "yoshi-automation-github-key" + } + } +} + +# Fetch magictoken to use with Magic Github Proxy +before_action { + fetch_keystore { + keystore_resource { + keystore_config_id: 73713 + keyname: "releasetool-magictoken" + } + } +} + +# Fetch api key to use with Magic Github Proxy +before_action { + fetch_keystore { + keystore_resource { + keystore_config_id: 73713 + keyname: "magic-github-proxy-api-key" + } + } +} diff --git a/.kokoro/release/stage.sh b/.kokoro/release/stage.sh new file mode 100755 index 00000000..3c482cbc --- /dev/null +++ b/.kokoro/release/stage.sh @@ -0,0 +1,42 @@ +#!/bin/bash +# Copyright 2018 Google Inc. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +set -eo pipefail + +# Start the releasetool reporter +python3 -m pip install gcp-releasetool +python3 -m releasetool publish-reporter-script > /tmp/publisher-script; source /tmp/publisher-script + +source $(dirname "$0")/common.sh +MAVEN_SETTINGS_FILE=$(realpath $(dirname "$0")/../../)/settings.xml +pushd $(dirname "$0")/../../ + +setup_environment_secrets +create_settings_xml_file "settings.xml" + +mvn clean install deploy -B \ + --settings ${MAVEN_SETTINGS_FILE} \ + -DskipTests=true \ + -DperformRelease=true \ + -Dgpg.executable=gpg \ + -Dgpg.passphrase=${GPG_PASSPHRASE} \ + -Dgpg.homedir=${GPG_HOMEDIR} + +if [[ -n "${AUTORELEASE_PR}" ]] +then + mvn nexus-staging:release -B \ + -DperformRelease=true \ + --settings=settings.xml +fi \ No newline at end of file diff --git a/.kokoro/trampoline.sh b/.kokoro/trampoline.sh new file mode 100644 index 00000000..ba17ce01 --- /dev/null +++ b/.kokoro/trampoline.sh @@ -0,0 +1,24 @@ +#!/bin/bash +# Copyright 2018 Google Inc. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +set -eo pipefail +# Always run the cleanup script, regardless of the success of bouncing into +# the container. +function cleanup() { + chmod +x ${KOKORO_GFILE_DIR}/trampoline_cleanup.sh + ${KOKORO_GFILE_DIR}/trampoline_cleanup.sh + echo "cleanup"; +} +trap cleanup EXIT +python3 "${KOKORO_GFILE_DIR}/trampoline_v1.py" diff --git a/.repo-metadata.json b/.repo-metadata.json new file mode 100644 index 00000000..dd50a0e5 --- /dev/null +++ b/.repo-metadata.json @@ -0,0 +1,12 @@ +{ + "name": "secretmanager", + "name_pretty": "Google Cloud Secret Management", + "product_documentation": "https://cloud.google.com/solutions/secrets-management/", + "client_documentation": "https://googleapis.dev/java/java-secretmanager/latest", + "release_level": "beta", + "language": "java", + "repo": "googleapis/java-secretmanager", + "repo_short": "java-secretmanager", + "distribution_name": "com.google.cloud:google-cloud-secretmanager", + "api_id": "secretmanager.googleapis.com" +} diff --git a/CODE_OF_CONDUCT.md b/CODE_OF_CONDUCT.md new file mode 100644 index 00000000..6b2238bb --- /dev/null +++ b/CODE_OF_CONDUCT.md @@ -0,0 +1,93 @@ +# Code of Conduct + +## Our Pledge + +In the interest of fostering an open and welcoming environment, we as +contributors and maintainers pledge to making participation in our project and +our community a harassment-free experience for everyone, regardless of age, body +size, disability, ethnicity, gender identity and expression, level of +experience, education, socio-economic status, nationality, personal appearance, +race, religion, or sexual identity and orientation. + +## Our Standards + +Examples of behavior that contributes to creating a positive environment +include: + +* Using welcoming and inclusive language +* Being respectful of differing viewpoints and experiences +* Gracefully accepting constructive criticism +* Focusing on what is best for the community +* Showing empathy towards other community members + +Examples of unacceptable behavior by participants include: + +* The use of sexualized language or imagery and unwelcome sexual attention or + advances +* Trolling, insulting/derogatory comments, and personal or political attacks +* Public or private harassment +* Publishing others' private information, such as a physical or electronic + address, without explicit permission +* Other conduct which could reasonably be considered inappropriate in a + professional setting + +## Our Responsibilities + +Project maintainers are responsible for clarifying the standards of acceptable +behavior and are expected to take appropriate and fair corrective action in +response to any instances of unacceptable behavior. + +Project maintainers have the right and responsibility to remove, edit, or reject +comments, commits, code, wiki edits, issues, and other contributions that are +not aligned to this Code of Conduct, or to ban temporarily or permanently any +contributor for other behaviors that they deem inappropriate, threatening, +offensive, or harmful. + +## Scope + +This Code of Conduct applies both within project spaces and in public spaces +when an individual is representing the project or its community. Examples of +representing a project or community include using an official project e-mail +address, posting via an official social media account, or acting as an appointed +representative at an online or offline event. Representation of a project may be +further defined and clarified by project maintainers. + +This Code of Conduct also applies outside the project spaces when the Project +Steward has a reasonable belief that an individual's behavior may have a +negative impact on the project or its community. + +## Conflict Resolution + +We do not believe that all conflict is bad; healthy debate and disagreement +often yield positive results. However, it is never okay to be disrespectful or +to engage in behavior that violates the project’s code of conduct. + +If you see someone violating the code of conduct, you are encouraged to address +the behavior directly with those involved. Many issues can be resolved quickly +and easily, and this gives people more control over the outcome of their +dispute. If you are unable to resolve the matter for any reason, or if the +behavior is threatening or harassing, report it. We are dedicated to providing +an environment where participants feel welcome and safe. + +Reports should be directed to *[PROJECT STEWARD NAME(s) AND EMAIL(s)]*, the +Project Steward(s) for *[PROJECT NAME]*. It is the Project Steward’s duty to +receive and address reported violations of the code of conduct. They will then +work with a committee consisting of representatives from the Open Source +Programs Office and the Google Open Source Strategy team. If for any reason you +are uncomfortable reaching out the Project Steward, please email +opensource@google.com. + +We will investigate every complaint, but you may not receive a direct response. +We will use our discretion in determining when and how to follow up on reported +incidents, which may range from not taking action to permanent expulsion from +the project and project-sponsored spaces. We will notify the accused of the +report and provide them an opportunity to discuss it before any action is taken. +The identity of the reporter will be omitted from the details of the report +supplied to the accused. In potentially harmful situations, such as ongoing +harassment or threats to anyone's safety, we may take action without notice. + +## Attribution + +This Code of Conduct is adapted from the Contributor Covenant, version 1.4, +available at +https://www.contributor-covenant.org/version/1/4/code-of-conduct.html \ No newline at end of file diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md new file mode 100644 index 00000000..ebbb59e5 --- /dev/null +++ b/CONTRIBUTING.md @@ -0,0 +1,28 @@ +# How to Contribute + +We'd love to accept your patches and contributions to this project. There are +just a few small guidelines you need to follow. + +## Contributor License Agreement + +Contributions to this project must be accompanied by a Contributor License +Agreement. You (or your employer) retain the copyright to your contribution; +this simply gives us permission to use and redistribute your contributions as +part of the project. Head over to to see +your current agreements on file or to sign a new one. + +You generally only need to submit a CLA once, so if you've already submitted one +(even if it was for a different project), you probably don't need to do it +again. + +## Code reviews + +All submissions, including submissions by project members, require review. We +use GitHub pull requests for this purpose. Consult +[GitHub Help](https://help.github.com/articles/about-pull-requests/) for more +information on using pull requests. + +## Community Guidelines + +This project follows +[Google's Open Source Community Guidelines](https://opensource.google.com/conduct/). \ No newline at end of file diff --git a/LICENSE b/LICENSE new file mode 100644 index 00000000..d6456956 --- /dev/null +++ b/LICENSE @@ -0,0 +1,202 @@ + + Apache License + Version 2.0, January 2004 + http://www.apache.org/licenses/ + + TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION + + 1. Definitions. + + "License" shall mean the terms and conditions for use, reproduction, + and distribution as defined by Sections 1 through 9 of this document. + + "Licensor" shall mean the copyright owner or entity authorized by + the copyright owner that is granting the License. + + "Legal Entity" shall mean the union of the acting entity and all + other entities that control, are controlled by, or are under common + control with that entity. For the purposes of this definition, + "control" means (i) the power, direct or indirect, to cause the + direction or management of such entity, whether by contract or + otherwise, or (ii) ownership of fifty percent (50%) or more of the + outstanding shares, or (iii) beneficial ownership of such entity. + + "You" (or "Your") shall mean an individual or Legal Entity + exercising permissions granted by this License. + + "Source" form shall mean the preferred form for making modifications, + including but not limited to software source code, documentation + source, and configuration files. + + "Object" form shall mean any form resulting from mechanical + transformation or translation of a Source form, including but + not limited to compiled object code, generated documentation, + and conversions to other media types. + + "Work" shall mean the work of authorship, whether in Source or + Object form, made available under the License, as indicated by a + copyright notice that is included in or attached to the work + (an example is provided in the Appendix below). + + "Derivative Works" shall mean any work, whether in Source or Object + form, that is based on (or derived from) the Work and for which the + editorial revisions, annotations, elaborations, or other modifications + represent, as a whole, an original work of authorship. For the purposes + of this License, Derivative Works shall not include works that remain + separable from, or merely link (or bind by name) to the interfaces of, + the Work and Derivative Works thereof. + + "Contribution" shall mean any work of authorship, including + the original version of the Work and any modifications or additions + to that Work or Derivative Works thereof, that is intentionally + submitted to Licensor for inclusion in the Work by the copyright owner + or by an individual or Legal Entity authorized to submit on behalf of + the copyright owner. For the purposes of this definition, "submitted" + means any form of electronic, verbal, or written communication sent + to the Licensor or its representatives, including but not limited to + communication on electronic mailing lists, source code control systems, + and issue tracking systems that are managed by, or on behalf of, the + Licensor for the purpose of discussing and improving the Work, but + excluding communication that is conspicuously marked or otherwise + designated in writing by the copyright owner as "Not a Contribution." + + "Contributor" shall mean Licensor and any individual or Legal Entity + on behalf of whom a Contribution has been received by Licensor and + subsequently incorporated within the Work. + + 2. Grant of Copyright License. Subject to the terms and conditions of + this License, each Contributor hereby grants to You a perpetual, + worldwide, non-exclusive, no-charge, royalty-free, irrevocable + copyright license to reproduce, prepare Derivative Works of, + publicly display, publicly perform, sublicense, and distribute the + Work and such Derivative Works in Source or Object form. + + 3. Grant of Patent License. Subject to the terms and conditions of + this License, each Contributor hereby grants to You a perpetual, + worldwide, non-exclusive, no-charge, royalty-free, irrevocable + (except as stated in this section) patent license to make, have made, + use, offer to sell, sell, import, and otherwise transfer the Work, + where such license applies only to those patent claims licensable + by such Contributor that are necessarily infringed by their + Contribution(s) alone or by combination of their Contribution(s) + with the Work to which such Contribution(s) was submitted. If You + institute patent litigation against any entity (including a + cross-claim or counterclaim in a lawsuit) alleging that the Work + or a Contribution incorporated within the Work constitutes direct + or contributory patent infringement, then any patent licenses + granted to You under this License for that Work shall terminate + as of the date such litigation is filed. + + 4. Redistribution. You may reproduce and distribute copies of the + Work or Derivative Works thereof in any medium, with or without + modifications, and in Source or Object form, provided that You + meet the following conditions: + + (a) You must give any other recipients of the Work or + Derivative Works a copy of this License; and + + (b) You must cause any modified files to carry prominent notices + stating that You changed the files; and + + (c) You must retain, in the Source form of any Derivative Works + that You distribute, all copyright, patent, trademark, and + attribution notices from the Source form of the Work, + excluding those notices that do not pertain to any part of + the Derivative Works; and + + (d) If the Work includes a "NOTICE" text file as part of its + distribution, then any Derivative Works that You distribute must + include a readable copy of the attribution notices contained + within such NOTICE file, excluding those notices that do not + pertain to any part of the Derivative Works, in at least one + of the following places: within a NOTICE text file distributed + as part of the Derivative Works; within the Source form or + documentation, if provided along with the Derivative Works; or, + within a display generated by the Derivative Works, if and + wherever such third-party notices normally appear. The contents + of the NOTICE file are for informational purposes only and + do not modify the License. You may add Your own attribution + notices within Derivative Works that You distribute, alongside + or as an addendum to the NOTICE text from the Work, provided + that such additional attribution notices cannot be construed + as modifying the License. + + You may add Your own copyright statement to Your modifications and + may provide additional or different license terms and conditions + for use, reproduction, or distribution of Your modifications, or + for any such Derivative Works as a whole, provided Your use, + reproduction, and distribution of the Work otherwise complies with + the conditions stated in this License. + + 5. Submission of Contributions. Unless You explicitly state otherwise, + any Contribution intentionally submitted for inclusion in the Work + by You to the Licensor shall be under the terms and conditions of + this License, without any additional terms or conditions. + Notwithstanding the above, nothing herein shall supersede or modify + the terms of any separate license agreement you may have executed + with Licensor regarding such Contributions. + + 6. Trademarks. This License does not grant permission to use the trade + names, trademarks, service marks, or product names of the Licensor, + except as required for reasonable and customary use in describing the + origin of the Work and reproducing the content of the NOTICE file. + + 7. Disclaimer of Warranty. Unless required by applicable law or + agreed to in writing, Licensor provides the Work (and each + Contributor provides its Contributions) on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or + implied, including, without limitation, any warranties or conditions + of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A + PARTICULAR PURPOSE. You are solely responsible for determining the + appropriateness of using or redistributing the Work and assume any + risks associated with Your exercise of permissions under this License. + + 8. Limitation of Liability. In no event and under no legal theory, + whether in tort (including negligence), contract, or otherwise, + unless required by applicable law (such as deliberate and grossly + negligent acts) or agreed to in writing, shall any Contributor be + liable to You for damages, including any direct, indirect, special, + incidental, or consequential damages of any character arising as a + result of this License or out of the use or inability to use the + Work (including but not limited to damages for loss of goodwill, + work stoppage, computer failure or malfunction, or any and all + other commercial damages or losses), even if such Contributor + has been advised of the possibility of such damages. + + 9. Accepting Warranty or Additional Liability. While redistributing + the Work or Derivative Works thereof, You may choose to offer, + and charge a fee for, acceptance of support, warranty, indemnity, + or other liability obligations and/or rights consistent with this + License. However, in accepting such obligations, You may act only + on Your own behalf and on Your sole responsibility, not on behalf + of any other Contributor, and only if You agree to indemnify, + defend, and hold each Contributor harmless for any liability + incurred by, or claims asserted against, such Contributor by reason + of your accepting any such warranty or additional liability. + + END OF TERMS AND CONDITIONS + + APPENDIX: How to apply the Apache License to your work. + + To apply the Apache License to your work, attach the following + boilerplate notice, with the fields enclosed by brackets "[]" + replaced with your own identifying information. (Don't include + the brackets!) The text should be enclosed in the appropriate + comment syntax for the file format. We also recommend that a + file or class name and description of purpose be included on the + same "printed page" as the copyright notice for easier + identification within third-party archives. + + Copyright [yyyy] [name of copyright owner] + + Licensed under the Apache License, Version 2.0 (the "License"); + you may not use this file except in compliance with the License. + You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + + Unless required by applicable law or agreed to in writing, software + distributed under the License is distributed on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + See the License for the specific language governing permissions and + limitations under the License. diff --git a/README.md b/README.md new file mode 100644 index 00000000..0270050f --- /dev/null +++ b/README.md @@ -0,0 +1,127 @@ +# Google Cloud Java Client for Google Cloud Secret Management + +Java idiomatic client for [Google Cloud Secret Management][api-reference]. + +[![Maven][maven-version-image]][maven-version-link] +![Stability][stability-image] + +- [Product Documentation][product-docs] +- [Client Library Documentation][javadocs] + +> Note: This client is a work-in-progress, and may occasionally +> make backwards-incompatible changes. + +## Quickstart + +[//]: # ({x-version-update-start:secretmanager:released}) +If you are using Maven, add this to your pom.xml file +```xml + + com.google.cloud + google-cloud-secretmanager + 0.0.0 + +``` +If you are using Gradle, add this to your dependencies +```Groovy +compile 'com.google.cloud:google-cloud-secretmanager:0.0.0' +``` +If you are using SBT, add this to your dependencies +```Scala +libraryDependencies += "com.google.cloud" % "google-cloud-secretmanager" % "0.0.0" +``` +[//]: # ({x-version-update-end}) + +## Authentication + +See the [Authentication][authentication] section in the base directory's README. + +## About Google Cloud Secret Management + +[Google Cloud Secret Management][api-reference] is a suite of Machine Learning products. + +See the [Google Cloud Secret Management client library docs][javadocs] to learn how to +use this Google Cloud Secret Management Client Library. + +## Getting Started + +### Prerequisites + +You will need a [Google Developers Console][developer-console] project with the +Google Cloud Secret Management API enabled. [Follow these instructions][create-project] to get your +project set up. You will also need to set up the local development environment by +[installing the Google Cloud SDK][cloud-sdk] and running the following commands in command line: +`gcloud auth login` and `gcloud config set project [YOUR PROJECT ID]`. + +### Installation and setup + +You'll need to obtain the `google-cloud-secretmanager` library. See the [Quickstart](#quickstart) section +to add `google-cloud-secretmanager` as a dependency in your code. + +## Troubleshooting + +To get help, follow the instructions in the [shared Troubleshooting document][troubleshooting]. + +## Transport + +Google Cloud Secret Management uses gRPC for the transport layer. + +## Java Versions + +Java 7 or above is required for using this client. + +## Versioning + +This library follows [Semantic Versioning](http://semver.org/). + +It is currently in major version zero (``0.y.z``), which means that anything may change at any time +and the public API should not be considered stable. + +## Contributing + +Contributions to this library are always welcome and highly encouraged. + +See [CONTRIBUTING.md][contributing] documentation for more information on how to get started. + +Please note that this project is released with a Contributor Code of Conduct. By participating in +this project you agree to abide by its terms. See [Code of Conduct][code-of-conduct] for more +information. + +## License + +Apache 2.0 - See [LICENSE][license] for more information. + +## CI Status + +Java Version | Status +------------ | ------ +Java 7 | [![Kokoro CI][kokoro-badge-image-1]][kokoro-badge-link-1] +Java 8 | [![Kokoro CI][kokoro-badge-image-2]][kokoro-badge-link-2] +Java 8 OSX | [![Kokoro CI][kokoro-badge-image-3]][kokoro-badge-link-3] +Java 8 Windows | [![Kokoro CI][kokoro-badge-image-4]][kokoro-badge-link-4] +Java 11 | [![Kokoro CI][kokoro-badge-image-5]][kokoro-badge-link-5] + +[api-reference]: https://cloud.google.com/solutions/secrets-management/ +[product-docs]: https://cloud.google.com/solutions/secrets-management/ +[javadocs]: https://googleapis.dev/java/java-secretmanager/latest +[kokoro-badge-image-1]: http://storage.googleapis.com/cloud-devrel-public/java/badges/java-secretmanager/java7.svg +[kokoro-badge-link-1]: http://storage.googleapis.com/cloud-devrel-public/java/badges/java-secretmanager/java7.html +[kokoro-badge-image-2]: http://storage.googleapis.com/cloud-devrel-public/java/badges/java-secretmanager/java8.svg +[kokoro-badge-link-2]: http://storage.googleapis.com/cloud-devrel-public/java/badges/java-secretmanager/java8.html +[kokoro-badge-image-3]: http://storage.googleapis.com/cloud-devrel-public/java/badges/java-secretmanager/java8-osx.svg +[kokoro-badge-link-3]: http://storage.googleapis.com/cloud-devrel-public/java/badges/java-secretmanager/java8-osx.html +[kokoro-badge-image-4]: http://storage.googleapis.com/cloud-devrel-public/java/badges/java-secretmanager/java8-win.svg +[kokoro-badge-link-4]: http://storage.googleapis.com/cloud-devrel-public/java/badges/java-secretmanager/java8-win.html +[kokoro-badge-image-5]: http://storage.googleapis.com/cloud-devrel-public/java/badges/java-secretmanager/java11.svg +[kokoro-badge-link-5]: http://storage.googleapis.com/cloud-devrel-public/java/badges/java-secretmanager/java11.html +[stability-image]: https://img.shields.io/badge/stability-beta-yellow +[maven-version-image]: https://img.shields.io/maven-central/v/com.google.cloud/google-cloud-secretmanager.svg +[maven-version-link]: https://search.maven.org/search?q=g:com.google.cloud%20AND%20a:google-cloud-secretmanager&core=gav +[authentication]: https://github.com/googleapis/google-cloud-java#authentication +[developer-console]: https://console.developers.google.com/ +[create-project]: https://cloud.google.com/resource-manager/docs/creating-managing-projects +[cloud-sdk]: https://cloud.google.com/sdk/ +[troubleshooting]: https://github.com/googleapis/google-cloud-common/blob/master/troubleshooting/readme.md#troubleshooting +[contributing]: https://github.com/googleapis/java-secretmanager/blob/master/CONTRIBUTING.md +[code-of-conduct]: https://github.com/googleapis/java-secretmanager/blob/master/CODE_OF_CONDUCT.md#contributor-code-of-conduct +[license]: https://github.com/googleapis/java-secretmanager/blob/master/LICENSE \ No newline at end of file diff --git a/codecov.yaml b/codecov.yaml new file mode 100644 index 00000000..5724ea94 --- /dev/null +++ b/codecov.yaml @@ -0,0 +1,4 @@ +--- +codecov: + ci: + - source.cloud.google.com diff --git a/google-cloud-secretmanager-bom/pom.xml b/google-cloud-secretmanager-bom/pom.xml new file mode 100644 index 00000000..a9f6fb94 --- /dev/null +++ b/google-cloud-secretmanager-bom/pom.xml @@ -0,0 +1,92 @@ + + + 4.0.0 + com.google.cloud + google-cloud-secretmanager-bom + 0.0.1-SNAPSHOT + pom + + com.google.cloud + google-cloud-shared-config + 0.3.0 + + + Google Cloud secretmanager BOM + https://github.com/googleapis/java-secretmanager + + BOM for Google Cloud secretmanager + + + + Google LLC + + + + + chingor13 + Jeff Ching + chingor@google.com + Google LLC + + Developer + + + + + + scm:git:https://github.com/googleapis/java-secretmanager.git + scm:git:git@github.com:googleapis/java-secretmanager.git + https://github.com/googleapis/java-secretmanager + + + + + sonatype-nexus-snapshots + https://oss.sonatype.org/content/repositories/snapshots + + + sonatype-nexus-staging + https://oss.sonatype.org/service/local/staging/deploy/maven2/ + + + + + + The Apache Software License, Version 2.0 + http://www.apache.org/licenses/LICENSE-2.0.txt + repo + + + + + + + com.google.api.grpc + proto-google-cloud-secretmanager-v1beta1 + 0.0.1-SNAPSHOT + + + com.google.api.grpc + grpc-google-cloud-secretmanager-v1beta1 + 0.0.1-SNAPSHOT + + + com.google.cloud + google-cloud-secretmanager + 0.0.1-SNAPSHOT + + + + + + + + org.apache.maven.plugins + maven-checkstyle-plugin + + true + + + + + \ No newline at end of file diff --git a/google-cloud-secretmanager/pom.xml b/google-cloud-secretmanager/pom.xml new file mode 100644 index 00000000..fed54bfb --- /dev/null +++ b/google-cloud-secretmanager/pom.xml @@ -0,0 +1,101 @@ + + + 4.0.0 + com.google.cloud + google-cloud-secretmanager + 0.0.1-SNAPSHOT + jar + Google Cloud secretmanager + https://github.com/googleapis/java-secretmanager + Java idiomatic client for Google Cloud secretmanager + + com.google.cloud + google-cloud-secretmanager-parent + 0.0.1-SNAPSHOT + + + google-cloud-secretmanager + + + + io.grpc + grpc-api + + + io.grpc + grpc-stub + + + io.grpc + grpc-protobuf + + + com.google.api + api-common + + + com.google.protobuf + protobuf-java + + + com.google.api.grpc + proto-google-common-protos + + + + com.google.api.grpc + proto-google-cloud-secretmanager-v1beta1 + + + com.google.guava + guava + + + com.google.api + gax + + + com.google.api + gax-grpc + + + org.threeten + threetenbp + + + + + junit + junit + test + + + + com.google.api.grpc + grpc-google-cloud-secretmanager-v1beta1 + test + + + + com.google.api + gax-grpc + testlib + test + + + + + + java9 + + [9,) + + + + javax.annotation + javax.annotation-api + + + + + \ No newline at end of file diff --git a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceClient.java b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceClient.java new file mode 100644 index 00000000..5f69ebc4 --- /dev/null +++ b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceClient.java @@ -0,0 +1,1881 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +package com.google.cloud.secretmanager.v1beta1; + +import com.google.api.core.ApiFunction; +import com.google.api.core.ApiFuture; +import com.google.api.core.ApiFutures; +import com.google.api.core.BetaApi; +import com.google.api.gax.core.BackgroundResource; +import com.google.api.gax.paging.AbstractFixedSizeCollection; +import com.google.api.gax.paging.AbstractPage; +import com.google.api.gax.paging.AbstractPagedListResponse; +import com.google.api.gax.rpc.PageContext; +import com.google.api.gax.rpc.UnaryCallable; +import com.google.cloud.secretmanager.v1beta1.stub.SecretManagerServiceStub; +import com.google.cloud.secretmanager.v1beta1.stub.SecretManagerServiceStubSettings; +import com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse; +import com.google.cloud.secrets.v1beta1.AddSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.CreateSecretRequest; +import com.google.cloud.secrets.v1beta1.DeleteSecretRequest; +import com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest; +import com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.GetSecretRequest; +import com.google.cloud.secrets.v1beta1.GetSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest; +import com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse; +import com.google.cloud.secrets.v1beta1.ListSecretsRequest; +import com.google.cloud.secrets.v1beta1.ListSecretsResponse; +import com.google.cloud.secrets.v1beta1.ProjectName; +import com.google.cloud.secrets.v1beta1.Secret; +import com.google.cloud.secrets.v1beta1.SecretName; +import com.google.cloud.secrets.v1beta1.SecretPayload; +import com.google.cloud.secrets.v1beta1.SecretVersion; +import com.google.cloud.secrets.v1beta1.SecretVersionName; +import com.google.cloud.secrets.v1beta1.UpdateSecretRequest; +import com.google.common.util.concurrent.MoreExecutors; +import com.google.iam.v1.GetIamPolicyRequest; +import com.google.iam.v1.Policy; +import com.google.iam.v1.SetIamPolicyRequest; +import com.google.iam.v1.TestIamPermissionsRequest; +import com.google.iam.v1.TestIamPermissionsResponse; +import com.google.protobuf.Empty; +import com.google.protobuf.FieldMask; +import java.io.IOException; +import java.util.List; +import java.util.concurrent.TimeUnit; +import javax.annotation.Generated; + +// AUTO-GENERATED DOCUMENTATION AND SERVICE +/** + * Service Description: Secret Manager Service + * + *

Manages secrets and operations using those secrets. Implements a REST model with the following + * objects: + * + *

* [Secret][google.cloud.secrets.v1beta1.Secret] * + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] + * + *

This class provides the ability to make remote calls to the backing service through method + * calls that map to API methods. Sample code to get started: + * + *

+ * 
+ * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+ *   ProjectName parent = ProjectName.of("[PROJECT]");
+ *   String secretId = "";
+ *   Secret secret = Secret.newBuilder().build();
+ *   Secret response = secretManagerServiceClient.createSecret(parent, secretId, secret);
+ * }
+ * 
+ * 
+ * + *

Note: close() needs to be called on the secretManagerServiceClient object to clean up + * resources such as threads. In the example above, try-with-resources is used, which automatically + * calls close(). + * + *

The surface of this class includes several types of Java methods for each of the API's + * methods: + * + *

    + *
  1. A "flattened" method. With this type of method, the fields of the request type have been + * converted into function parameters. It may be the case that not all fields are available as + * parameters, and not every API method will have a flattened method entry point. + *
  2. A "request object" method. This type of method only takes one parameter, a request object, + * which must be constructed before the call. Not every API method will have a request object + * method. + *
  3. A "callable" method. This type of method takes no parameters and returns an immutable API + * callable object, which can be used to initiate calls to the service. + *
+ * + *

See the individual methods for example code. + * + *

Many parameters require resource names to be formatted in a particular way. To assist with + * these names, this class includes a format method for each type of name, and additionally a parse + * method to extract the individual identifiers contained within names that are returned. + * + *

This class can be customized by passing in a custom instance of SecretManagerServiceSettings + * to create(). For example: + * + *

To customize credentials: + * + *

+ * 
+ * SecretManagerServiceSettings secretManagerServiceSettings =
+ *     SecretManagerServiceSettings.newBuilder()
+ *         .setCredentialsProvider(FixedCredentialsProvider.create(myCredentials))
+ *         .build();
+ * SecretManagerServiceClient secretManagerServiceClient =
+ *     SecretManagerServiceClient.create(secretManagerServiceSettings);
+ * 
+ * 
+ * + * To customize the endpoint: + * + *
+ * 
+ * SecretManagerServiceSettings secretManagerServiceSettings =
+ *     SecretManagerServiceSettings.newBuilder().setEndpoint(myEndpoint).build();
+ * SecretManagerServiceClient secretManagerServiceClient =
+ *     SecretManagerServiceClient.create(secretManagerServiceSettings);
+ * 
+ * 
+ */ +@Generated("by gapic-generator") +@BetaApi +public class SecretManagerServiceClient implements BackgroundResource { + private final SecretManagerServiceSettings settings; + private final SecretManagerServiceStub stub; + + /** Constructs an instance of SecretManagerServiceClient with default settings. */ + public static final SecretManagerServiceClient create() throws IOException { + return create(SecretManagerServiceSettings.newBuilder().build()); + } + + /** + * Constructs an instance of SecretManagerServiceClient, using the given settings. The channels + * are created based on the settings passed in, or defaults for any settings that are not set. + */ + public static final SecretManagerServiceClient create(SecretManagerServiceSettings settings) + throws IOException { + return new SecretManagerServiceClient(settings); + } + + /** + * Constructs an instance of SecretManagerServiceClient, using the given stub for making calls. + * This is for advanced usage - prefer to use SecretManagerServiceSettings}. + */ + @BetaApi("A restructuring of stub classes is planned, so this may break in the future") + public static final SecretManagerServiceClient create(SecretManagerServiceStub stub) { + return new SecretManagerServiceClient(stub); + } + + /** + * Constructs an instance of SecretManagerServiceClient, using the given settings. This is + * protected so that it is easy to make a subclass, but otherwise, the static factory methods + * should be preferred. + */ + protected SecretManagerServiceClient(SecretManagerServiceSettings settings) throws IOException { + this.settings = settings; + this.stub = ((SecretManagerServiceStubSettings) settings.getStubSettings()).createStub(); + } + + @BetaApi("A restructuring of stub classes is planned, so this may break in the future") + protected SecretManagerServiceClient(SecretManagerServiceStub stub) { + this.settings = null; + this.stub = stub; + } + + public final SecretManagerServiceSettings getSettings() { + return settings; + } + + @BetaApi("A restructuring of stub classes is planned, so this may break in the future") + public SecretManagerServiceStub getStub() { + return stub; + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Lists [Secrets][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   ProjectName parent = ProjectName.of("[PROJECT]");
+   *   for (Secret element : secretManagerServiceClient.listSecrets(parent).iterateAll()) {
+   *     // doThingsWith(element);
+   *   }
+   * }
+   * 
+ * + * @param parent Required. The resource name of the project associated with the + * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final ListSecretsPagedResponse listSecrets(ProjectName parent) { + ListSecretsRequest request = + ListSecretsRequest.newBuilder() + .setParent(parent == null ? null : parent.toString()) + .build(); + return listSecrets(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Lists [Secrets][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   ProjectName parent = ProjectName.of("[PROJECT]");
+   *   for (Secret element : secretManagerServiceClient.listSecrets(parent.toString()).iterateAll()) {
+   *     // doThingsWith(element);
+   *   }
+   * }
+   * 
+ * + * @param parent Required. The resource name of the project associated with the + * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final ListSecretsPagedResponse listSecrets(String parent) { + ListSecretsRequest request = ListSecretsRequest.newBuilder().setParent(parent).build(); + return listSecrets(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Lists [Secrets][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   ProjectName parent = ProjectName.of("[PROJECT]");
+   *   ListSecretsRequest request = ListSecretsRequest.newBuilder()
+   *     .setParent(parent.toString())
+   *     .build();
+   *   for (Secret element : secretManagerServiceClient.listSecrets(request).iterateAll()) {
+   *     // doThingsWith(element);
+   *   }
+   * }
+   * 
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final ListSecretsPagedResponse listSecrets(ListSecretsRequest request) { + return listSecretsPagedCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Lists [Secrets][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   ProjectName parent = ProjectName.of("[PROJECT]");
+   *   ListSecretsRequest request = ListSecretsRequest.newBuilder()
+   *     .setParent(parent.toString())
+   *     .build();
+   *   ApiFuture<ListSecretsPagedResponse> future = secretManagerServiceClient.listSecretsPagedCallable().futureCall(request);
+   *   // Do something
+   *   for (Secret element : future.get().iterateAll()) {
+   *     // doThingsWith(element);
+   *   }
+   * }
+   * 
+ */ + public final UnaryCallable + listSecretsPagedCallable() { + return stub.listSecretsPagedCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Lists [Secrets][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   ProjectName parent = ProjectName.of("[PROJECT]");
+   *   ListSecretsRequest request = ListSecretsRequest.newBuilder()
+   *     .setParent(parent.toString())
+   *     .build();
+   *   while (true) {
+   *     ListSecretsResponse response = secretManagerServiceClient.listSecretsCallable().call(request);
+   *     for (Secret element : response.getSecretsList()) {
+   *       // doThingsWith(element);
+   *     }
+   *     String nextPageToken = response.getNextPageToken();
+   *     if (!Strings.isNullOrEmpty(nextPageToken)) {
+   *       request = request.toBuilder().setPageToken(nextPageToken).build();
+   *     } else {
+   *       break;
+   *     }
+   *   }
+   * }
+   * 
+ */ + public final UnaryCallable listSecretsCallable() { + return stub.listSecretsCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no + * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   ProjectName parent = ProjectName.of("[PROJECT]");
+   *   String secretId = "";
+   *   Secret secret = Secret.newBuilder().build();
+   *   Secret response = secretManagerServiceClient.createSecret(parent, secretId, secret);
+   * }
+   * 
+ * + * @param parent Required. The resource name of the project to associate with the + * [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`. + * @param secretId Required. This must be unique within the project. + * @param secret A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final Secret createSecret(ProjectName parent, String secretId, Secret secret) { + + CreateSecretRequest request = + CreateSecretRequest.newBuilder() + .setParent(parent == null ? null : parent.toString()) + .setSecretId(secretId) + .setSecret(secret) + .build(); + return createSecret(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no + * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   ProjectName parent = ProjectName.of("[PROJECT]");
+   *   String secretId = "";
+   *   Secret secret = Secret.newBuilder().build();
+   *   Secret response = secretManagerServiceClient.createSecret(parent.toString(), secretId, secret);
+   * }
+   * 
+ * + * @param parent Required. The resource name of the project to associate with the + * [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`. + * @param secretId Required. This must be unique within the project. + * @param secret A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final Secret createSecret(String parent, String secretId, Secret secret) { + + CreateSecretRequest request = + CreateSecretRequest.newBuilder() + .setParent(parent) + .setSecretId(secretId) + .setSecret(secret) + .build(); + return createSecret(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no + * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   ProjectName parent = ProjectName.of("[PROJECT]");
+   *   String secretId = "";
+   *   CreateSecretRequest request = CreateSecretRequest.newBuilder()
+   *     .setParent(parent.toString())
+   *     .setSecretId(secretId)
+   *     .build();
+   *   Secret response = secretManagerServiceClient.createSecret(request);
+   * }
+   * 
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final Secret createSecret(CreateSecretRequest request) { + return createSecretCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no + * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   ProjectName parent = ProjectName.of("[PROJECT]");
+   *   String secretId = "";
+   *   CreateSecretRequest request = CreateSecretRequest.newBuilder()
+   *     .setParent(parent.toString())
+   *     .setSecretId(secretId)
+   *     .build();
+   *   ApiFuture<Secret> future = secretManagerServiceClient.createSecretCallable().futureCall(request);
+   *   // Do something
+   *   Secret response = future.get();
+   * }
+   * 
+ */ + public final UnaryCallable createSecretCallable() { + return stub.createSecretCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret + * data and attaches it to an existing [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretName parent = SecretName.of("[PROJECT]", "[SECRET]");
+   *   SecretPayload payload = SecretPayload.newBuilder().build();
+   *   SecretVersion response = secretManagerServiceClient.addSecretVersion(parent, payload);
+   * }
+   * 
+ * + * @param parent Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] + * to associate with the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the + * format `projects/*/secrets/*`. + * @param payload Required. The secret payload of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion addSecretVersion(SecretName parent, SecretPayload payload) { + + AddSecretVersionRequest request = + AddSecretVersionRequest.newBuilder() + .setParent(parent == null ? null : parent.toString()) + .setPayload(payload) + .build(); + return addSecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret + * data and attaches it to an existing [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretName parent = SecretName.of("[PROJECT]", "[SECRET]");
+   *   SecretPayload payload = SecretPayload.newBuilder().build();
+   *   SecretVersion response = secretManagerServiceClient.addSecretVersion(parent.toString(), payload);
+   * }
+   * 
+ * + * @param parent Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] + * to associate with the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the + * format `projects/*/secrets/*`. + * @param payload Required. The secret payload of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion addSecretVersion(String parent, SecretPayload payload) { + + AddSecretVersionRequest request = + AddSecretVersionRequest.newBuilder().setParent(parent).setPayload(payload).build(); + return addSecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret + * data and attaches it to an existing [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretName parent = SecretName.of("[PROJECT]", "[SECRET]");
+   *   SecretPayload payload = SecretPayload.newBuilder().build();
+   *   AddSecretVersionRequest request = AddSecretVersionRequest.newBuilder()
+   *     .setParent(parent.toString())
+   *     .setPayload(payload)
+   *     .build();
+   *   SecretVersion response = secretManagerServiceClient.addSecretVersion(request);
+   * }
+   * 
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion addSecretVersion(AddSecretVersionRequest request) { + return addSecretVersionCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret + * data and attaches it to an existing [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretName parent = SecretName.of("[PROJECT]", "[SECRET]");
+   *   SecretPayload payload = SecretPayload.newBuilder().build();
+   *   AddSecretVersionRequest request = AddSecretVersionRequest.newBuilder()
+   *     .setParent(parent.toString())
+   *     .setPayload(payload)
+   *     .build();
+   *   ApiFuture<SecretVersion> future = secretManagerServiceClient.addSecretVersionCallable().futureCall(request);
+   *   // Do something
+   *   SecretVersion response = future.get();
+   * }
+   * 
+ */ + public final UnaryCallable addSecretVersionCallable() { + return stub.addSecretVersionCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretName name = SecretName.of("[PROJECT]", "[SECRET]");
+   *   Secret response = secretManagerServiceClient.getSecret(name);
+   * }
+   * 
+ * + * @param name Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], + * in the format `projects/*/secrets/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final Secret getSecret(SecretName name) { + + GetSecretRequest request = + GetSecretRequest.newBuilder().setName(name == null ? null : name.toString()).build(); + return getSecret(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretName name = SecretName.of("[PROJECT]", "[SECRET]");
+   *   Secret response = secretManagerServiceClient.getSecret(name.toString());
+   * }
+   * 
+ * + * @param name Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], + * in the format `projects/*/secrets/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final Secret getSecret(String name) { + + GetSecretRequest request = GetSecretRequest.newBuilder().setName(name).build(); + return getSecret(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretName name = SecretName.of("[PROJECT]", "[SECRET]");
+   *   GetSecretRequest request = GetSecretRequest.newBuilder()
+   *     .setName(name.toString())
+   *     .build();
+   *   Secret response = secretManagerServiceClient.getSecret(request);
+   * }
+   * 
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final Secret getSecret(GetSecretRequest request) { + return getSecretCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretName name = SecretName.of("[PROJECT]", "[SECRET]");
+   *   GetSecretRequest request = GetSecretRequest.newBuilder()
+   *     .setName(name.toString())
+   *     .build();
+   *   ApiFuture<Secret> future = secretManagerServiceClient.getSecretCallable().futureCall(request);
+   *   // Do something
+   *   Secret response = future.get();
+   * }
+   * 
+ */ + public final UnaryCallable getSecretCallable() { + return stub.getSecretCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   Secret secret = Secret.newBuilder().build();
+   *   FieldMask updateMask = FieldMask.newBuilder().build();
+   *   Secret response = secretManagerServiceClient.updateSecret(secret, updateMask);
+   * }
+   * 
+ * + * @param secret Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field + * values. + * @param updateMask Required. Specifies the fields to be updated. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final Secret updateSecret(Secret secret, FieldMask updateMask) { + + UpdateSecretRequest request = + UpdateSecretRequest.newBuilder().setSecret(secret).setUpdateMask(updateMask).build(); + return updateSecret(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   Secret secret = Secret.newBuilder().build();
+   *   FieldMask updateMask = FieldMask.newBuilder().build();
+   *   UpdateSecretRequest request = UpdateSecretRequest.newBuilder()
+   *     .setSecret(secret)
+   *     .setUpdateMask(updateMask)
+   *     .build();
+   *   Secret response = secretManagerServiceClient.updateSecret(request);
+   * }
+   * 
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final Secret updateSecret(UpdateSecretRequest request) { + return updateSecretCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   Secret secret = Secret.newBuilder().build();
+   *   FieldMask updateMask = FieldMask.newBuilder().build();
+   *   UpdateSecretRequest request = UpdateSecretRequest.newBuilder()
+   *     .setSecret(secret)
+   *     .setUpdateMask(updateMask)
+   *     .build();
+   *   ApiFuture<Secret> future = secretManagerServiceClient.updateSecretCallable().futureCall(request);
+   *   // Do something
+   *   Secret response = future.get();
+   * }
+   * 
+ */ + public final UnaryCallable updateSecretCallable() { + return stub.updateSecretCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Deletes a [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretName name = SecretName.of("[PROJECT]", "[SECRET]");
+   *   secretManagerServiceClient.deleteSecret(name);
+   * }
+   * 
+ * + * @param name Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to + * delete in the format `projects/*/secrets/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final void deleteSecret(SecretName name) { + + DeleteSecretRequest request = + DeleteSecretRequest.newBuilder().setName(name == null ? null : name.toString()).build(); + deleteSecret(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Deletes a [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretName name = SecretName.of("[PROJECT]", "[SECRET]");
+   *   secretManagerServiceClient.deleteSecret(name.toString());
+   * }
+   * 
+ * + * @param name Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to + * delete in the format `projects/*/secrets/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final void deleteSecret(String name) { + + DeleteSecretRequest request = DeleteSecretRequest.newBuilder().setName(name).build(); + deleteSecret(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Deletes a [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretName name = SecretName.of("[PROJECT]", "[SECRET]");
+   *   DeleteSecretRequest request = DeleteSecretRequest.newBuilder()
+   *     .setName(name.toString())
+   *     .build();
+   *   secretManagerServiceClient.deleteSecret(request);
+   * }
+   * 
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final void deleteSecret(DeleteSecretRequest request) { + deleteSecretCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Deletes a [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretName name = SecretName.of("[PROJECT]", "[SECRET]");
+   *   DeleteSecretRequest request = DeleteSecretRequest.newBuilder()
+   *     .setName(name.toString())
+   *     .build();
+   *   ApiFuture<Void> future = secretManagerServiceClient.deleteSecretCallable().futureCall(request);
+   *   // Do something
+   *   future.get();
+   * }
+   * 
+ */ + public final UnaryCallable deleteSecretCallable() { + return stub.deleteSecretCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return + * secret data. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretName parent = SecretName.of("[PROJECT]", "[SECRET]");
+   *   for (SecretVersion element : secretManagerServiceClient.listSecretVersions(parent).iterateAll()) {
+   *     // doThingsWith(element);
+   *   }
+   * }
+   * 
+ * + * @param parent Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] + * associated with the [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, + * in the format `projects/*/secrets/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final ListSecretVersionsPagedResponse listSecretVersions(SecretName parent) { + ListSecretVersionsRequest request = + ListSecretVersionsRequest.newBuilder() + .setParent(parent == null ? null : parent.toString()) + .build(); + return listSecretVersions(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return + * secret data. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretName parent = SecretName.of("[PROJECT]", "[SECRET]");
+   *   for (SecretVersion element : secretManagerServiceClient.listSecretVersions(parent.toString()).iterateAll()) {
+   *     // doThingsWith(element);
+   *   }
+   * }
+   * 
+ * + * @param parent Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] + * associated with the [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, + * in the format `projects/*/secrets/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final ListSecretVersionsPagedResponse listSecretVersions(String parent) { + ListSecretVersionsRequest request = + ListSecretVersionsRequest.newBuilder().setParent(parent).build(); + return listSecretVersions(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return + * secret data. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretName parent = SecretName.of("[PROJECT]", "[SECRET]");
+   *   ListSecretVersionsRequest request = ListSecretVersionsRequest.newBuilder()
+   *     .setParent(parent.toString())
+   *     .build();
+   *   for (SecretVersion element : secretManagerServiceClient.listSecretVersions(request).iterateAll()) {
+   *     // doThingsWith(element);
+   *   }
+   * }
+   * 
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final ListSecretVersionsPagedResponse listSecretVersions( + ListSecretVersionsRequest request) { + return listSecretVersionsPagedCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return + * secret data. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretName parent = SecretName.of("[PROJECT]", "[SECRET]");
+   *   ListSecretVersionsRequest request = ListSecretVersionsRequest.newBuilder()
+   *     .setParent(parent.toString())
+   *     .build();
+   *   ApiFuture<ListSecretVersionsPagedResponse> future = secretManagerServiceClient.listSecretVersionsPagedCallable().futureCall(request);
+   *   // Do something
+   *   for (SecretVersion element : future.get().iterateAll()) {
+   *     // doThingsWith(element);
+   *   }
+   * }
+   * 
+ */ + public final UnaryCallable + listSecretVersionsPagedCallable() { + return stub.listSecretVersionsPagedCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return + * secret data. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretName parent = SecretName.of("[PROJECT]", "[SECRET]");
+   *   ListSecretVersionsRequest request = ListSecretVersionsRequest.newBuilder()
+   *     .setParent(parent.toString())
+   *     .build();
+   *   while (true) {
+   *     ListSecretVersionsResponse response = secretManagerServiceClient.listSecretVersionsCallable().call(request);
+   *     for (SecretVersion element : response.getVersionsList()) {
+   *       // doThingsWith(element);
+   *     }
+   *     String nextPageToken = response.getNextPageToken();
+   *     if (!Strings.isNullOrEmpty(nextPageToken)) {
+   *       request = request.toBuilder().setPageToken(nextPageToken).build();
+   *     } else {
+   *       break;
+   *     }
+   *   }
+   * }
+   * 
+ */ + public final UnaryCallable + listSecretVersionsCallable() { + return stub.listSecretVersionsCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

`projects/*/secrets/*/versions/latest` is an alias to the `latest` + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   SecretVersion response = secretManagerServiceClient.getSecretVersion(name);
+   * }
+   * 
+ * + * @param name Required. The resource name of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format + * `projects/*/secrets/*/versions/*`. + * `projects/*/secrets/*/versions/latest` is an alias to the `latest` + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion getSecretVersion(SecretVersionName name) { + + GetSecretVersionRequest request = + GetSecretVersionRequest.newBuilder().setName(name == null ? null : name.toString()).build(); + return getSecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

`projects/*/secrets/*/versions/latest` is an alias to the `latest` + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   SecretVersion response = secretManagerServiceClient.getSecretVersion(name.toString());
+   * }
+   * 
+ * + * @param name Required. The resource name of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format + * `projects/*/secrets/*/versions/*`. + * `projects/*/secrets/*/versions/latest` is an alias to the `latest` + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion getSecretVersion(String name) { + + GetSecretVersionRequest request = GetSecretVersionRequest.newBuilder().setName(name).build(); + return getSecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

`projects/*/secrets/*/versions/latest` is an alias to the `latest` + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   GetSecretVersionRequest request = GetSecretVersionRequest.newBuilder()
+   *     .setName(name.toString())
+   *     .build();
+   *   SecretVersion response = secretManagerServiceClient.getSecretVersion(request);
+   * }
+   * 
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion getSecretVersion(GetSecretVersionRequest request) { + return getSecretVersionCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

`projects/*/secrets/*/versions/latest` is an alias to the `latest` + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   GetSecretVersionRequest request = GetSecretVersionRequest.newBuilder()
+   *     .setName(name.toString())
+   *     .build();
+   *   ApiFuture<SecretVersion> future = secretManagerServiceClient.getSecretVersionCallable().futureCall(request);
+   *   // Do something
+   *   SecretVersion response = future.get();
+   * }
+   * 
+ */ + public final UnaryCallable getSecretVersionCallable() { + return stub.getSecretVersionCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the + * secret data. + * + *

`projects/*/secrets/*/versions/latest` is an alias to the `latest` + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   AccessSecretVersionResponse response = secretManagerServiceClient.accessSecretVersion(name);
+   * }
+   * 
+ * + * @param name Required. The resource name of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format + * `projects/*/secrets/*/versions/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final AccessSecretVersionResponse accessSecretVersion(SecretVersionName name) { + + AccessSecretVersionRequest request = + AccessSecretVersionRequest.newBuilder() + .setName(name == null ? null : name.toString()) + .build(); + return accessSecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the + * secret data. + * + *

`projects/*/secrets/*/versions/latest` is an alias to the `latest` + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   AccessSecretVersionResponse response = secretManagerServiceClient.accessSecretVersion(name.toString());
+   * }
+   * 
+ * + * @param name Required. The resource name of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format + * `projects/*/secrets/*/versions/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final AccessSecretVersionResponse accessSecretVersion(String name) { + + AccessSecretVersionRequest request = + AccessSecretVersionRequest.newBuilder().setName(name).build(); + return accessSecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the + * secret data. + * + *

`projects/*/secrets/*/versions/latest` is an alias to the `latest` + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   AccessSecretVersionRequest request = AccessSecretVersionRequest.newBuilder()
+   *     .setName(name.toString())
+   *     .build();
+   *   AccessSecretVersionResponse response = secretManagerServiceClient.accessSecretVersion(request);
+   * }
+   * 
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final AccessSecretVersionResponse accessSecretVersion(AccessSecretVersionRequest request) { + return accessSecretVersionCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the + * secret data. + * + *

`projects/*/secrets/*/versions/latest` is an alias to the `latest` + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   AccessSecretVersionRequest request = AccessSecretVersionRequest.newBuilder()
+   *     .setName(name.toString())
+   *     .build();
+   *   ApiFuture<AccessSecretVersionResponse> future = secretManagerServiceClient.accessSecretVersionCallable().futureCall(request);
+   *   // Do something
+   *   AccessSecretVersionResponse response = future.get();
+   * }
+   * 
+ */ + public final UnaryCallable + accessSecretVersionCallable() { + return stub.accessSecretVersionCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   SecretVersion response = secretManagerServiceClient.disableSecretVersion(name);
+   * }
+   * 
+ * + * @param name Required. The resource name of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format + * `projects/*/secrets/*/versions/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion disableSecretVersion(SecretVersionName name) { + + DisableSecretVersionRequest request = + DisableSecretVersionRequest.newBuilder() + .setName(name == null ? null : name.toString()) + .build(); + return disableSecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   SecretVersion response = secretManagerServiceClient.disableSecretVersion(name.toString());
+   * }
+   * 
+ * + * @param name Required. The resource name of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format + * `projects/*/secrets/*/versions/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion disableSecretVersion(String name) { + + DisableSecretVersionRequest request = + DisableSecretVersionRequest.newBuilder().setName(name).build(); + return disableSecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   DisableSecretVersionRequest request = DisableSecretVersionRequest.newBuilder()
+   *     .setName(name.toString())
+   *     .build();
+   *   SecretVersion response = secretManagerServiceClient.disableSecretVersion(request);
+   * }
+   * 
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion disableSecretVersion(DisableSecretVersionRequest request) { + return disableSecretVersionCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   DisableSecretVersionRequest request = DisableSecretVersionRequest.newBuilder()
+   *     .setName(name.toString())
+   *     .build();
+   *   ApiFuture<SecretVersion> future = secretManagerServiceClient.disableSecretVersionCallable().futureCall(request);
+   *   // Do something
+   *   SecretVersion response = future.get();
+   * }
+   * 
+ */ + public final UnaryCallable + disableSecretVersionCallable() { + return stub.disableSecretVersionCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   SecretVersion response = secretManagerServiceClient.enableSecretVersion(name);
+   * }
+   * 
+ * + * @param name Required. The resource name of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format + * `projects/*/secrets/*/versions/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion enableSecretVersion(SecretVersionName name) { + + EnableSecretVersionRequest request = + EnableSecretVersionRequest.newBuilder() + .setName(name == null ? null : name.toString()) + .build(); + return enableSecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   SecretVersion response = secretManagerServiceClient.enableSecretVersion(name.toString());
+   * }
+   * 
+ * + * @param name Required. The resource name of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format + * `projects/*/secrets/*/versions/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion enableSecretVersion(String name) { + + EnableSecretVersionRequest request = + EnableSecretVersionRequest.newBuilder().setName(name).build(); + return enableSecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   EnableSecretVersionRequest request = EnableSecretVersionRequest.newBuilder()
+   *     .setName(name.toString())
+   *     .build();
+   *   SecretVersion response = secretManagerServiceClient.enableSecretVersion(request);
+   * }
+   * 
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion enableSecretVersion(EnableSecretVersionRequest request) { + return enableSecretVersionCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   EnableSecretVersionRequest request = EnableSecretVersionRequest.newBuilder()
+   *     .setName(name.toString())
+   *     .build();
+   *   ApiFuture<SecretVersion> future = secretManagerServiceClient.enableSecretVersionCallable().futureCall(request);
+   *   // Do something
+   *   SecretVersion response = future.get();
+   * }
+   * 
+ */ + public final UnaryCallable + enableSecretVersionCallable() { + return stub.enableSecretVersionCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably + * destroys the secret data. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   SecretVersion response = secretManagerServiceClient.destroySecretVersion(name);
+   * }
+   * 
+ * + * @param name Required. The resource name of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format + * `projects/*/secrets/*/versions/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion destroySecretVersion(SecretVersionName name) { + + DestroySecretVersionRequest request = + DestroySecretVersionRequest.newBuilder() + .setName(name == null ? null : name.toString()) + .build(); + return destroySecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably + * destroys the secret data. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   SecretVersion response = secretManagerServiceClient.destroySecretVersion(name.toString());
+   * }
+   * 
+ * + * @param name Required. The resource name of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format + * `projects/*/secrets/*/versions/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion destroySecretVersion(String name) { + + DestroySecretVersionRequest request = + DestroySecretVersionRequest.newBuilder().setName(name).build(); + return destroySecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably + * destroys the secret data. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   DestroySecretVersionRequest request = DestroySecretVersionRequest.newBuilder()
+   *     .setName(name.toString())
+   *     .build();
+   *   SecretVersion response = secretManagerServiceClient.destroySecretVersion(request);
+   * }
+   * 
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion destroySecretVersion(DestroySecretVersionRequest request) { + return destroySecretVersionCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably + * destroys the secret data. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   DestroySecretVersionRequest request = DestroySecretVersionRequest.newBuilder()
+   *     .setName(name.toString())
+   *     .build();
+   *   ApiFuture<SecretVersion> future = secretManagerServiceClient.destroySecretVersionCallable().futureCall(request);
+   *   // Do something
+   *   SecretVersion response = future.get();
+   * }
+   * 
+ */ + public final UnaryCallable + destroySecretVersionCallable() { + return stub.destroySecretVersionCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Sets the access control policy on the specified secret. Replaces any existing policy. + * + *

Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced + * according to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   ResourceName resource = ProjectName.of("[PROJECT]");
+   *   Policy policy = Policy.newBuilder().build();
+   *   SetIamPolicyRequest request = SetIamPolicyRequest.newBuilder()
+   *     .setResource(resource.toString())
+   *     .setPolicy(policy)
+   *     .build();
+   *   Policy response = secretManagerServiceClient.setIamPolicy(request);
+   * }
+   * 
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final Policy setIamPolicy(SetIamPolicyRequest request) { + return setIamPolicyCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Sets the access control policy on the specified secret. Replaces any existing policy. + * + *

Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced + * according to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   ResourceName resource = ProjectName.of("[PROJECT]");
+   *   Policy policy = Policy.newBuilder().build();
+   *   SetIamPolicyRequest request = SetIamPolicyRequest.newBuilder()
+   *     .setResource(resource.toString())
+   *     .setPolicy(policy)
+   *     .build();
+   *   ApiFuture<Policy> future = secretManagerServiceClient.setIamPolicyCallable().futureCall(request);
+   *   // Do something
+   *   Policy response = future.get();
+   * }
+   * 
+ */ + public final UnaryCallable setIamPolicyCallable() { + return stub.setIamPolicyCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Gets the access control policy for a secret. Returns empty policy if the secret exists and does + * not have a policy set. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   ResourceName resource = ProjectName.of("[PROJECT]");
+   *   GetIamPolicyRequest request = GetIamPolicyRequest.newBuilder()
+   *     .setResource(resource.toString())
+   *     .build();
+   *   Policy response = secretManagerServiceClient.getIamPolicy(request);
+   * }
+   * 
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final Policy getIamPolicy(GetIamPolicyRequest request) { + return getIamPolicyCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Gets the access control policy for a secret. Returns empty policy if the secret exists and does + * not have a policy set. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   ResourceName resource = ProjectName.of("[PROJECT]");
+   *   GetIamPolicyRequest request = GetIamPolicyRequest.newBuilder()
+   *     .setResource(resource.toString())
+   *     .build();
+   *   ApiFuture<Policy> future = secretManagerServiceClient.getIamPolicyCallable().futureCall(request);
+   *   // Do something
+   *   Policy response = future.get();
+   * }
+   * 
+ */ + public final UnaryCallable getIamPolicyCallable() { + return stub.getIamPolicyCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Returns permissions that a caller has for the specified secret. If the secret does not exist, + * this call returns an empty set of permissions, not a NOT_FOUND error. + * + *

Note: This operation is designed to be used for building permission-aware UIs and + * command-line tools, not for authorization checking. This operation may "fail open" without + * warning. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   ResourceName resource = ProjectName.of("[PROJECT]");
+   *   List<String> permissions = new ArrayList<>();
+   *   TestIamPermissionsRequest request = TestIamPermissionsRequest.newBuilder()
+   *     .setResource(resource.toString())
+   *     .addAllPermissions(permissions)
+   *     .build();
+   *   TestIamPermissionsResponse response = secretManagerServiceClient.testIamPermissions(request);
+   * }
+   * 
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final TestIamPermissionsResponse testIamPermissions(TestIamPermissionsRequest request) { + return testIamPermissionsCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD + /** + * Returns permissions that a caller has for the specified secret. If the secret does not exist, + * this call returns an empty set of permissions, not a NOT_FOUND error. + * + *

Note: This operation is designed to be used for building permission-aware UIs and + * command-line tools, not for authorization checking. This operation may "fail open" without + * warning. + * + *

Sample code: + * + *


+   * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+   *   ResourceName resource = ProjectName.of("[PROJECT]");
+   *   List<String> permissions = new ArrayList<>();
+   *   TestIamPermissionsRequest request = TestIamPermissionsRequest.newBuilder()
+   *     .setResource(resource.toString())
+   *     .addAllPermissions(permissions)
+   *     .build();
+   *   ApiFuture<TestIamPermissionsResponse> future = secretManagerServiceClient.testIamPermissionsCallable().futureCall(request);
+   *   // Do something
+   *   TestIamPermissionsResponse response = future.get();
+   * }
+   * 
+ */ + public final UnaryCallable + testIamPermissionsCallable() { + return stub.testIamPermissionsCallable(); + } + + @Override + public final void close() { + stub.close(); + } + + @Override + public void shutdown() { + stub.shutdown(); + } + + @Override + public boolean isShutdown() { + return stub.isShutdown(); + } + + @Override + public boolean isTerminated() { + return stub.isTerminated(); + } + + @Override + public void shutdownNow() { + stub.shutdownNow(); + } + + @Override + public boolean awaitTermination(long duration, TimeUnit unit) throws InterruptedException { + return stub.awaitTermination(duration, unit); + } + + public static class ListSecretsPagedResponse + extends AbstractPagedListResponse< + ListSecretsRequest, + ListSecretsResponse, + Secret, + ListSecretsPage, + ListSecretsFixedSizeCollection> { + + public static ApiFuture createAsync( + PageContext context, + ApiFuture futureResponse) { + ApiFuture futurePage = + ListSecretsPage.createEmptyPage().createPageAsync(context, futureResponse); + return ApiFutures.transform( + futurePage, + new ApiFunction() { + @Override + public ListSecretsPagedResponse apply(ListSecretsPage input) { + return new ListSecretsPagedResponse(input); + } + }, + MoreExecutors.directExecutor()); + } + + private ListSecretsPagedResponse(ListSecretsPage page) { + super(page, ListSecretsFixedSizeCollection.createEmptyCollection()); + } + } + + public static class ListSecretsPage + extends AbstractPage { + + private ListSecretsPage( + PageContext context, + ListSecretsResponse response) { + super(context, response); + } + + private static ListSecretsPage createEmptyPage() { + return new ListSecretsPage(null, null); + } + + @Override + protected ListSecretsPage createPage( + PageContext context, + ListSecretsResponse response) { + return new ListSecretsPage(context, response); + } + + @Override + public ApiFuture createPageAsync( + PageContext context, + ApiFuture futureResponse) { + return super.createPageAsync(context, futureResponse); + } + } + + public static class ListSecretsFixedSizeCollection + extends AbstractFixedSizeCollection< + ListSecretsRequest, + ListSecretsResponse, + Secret, + ListSecretsPage, + ListSecretsFixedSizeCollection> { + + private ListSecretsFixedSizeCollection(List pages, int collectionSize) { + super(pages, collectionSize); + } + + private static ListSecretsFixedSizeCollection createEmptyCollection() { + return new ListSecretsFixedSizeCollection(null, 0); + } + + @Override + protected ListSecretsFixedSizeCollection createCollection( + List pages, int collectionSize) { + return new ListSecretsFixedSizeCollection(pages, collectionSize); + } + } + + public static class ListSecretVersionsPagedResponse + extends AbstractPagedListResponse< + ListSecretVersionsRequest, + ListSecretVersionsResponse, + SecretVersion, + ListSecretVersionsPage, + ListSecretVersionsFixedSizeCollection> { + + public static ApiFuture createAsync( + PageContext context, + ApiFuture futureResponse) { + ApiFuture futurePage = + ListSecretVersionsPage.createEmptyPage().createPageAsync(context, futureResponse); + return ApiFutures.transform( + futurePage, + new ApiFunction() { + @Override + public ListSecretVersionsPagedResponse apply(ListSecretVersionsPage input) { + return new ListSecretVersionsPagedResponse(input); + } + }, + MoreExecutors.directExecutor()); + } + + private ListSecretVersionsPagedResponse(ListSecretVersionsPage page) { + super(page, ListSecretVersionsFixedSizeCollection.createEmptyCollection()); + } + } + + public static class ListSecretVersionsPage + extends AbstractPage< + ListSecretVersionsRequest, + ListSecretVersionsResponse, + SecretVersion, + ListSecretVersionsPage> { + + private ListSecretVersionsPage( + PageContext context, + ListSecretVersionsResponse response) { + super(context, response); + } + + private static ListSecretVersionsPage createEmptyPage() { + return new ListSecretVersionsPage(null, null); + } + + @Override + protected ListSecretVersionsPage createPage( + PageContext context, + ListSecretVersionsResponse response) { + return new ListSecretVersionsPage(context, response); + } + + @Override + public ApiFuture createPageAsync( + PageContext context, + ApiFuture futureResponse) { + return super.createPageAsync(context, futureResponse); + } + } + + public static class ListSecretVersionsFixedSizeCollection + extends AbstractFixedSizeCollection< + ListSecretVersionsRequest, + ListSecretVersionsResponse, + SecretVersion, + ListSecretVersionsPage, + ListSecretVersionsFixedSizeCollection> { + + private ListSecretVersionsFixedSizeCollection( + List pages, int collectionSize) { + super(pages, collectionSize); + } + + private static ListSecretVersionsFixedSizeCollection createEmptyCollection() { + return new ListSecretVersionsFixedSizeCollection(null, 0); + } + + @Override + protected ListSecretVersionsFixedSizeCollection createCollection( + List pages, int collectionSize) { + return new ListSecretVersionsFixedSizeCollection(pages, collectionSize); + } + } +} diff --git a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceSettings.java b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceSettings.java new file mode 100644 index 00000000..4b4a3555 --- /dev/null +++ b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceSettings.java @@ -0,0 +1,362 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +package com.google.cloud.secretmanager.v1beta1; + +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretVersionsPagedResponse; +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretsPagedResponse; + +import com.google.api.core.ApiFunction; +import com.google.api.core.BetaApi; +import com.google.api.gax.core.GoogleCredentialsProvider; +import com.google.api.gax.core.InstantiatingExecutorProvider; +import com.google.api.gax.grpc.InstantiatingGrpcChannelProvider; +import com.google.api.gax.rpc.ApiClientHeaderProvider; +import com.google.api.gax.rpc.ClientContext; +import com.google.api.gax.rpc.ClientSettings; +import com.google.api.gax.rpc.PagedCallSettings; +import com.google.api.gax.rpc.TransportChannelProvider; +import com.google.api.gax.rpc.UnaryCallSettings; +import com.google.cloud.secretmanager.v1beta1.stub.SecretManagerServiceStubSettings; +import com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse; +import com.google.cloud.secrets.v1beta1.AddSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.CreateSecretRequest; +import com.google.cloud.secrets.v1beta1.DeleteSecretRequest; +import com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest; +import com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.GetSecretRequest; +import com.google.cloud.secrets.v1beta1.GetSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest; +import com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse; +import com.google.cloud.secrets.v1beta1.ListSecretsRequest; +import com.google.cloud.secrets.v1beta1.ListSecretsResponse; +import com.google.cloud.secrets.v1beta1.Secret; +import com.google.cloud.secrets.v1beta1.SecretVersion; +import com.google.cloud.secrets.v1beta1.UpdateSecretRequest; +import com.google.iam.v1.GetIamPolicyRequest; +import com.google.iam.v1.Policy; +import com.google.iam.v1.SetIamPolicyRequest; +import com.google.iam.v1.TestIamPermissionsRequest; +import com.google.iam.v1.TestIamPermissionsResponse; +import com.google.protobuf.Empty; +import java.io.IOException; +import java.util.List; +import javax.annotation.Generated; + +// AUTO-GENERATED DOCUMENTATION AND CLASS +/** + * Settings class to configure an instance of {@link SecretManagerServiceClient}. + * + *

The default instance has everything set to sensible defaults: + * + *

    + *
  • The default service address (secretmanager.googleapis.com) and default port (443) are used. + *
  • Credentials are acquired automatically through Application Default Credentials. + *
  • Retries are configured for idempotent methods but not for non-idempotent methods. + *
+ * + *

The builder of this class is recursive, so contained classes are themselves builders. When + * build() is called, the tree of builders is called to create the complete settings object. + * + *

For example, to set the total timeout of createSecret to 30 seconds: + * + *

+ * 
+ * SecretManagerServiceSettings.Builder secretManagerServiceSettingsBuilder =
+ *     SecretManagerServiceSettings.newBuilder();
+ * secretManagerServiceSettingsBuilder.createSecretSettings().getRetrySettings().toBuilder()
+ *     .setTotalTimeout(Duration.ofSeconds(30));
+ * SecretManagerServiceSettings secretManagerServiceSettings = secretManagerServiceSettingsBuilder.build();
+ * 
+ * 
+ */ +@Generated("by gapic-generator") +@BetaApi +public class SecretManagerServiceSettings extends ClientSettings { + /** Returns the object with the settings used for calls to listSecrets. */ + public PagedCallSettings + listSecretsSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).listSecretsSettings(); + } + + /** Returns the object with the settings used for calls to createSecret. */ + public UnaryCallSettings createSecretSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).createSecretSettings(); + } + + /** Returns the object with the settings used for calls to addSecretVersion. */ + public UnaryCallSettings addSecretVersionSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).addSecretVersionSettings(); + } + + /** Returns the object with the settings used for calls to getSecret. */ + public UnaryCallSettings getSecretSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).getSecretSettings(); + } + + /** Returns the object with the settings used for calls to updateSecret. */ + public UnaryCallSettings updateSecretSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).updateSecretSettings(); + } + + /** Returns the object with the settings used for calls to deleteSecret. */ + public UnaryCallSettings deleteSecretSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).deleteSecretSettings(); + } + + /** Returns the object with the settings used for calls to listSecretVersions. */ + public PagedCallSettings< + ListSecretVersionsRequest, ListSecretVersionsResponse, ListSecretVersionsPagedResponse> + listSecretVersionsSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).listSecretVersionsSettings(); + } + + /** Returns the object with the settings used for calls to getSecretVersion. */ + public UnaryCallSettings getSecretVersionSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).getSecretVersionSettings(); + } + + /** Returns the object with the settings used for calls to accessSecretVersion. */ + public UnaryCallSettings + accessSecretVersionSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).accessSecretVersionSettings(); + } + + /** Returns the object with the settings used for calls to disableSecretVersion. */ + public UnaryCallSettings + disableSecretVersionSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).disableSecretVersionSettings(); + } + + /** Returns the object with the settings used for calls to enableSecretVersion. */ + public UnaryCallSettings + enableSecretVersionSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).enableSecretVersionSettings(); + } + + /** Returns the object with the settings used for calls to destroySecretVersion. */ + public UnaryCallSettings + destroySecretVersionSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).destroySecretVersionSettings(); + } + + /** Returns the object with the settings used for calls to setIamPolicy. */ + public UnaryCallSettings setIamPolicySettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).setIamPolicySettings(); + } + + /** Returns the object with the settings used for calls to getIamPolicy. */ + public UnaryCallSettings getIamPolicySettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).getIamPolicySettings(); + } + + /** Returns the object with the settings used for calls to testIamPermissions. */ + public UnaryCallSettings + testIamPermissionsSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).testIamPermissionsSettings(); + } + + public static final SecretManagerServiceSettings create(SecretManagerServiceStubSettings stub) + throws IOException { + return new SecretManagerServiceSettings.Builder(stub.toBuilder()).build(); + } + + /** Returns a builder for the default ExecutorProvider for this service. */ + public static InstantiatingExecutorProvider.Builder defaultExecutorProviderBuilder() { + return SecretManagerServiceStubSettings.defaultExecutorProviderBuilder(); + } + + /** Returns the default service endpoint. */ + public static String getDefaultEndpoint() { + return SecretManagerServiceStubSettings.getDefaultEndpoint(); + } + + /** Returns the default service scopes. */ + public static List getDefaultServiceScopes() { + return SecretManagerServiceStubSettings.getDefaultServiceScopes(); + } + + /** Returns a builder for the default credentials for this service. */ + public static GoogleCredentialsProvider.Builder defaultCredentialsProviderBuilder() { + return SecretManagerServiceStubSettings.defaultCredentialsProviderBuilder(); + } + + /** Returns a builder for the default ChannelProvider for this service. */ + public static InstantiatingGrpcChannelProvider.Builder defaultGrpcTransportProviderBuilder() { + return SecretManagerServiceStubSettings.defaultGrpcTransportProviderBuilder(); + } + + public static TransportChannelProvider defaultTransportChannelProvider() { + return SecretManagerServiceStubSettings.defaultTransportChannelProvider(); + } + + @BetaApi("The surface for customizing headers is not stable yet and may change in the future.") + public static ApiClientHeaderProvider.Builder defaultApiClientHeaderProviderBuilder() { + return SecretManagerServiceStubSettings.defaultApiClientHeaderProviderBuilder(); + } + + /** Returns a new builder for this class. */ + public static Builder newBuilder() { + return Builder.createDefault(); + } + + /** Returns a new builder for this class. */ + public static Builder newBuilder(ClientContext clientContext) { + return new Builder(clientContext); + } + + /** Returns a builder containing all the values of this settings class. */ + public Builder toBuilder() { + return new Builder(this); + } + + protected SecretManagerServiceSettings(Builder settingsBuilder) throws IOException { + super(settingsBuilder); + } + + /** Builder for SecretManagerServiceSettings. */ + public static class Builder + extends ClientSettings.Builder { + protected Builder() throws IOException { + this((ClientContext) null); + } + + protected Builder(ClientContext clientContext) { + super(SecretManagerServiceStubSettings.newBuilder(clientContext)); + } + + private static Builder createDefault() { + return new Builder(SecretManagerServiceStubSettings.newBuilder()); + } + + protected Builder(SecretManagerServiceSettings settings) { + super(settings.getStubSettings().toBuilder()); + } + + protected Builder(SecretManagerServiceStubSettings.Builder stubSettings) { + super(stubSettings); + } + + public SecretManagerServiceStubSettings.Builder getStubSettingsBuilder() { + return ((SecretManagerServiceStubSettings.Builder) getStubSettings()); + } + + // NEXT_MAJOR_VER: remove 'throws Exception' + /** + * Applies the given settings updater function to all of the unary API methods in this service. + * + *

Note: This method does not support applying settings to streaming methods. + */ + public Builder applyToAllUnaryMethods( + ApiFunction, Void> settingsUpdater) throws Exception { + super.applyToAllUnaryMethods( + getStubSettingsBuilder().unaryMethodSettingsBuilders(), settingsUpdater); + return this; + } + + /** Returns the builder for the settings used for calls to listSecrets. */ + public PagedCallSettings.Builder< + ListSecretsRequest, ListSecretsResponse, ListSecretsPagedResponse> + listSecretsSettings() { + return getStubSettingsBuilder().listSecretsSettings(); + } + + /** Returns the builder for the settings used for calls to createSecret. */ + public UnaryCallSettings.Builder createSecretSettings() { + return getStubSettingsBuilder().createSecretSettings(); + } + + /** Returns the builder for the settings used for calls to addSecretVersion. */ + public UnaryCallSettings.Builder + addSecretVersionSettings() { + return getStubSettingsBuilder().addSecretVersionSettings(); + } + + /** Returns the builder for the settings used for calls to getSecret. */ + public UnaryCallSettings.Builder getSecretSettings() { + return getStubSettingsBuilder().getSecretSettings(); + } + + /** Returns the builder for the settings used for calls to updateSecret. */ + public UnaryCallSettings.Builder updateSecretSettings() { + return getStubSettingsBuilder().updateSecretSettings(); + } + + /** Returns the builder for the settings used for calls to deleteSecret. */ + public UnaryCallSettings.Builder deleteSecretSettings() { + return getStubSettingsBuilder().deleteSecretSettings(); + } + + /** Returns the builder for the settings used for calls to listSecretVersions. */ + public PagedCallSettings.Builder< + ListSecretVersionsRequest, ListSecretVersionsResponse, ListSecretVersionsPagedResponse> + listSecretVersionsSettings() { + return getStubSettingsBuilder().listSecretVersionsSettings(); + } + + /** Returns the builder for the settings used for calls to getSecretVersion. */ + public UnaryCallSettings.Builder + getSecretVersionSettings() { + return getStubSettingsBuilder().getSecretVersionSettings(); + } + + /** Returns the builder for the settings used for calls to accessSecretVersion. */ + public UnaryCallSettings.Builder + accessSecretVersionSettings() { + return getStubSettingsBuilder().accessSecretVersionSettings(); + } + + /** Returns the builder for the settings used for calls to disableSecretVersion. */ + public UnaryCallSettings.Builder + disableSecretVersionSettings() { + return getStubSettingsBuilder().disableSecretVersionSettings(); + } + + /** Returns the builder for the settings used for calls to enableSecretVersion. */ + public UnaryCallSettings.Builder + enableSecretVersionSettings() { + return getStubSettingsBuilder().enableSecretVersionSettings(); + } + + /** Returns the builder for the settings used for calls to destroySecretVersion. */ + public UnaryCallSettings.Builder + destroySecretVersionSettings() { + return getStubSettingsBuilder().destroySecretVersionSettings(); + } + + /** Returns the builder for the settings used for calls to setIamPolicy. */ + public UnaryCallSettings.Builder setIamPolicySettings() { + return getStubSettingsBuilder().setIamPolicySettings(); + } + + /** Returns the builder for the settings used for calls to getIamPolicy. */ + public UnaryCallSettings.Builder getIamPolicySettings() { + return getStubSettingsBuilder().getIamPolicySettings(); + } + + /** Returns the builder for the settings used for calls to testIamPermissions. */ + public UnaryCallSettings.Builder + testIamPermissionsSettings() { + return getStubSettingsBuilder().testIamPermissionsSettings(); + } + + @Override + public SecretManagerServiceSettings build() throws IOException { + return new SecretManagerServiceSettings(this); + } + } +} diff --git a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/package-info.java b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/package-info.java new file mode 100644 index 00000000..a7e3506e --- /dev/null +++ b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/package-info.java @@ -0,0 +1,48 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +/** + * A client to Secret Manager API. + * + *

The interfaces provided are listed below, along with usage samples. + * + *

========================== SecretManagerServiceClient ========================== + * + *

Service Description: Secret Manager Service + * + *

Manages secrets and operations using those secrets. Implements a REST model with the following + * objects: + * + *

* [Secret][google.cloud.secrets.v1beta1.Secret] * + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] + * + *

Sample for SecretManagerServiceClient: + * + *

+ * 
+ * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) {
+ *   ProjectName parent = ProjectName.of("[PROJECT]");
+ *   String secretId = "";
+ *   Secret secret = Secret.newBuilder().build();
+ *   Secret response = secretManagerServiceClient.createSecret(parent, secretId, secret);
+ * }
+ * 
+ * 
+ */ +@Generated("by gapic-generator") +package com.google.cloud.secretmanager.v1beta1; + +import javax.annotation.Generated; diff --git a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/GrpcSecretManagerServiceCallableFactory.java b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/GrpcSecretManagerServiceCallableFactory.java new file mode 100644 index 00000000..1e900675 --- /dev/null +++ b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/GrpcSecretManagerServiceCallableFactory.java @@ -0,0 +1,115 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +package com.google.cloud.secretmanager.v1beta1.stub; + +import com.google.api.core.BetaApi; +import com.google.api.gax.grpc.GrpcCallSettings; +import com.google.api.gax.grpc.GrpcCallableFactory; +import com.google.api.gax.grpc.GrpcStubCallableFactory; +import com.google.api.gax.rpc.BatchingCallSettings; +import com.google.api.gax.rpc.BidiStreamingCallable; +import com.google.api.gax.rpc.ClientContext; +import com.google.api.gax.rpc.ClientStreamingCallable; +import com.google.api.gax.rpc.OperationCallSettings; +import com.google.api.gax.rpc.OperationCallable; +import com.google.api.gax.rpc.PagedCallSettings; +import com.google.api.gax.rpc.ServerStreamingCallSettings; +import com.google.api.gax.rpc.ServerStreamingCallable; +import com.google.api.gax.rpc.StreamingCallSettings; +import com.google.api.gax.rpc.UnaryCallSettings; +import com.google.api.gax.rpc.UnaryCallable; +import com.google.longrunning.stub.OperationsStub; +import javax.annotation.Generated; + +// AUTO-GENERATED DOCUMENTATION AND CLASS +/** + * gRPC callable factory implementation for Secret Manager API. + * + *

This class is for advanced usage. + */ +@Generated("by gapic-generator") +@BetaApi("The surface for use by generated code is not stable yet and may change in the future.") +public class GrpcSecretManagerServiceCallableFactory implements GrpcStubCallableFactory { + @Override + public UnaryCallable createUnaryCallable( + GrpcCallSettings grpcCallSettings, + UnaryCallSettings callSettings, + ClientContext clientContext) { + return GrpcCallableFactory.createUnaryCallable(grpcCallSettings, callSettings, clientContext); + } + + @Override + public + UnaryCallable createPagedCallable( + GrpcCallSettings grpcCallSettings, + PagedCallSettings pagedCallSettings, + ClientContext clientContext) { + return GrpcCallableFactory.createPagedCallable( + grpcCallSettings, pagedCallSettings, clientContext); + } + + @Override + public UnaryCallable createBatchingCallable( + GrpcCallSettings grpcCallSettings, + BatchingCallSettings batchingCallSettings, + ClientContext clientContext) { + return GrpcCallableFactory.createBatchingCallable( + grpcCallSettings, batchingCallSettings, clientContext); + } + + @BetaApi( + "The surface for long-running operations is not stable yet and may change in the future.") + @Override + public + OperationCallable createOperationCallable( + GrpcCallSettings grpcCallSettings, + OperationCallSettings operationCallSettings, + ClientContext clientContext, + OperationsStub operationsStub) { + return GrpcCallableFactory.createOperationCallable( + grpcCallSettings, operationCallSettings, clientContext, operationsStub); + } + + @Override + public + BidiStreamingCallable createBidiStreamingCallable( + GrpcCallSettings grpcCallSettings, + StreamingCallSettings streamingCallSettings, + ClientContext clientContext) { + return GrpcCallableFactory.createBidiStreamingCallable( + grpcCallSettings, streamingCallSettings, clientContext); + } + + @Override + public + ServerStreamingCallable createServerStreamingCallable( + GrpcCallSettings grpcCallSettings, + ServerStreamingCallSettings streamingCallSettings, + ClientContext clientContext) { + return GrpcCallableFactory.createServerStreamingCallable( + grpcCallSettings, streamingCallSettings, clientContext); + } + + @Override + public + ClientStreamingCallable createClientStreamingCallable( + GrpcCallSettings grpcCallSettings, + StreamingCallSettings streamingCallSettings, + ClientContext clientContext) { + return GrpcCallableFactory.createClientStreamingCallable( + grpcCallSettings, streamingCallSettings, clientContext); + } +} diff --git a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/GrpcSecretManagerServiceStub.java b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/GrpcSecretManagerServiceStub.java new file mode 100644 index 00000000..15fb1b4b --- /dev/null +++ b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/GrpcSecretManagerServiceStub.java @@ -0,0 +1,646 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +package com.google.cloud.secretmanager.v1beta1.stub; + +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretVersionsPagedResponse; +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretsPagedResponse; + +import com.google.api.core.BetaApi; +import com.google.api.gax.core.BackgroundResource; +import com.google.api.gax.core.BackgroundResourceAggregation; +import com.google.api.gax.grpc.GrpcCallSettings; +import com.google.api.gax.grpc.GrpcStubCallableFactory; +import com.google.api.gax.rpc.ClientContext; +import com.google.api.gax.rpc.RequestParamsExtractor; +import com.google.api.gax.rpc.UnaryCallable; +import com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse; +import com.google.cloud.secrets.v1beta1.AddSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.CreateSecretRequest; +import com.google.cloud.secrets.v1beta1.DeleteSecretRequest; +import com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest; +import com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.GetSecretRequest; +import com.google.cloud.secrets.v1beta1.GetSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest; +import com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse; +import com.google.cloud.secrets.v1beta1.ListSecretsRequest; +import com.google.cloud.secrets.v1beta1.ListSecretsResponse; +import com.google.cloud.secrets.v1beta1.Secret; +import com.google.cloud.secrets.v1beta1.SecretVersion; +import com.google.cloud.secrets.v1beta1.UpdateSecretRequest; +import com.google.common.collect.ImmutableMap; +import com.google.iam.v1.GetIamPolicyRequest; +import com.google.iam.v1.Policy; +import com.google.iam.v1.SetIamPolicyRequest; +import com.google.iam.v1.TestIamPermissionsRequest; +import com.google.iam.v1.TestIamPermissionsResponse; +import com.google.protobuf.Empty; +import io.grpc.MethodDescriptor; +import io.grpc.protobuf.ProtoUtils; +import java.io.IOException; +import java.util.Map; +import java.util.concurrent.TimeUnit; +import javax.annotation.Generated; + +// AUTO-GENERATED DOCUMENTATION AND CLASS +/** + * gRPC stub implementation for Secret Manager API. + * + *

This class is for advanced usage and reflects the underlying API directly. + */ +@Generated("by gapic-generator") +@BetaApi("A restructuring of stub classes is planned, so this may break in the future") +public class GrpcSecretManagerServiceStub extends SecretManagerServiceStub { + + private static final MethodDescriptor + listSecretsMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName("google.cloud.secrets.v1beta1.SecretManagerService/ListSecrets") + .setRequestMarshaller(ProtoUtils.marshaller(ListSecretsRequest.getDefaultInstance())) + .setResponseMarshaller( + ProtoUtils.marshaller(ListSecretsResponse.getDefaultInstance())) + .build(); + private static final MethodDescriptor createSecretMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName("google.cloud.secrets.v1beta1.SecretManagerService/CreateSecret") + .setRequestMarshaller(ProtoUtils.marshaller(CreateSecretRequest.getDefaultInstance())) + .setResponseMarshaller(ProtoUtils.marshaller(Secret.getDefaultInstance())) + .build(); + private static final MethodDescriptor + addSecretVersionMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/AddSecretVersion") + .setRequestMarshaller( + ProtoUtils.marshaller(AddSecretVersionRequest.getDefaultInstance())) + .setResponseMarshaller(ProtoUtils.marshaller(SecretVersion.getDefaultInstance())) + .build(); + private static final MethodDescriptor getSecretMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName("google.cloud.secrets.v1beta1.SecretManagerService/GetSecret") + .setRequestMarshaller(ProtoUtils.marshaller(GetSecretRequest.getDefaultInstance())) + .setResponseMarshaller(ProtoUtils.marshaller(Secret.getDefaultInstance())) + .build(); + private static final MethodDescriptor updateSecretMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName("google.cloud.secrets.v1beta1.SecretManagerService/UpdateSecret") + .setRequestMarshaller(ProtoUtils.marshaller(UpdateSecretRequest.getDefaultInstance())) + .setResponseMarshaller(ProtoUtils.marshaller(Secret.getDefaultInstance())) + .build(); + private static final MethodDescriptor deleteSecretMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName("google.cloud.secrets.v1beta1.SecretManagerService/DeleteSecret") + .setRequestMarshaller(ProtoUtils.marshaller(DeleteSecretRequest.getDefaultInstance())) + .setResponseMarshaller(ProtoUtils.marshaller(Empty.getDefaultInstance())) + .build(); + private static final MethodDescriptor + listSecretVersionsMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/ListSecretVersions") + .setRequestMarshaller( + ProtoUtils.marshaller(ListSecretVersionsRequest.getDefaultInstance())) + .setResponseMarshaller( + ProtoUtils.marshaller(ListSecretVersionsResponse.getDefaultInstance())) + .build(); + private static final MethodDescriptor + getSecretVersionMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/GetSecretVersion") + .setRequestMarshaller( + ProtoUtils.marshaller(GetSecretVersionRequest.getDefaultInstance())) + .setResponseMarshaller(ProtoUtils.marshaller(SecretVersion.getDefaultInstance())) + .build(); + private static final MethodDescriptor + accessSecretVersionMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/AccessSecretVersion") + .setRequestMarshaller( + ProtoUtils.marshaller(AccessSecretVersionRequest.getDefaultInstance())) + .setResponseMarshaller( + ProtoUtils.marshaller(AccessSecretVersionResponse.getDefaultInstance())) + .build(); + private static final MethodDescriptor + disableSecretVersionMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/DisableSecretVersion") + .setRequestMarshaller( + ProtoUtils.marshaller(DisableSecretVersionRequest.getDefaultInstance())) + .setResponseMarshaller(ProtoUtils.marshaller(SecretVersion.getDefaultInstance())) + .build(); + private static final MethodDescriptor + enableSecretVersionMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/EnableSecretVersion") + .setRequestMarshaller( + ProtoUtils.marshaller(EnableSecretVersionRequest.getDefaultInstance())) + .setResponseMarshaller(ProtoUtils.marshaller(SecretVersion.getDefaultInstance())) + .build(); + private static final MethodDescriptor + destroySecretVersionMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/DestroySecretVersion") + .setRequestMarshaller( + ProtoUtils.marshaller(DestroySecretVersionRequest.getDefaultInstance())) + .setResponseMarshaller(ProtoUtils.marshaller(SecretVersion.getDefaultInstance())) + .build(); + private static final MethodDescriptor setIamPolicyMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName("google.cloud.secrets.v1beta1.SecretManagerService/SetIamPolicy") + .setRequestMarshaller(ProtoUtils.marshaller(SetIamPolicyRequest.getDefaultInstance())) + .setResponseMarshaller(ProtoUtils.marshaller(Policy.getDefaultInstance())) + .build(); + private static final MethodDescriptor getIamPolicyMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName("google.cloud.secrets.v1beta1.SecretManagerService/GetIamPolicy") + .setRequestMarshaller(ProtoUtils.marshaller(GetIamPolicyRequest.getDefaultInstance())) + .setResponseMarshaller(ProtoUtils.marshaller(Policy.getDefaultInstance())) + .build(); + private static final MethodDescriptor + testIamPermissionsMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/TestIamPermissions") + .setRequestMarshaller( + ProtoUtils.marshaller(TestIamPermissionsRequest.getDefaultInstance())) + .setResponseMarshaller( + ProtoUtils.marshaller(TestIamPermissionsResponse.getDefaultInstance())) + .build(); + + private final BackgroundResource backgroundResources; + + private final UnaryCallable listSecretsCallable; + private final UnaryCallable + listSecretsPagedCallable; + private final UnaryCallable createSecretCallable; + private final UnaryCallable addSecretVersionCallable; + private final UnaryCallable getSecretCallable; + private final UnaryCallable updateSecretCallable; + private final UnaryCallable deleteSecretCallable; + private final UnaryCallable + listSecretVersionsCallable; + private final UnaryCallable + listSecretVersionsPagedCallable; + private final UnaryCallable getSecretVersionCallable; + private final UnaryCallable + accessSecretVersionCallable; + private final UnaryCallable + disableSecretVersionCallable; + private final UnaryCallable + enableSecretVersionCallable; + private final UnaryCallable + destroySecretVersionCallable; + private final UnaryCallable setIamPolicyCallable; + private final UnaryCallable getIamPolicyCallable; + private final UnaryCallable + testIamPermissionsCallable; + + private final GrpcStubCallableFactory callableFactory; + + public static final GrpcSecretManagerServiceStub create(SecretManagerServiceStubSettings settings) + throws IOException { + return new GrpcSecretManagerServiceStub(settings, ClientContext.create(settings)); + } + + public static final GrpcSecretManagerServiceStub create(ClientContext clientContext) + throws IOException { + return new GrpcSecretManagerServiceStub( + SecretManagerServiceStubSettings.newBuilder().build(), clientContext); + } + + public static final GrpcSecretManagerServiceStub create( + ClientContext clientContext, GrpcStubCallableFactory callableFactory) throws IOException { + return new GrpcSecretManagerServiceStub( + SecretManagerServiceStubSettings.newBuilder().build(), clientContext, callableFactory); + } + + /** + * Constructs an instance of GrpcSecretManagerServiceStub, using the given settings. This is + * protected so that it is easy to make a subclass, but otherwise, the static factory methods + * should be preferred. + */ + protected GrpcSecretManagerServiceStub( + SecretManagerServiceStubSettings settings, ClientContext clientContext) throws IOException { + this(settings, clientContext, new GrpcSecretManagerServiceCallableFactory()); + } + + /** + * Constructs an instance of GrpcSecretManagerServiceStub, using the given settings. This is + * protected so that it is easy to make a subclass, but otherwise, the static factory methods + * should be preferred. + */ + protected GrpcSecretManagerServiceStub( + SecretManagerServiceStubSettings settings, + ClientContext clientContext, + GrpcStubCallableFactory callableFactory) + throws IOException { + this.callableFactory = callableFactory; + + GrpcCallSettings listSecretsTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(listSecretsMethodDescriptor) + .setParamsExtractor( + new RequestParamsExtractor() { + @Override + public Map extract(ListSecretsRequest request) { + ImmutableMap.Builder params = ImmutableMap.builder(); + params.put("parent", String.valueOf(request.getParent())); + return params.build(); + } + }) + .build(); + GrpcCallSettings createSecretTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(createSecretMethodDescriptor) + .setParamsExtractor( + new RequestParamsExtractor() { + @Override + public Map extract(CreateSecretRequest request) { + ImmutableMap.Builder params = ImmutableMap.builder(); + params.put("parent", String.valueOf(request.getParent())); + return params.build(); + } + }) + .build(); + GrpcCallSettings addSecretVersionTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(addSecretVersionMethodDescriptor) + .setParamsExtractor( + new RequestParamsExtractor() { + @Override + public Map extract(AddSecretVersionRequest request) { + ImmutableMap.Builder params = ImmutableMap.builder(); + params.put("parent", String.valueOf(request.getParent())); + return params.build(); + } + }) + .build(); + GrpcCallSettings getSecretTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(getSecretMethodDescriptor) + .setParamsExtractor( + new RequestParamsExtractor() { + @Override + public Map extract(GetSecretRequest request) { + ImmutableMap.Builder params = ImmutableMap.builder(); + params.put("name", String.valueOf(request.getName())); + return params.build(); + } + }) + .build(); + GrpcCallSettings updateSecretTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(updateSecretMethodDescriptor) + .setParamsExtractor( + new RequestParamsExtractor() { + @Override + public Map extract(UpdateSecretRequest request) { + ImmutableMap.Builder params = ImmutableMap.builder(); + params.put("secret.name", String.valueOf(request.getSecret().getName())); + return params.build(); + } + }) + .build(); + GrpcCallSettings deleteSecretTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(deleteSecretMethodDescriptor) + .setParamsExtractor( + new RequestParamsExtractor() { + @Override + public Map extract(DeleteSecretRequest request) { + ImmutableMap.Builder params = ImmutableMap.builder(); + params.put("name", String.valueOf(request.getName())); + return params.build(); + } + }) + .build(); + GrpcCallSettings + listSecretVersionsTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(listSecretVersionsMethodDescriptor) + .setParamsExtractor( + new RequestParamsExtractor() { + @Override + public Map extract(ListSecretVersionsRequest request) { + ImmutableMap.Builder params = ImmutableMap.builder(); + params.put("parent", String.valueOf(request.getParent())); + return params.build(); + } + }) + .build(); + GrpcCallSettings getSecretVersionTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(getSecretVersionMethodDescriptor) + .setParamsExtractor( + new RequestParamsExtractor() { + @Override + public Map extract(GetSecretVersionRequest request) { + ImmutableMap.Builder params = ImmutableMap.builder(); + params.put("name", String.valueOf(request.getName())); + return params.build(); + } + }) + .build(); + GrpcCallSettings + accessSecretVersionTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(accessSecretVersionMethodDescriptor) + .setParamsExtractor( + new RequestParamsExtractor() { + @Override + public Map extract(AccessSecretVersionRequest request) { + ImmutableMap.Builder params = ImmutableMap.builder(); + params.put("name", String.valueOf(request.getName())); + return params.build(); + } + }) + .build(); + GrpcCallSettings + disableSecretVersionTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(disableSecretVersionMethodDescriptor) + .setParamsExtractor( + new RequestParamsExtractor() { + @Override + public Map extract(DisableSecretVersionRequest request) { + ImmutableMap.Builder params = ImmutableMap.builder(); + params.put("name", String.valueOf(request.getName())); + return params.build(); + } + }) + .build(); + GrpcCallSettings + enableSecretVersionTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(enableSecretVersionMethodDescriptor) + .setParamsExtractor( + new RequestParamsExtractor() { + @Override + public Map extract(EnableSecretVersionRequest request) { + ImmutableMap.Builder params = ImmutableMap.builder(); + params.put("name", String.valueOf(request.getName())); + return params.build(); + } + }) + .build(); + GrpcCallSettings + destroySecretVersionTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(destroySecretVersionMethodDescriptor) + .setParamsExtractor( + new RequestParamsExtractor() { + @Override + public Map extract(DestroySecretVersionRequest request) { + ImmutableMap.Builder params = ImmutableMap.builder(); + params.put("name", String.valueOf(request.getName())); + return params.build(); + } + }) + .build(); + GrpcCallSettings setIamPolicyTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(setIamPolicyMethodDescriptor) + .setParamsExtractor( + new RequestParamsExtractor() { + @Override + public Map extract(SetIamPolicyRequest request) { + ImmutableMap.Builder params = ImmutableMap.builder(); + params.put("resource", String.valueOf(request.getResource())); + return params.build(); + } + }) + .build(); + GrpcCallSettings getIamPolicyTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(getIamPolicyMethodDescriptor) + .setParamsExtractor( + new RequestParamsExtractor() { + @Override + public Map extract(GetIamPolicyRequest request) { + ImmutableMap.Builder params = ImmutableMap.builder(); + params.put("resource", String.valueOf(request.getResource())); + return params.build(); + } + }) + .build(); + GrpcCallSettings + testIamPermissionsTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(testIamPermissionsMethodDescriptor) + .setParamsExtractor( + new RequestParamsExtractor() { + @Override + public Map extract(TestIamPermissionsRequest request) { + ImmutableMap.Builder params = ImmutableMap.builder(); + params.put("resource", String.valueOf(request.getResource())); + return params.build(); + } + }) + .build(); + + this.listSecretsCallable = + callableFactory.createUnaryCallable( + listSecretsTransportSettings, settings.listSecretsSettings(), clientContext); + this.listSecretsPagedCallable = + callableFactory.createPagedCallable( + listSecretsTransportSettings, settings.listSecretsSettings(), clientContext); + this.createSecretCallable = + callableFactory.createUnaryCallable( + createSecretTransportSettings, settings.createSecretSettings(), clientContext); + this.addSecretVersionCallable = + callableFactory.createUnaryCallable( + addSecretVersionTransportSettings, settings.addSecretVersionSettings(), clientContext); + this.getSecretCallable = + callableFactory.createUnaryCallable( + getSecretTransportSettings, settings.getSecretSettings(), clientContext); + this.updateSecretCallable = + callableFactory.createUnaryCallable( + updateSecretTransportSettings, settings.updateSecretSettings(), clientContext); + this.deleteSecretCallable = + callableFactory.createUnaryCallable( + deleteSecretTransportSettings, settings.deleteSecretSettings(), clientContext); + this.listSecretVersionsCallable = + callableFactory.createUnaryCallable( + listSecretVersionsTransportSettings, + settings.listSecretVersionsSettings(), + clientContext); + this.listSecretVersionsPagedCallable = + callableFactory.createPagedCallable( + listSecretVersionsTransportSettings, + settings.listSecretVersionsSettings(), + clientContext); + this.getSecretVersionCallable = + callableFactory.createUnaryCallable( + getSecretVersionTransportSettings, settings.getSecretVersionSettings(), clientContext); + this.accessSecretVersionCallable = + callableFactory.createUnaryCallable( + accessSecretVersionTransportSettings, + settings.accessSecretVersionSettings(), + clientContext); + this.disableSecretVersionCallable = + callableFactory.createUnaryCallable( + disableSecretVersionTransportSettings, + settings.disableSecretVersionSettings(), + clientContext); + this.enableSecretVersionCallable = + callableFactory.createUnaryCallable( + enableSecretVersionTransportSettings, + settings.enableSecretVersionSettings(), + clientContext); + this.destroySecretVersionCallable = + callableFactory.createUnaryCallable( + destroySecretVersionTransportSettings, + settings.destroySecretVersionSettings(), + clientContext); + this.setIamPolicyCallable = + callableFactory.createUnaryCallable( + setIamPolicyTransportSettings, settings.setIamPolicySettings(), clientContext); + this.getIamPolicyCallable = + callableFactory.createUnaryCallable( + getIamPolicyTransportSettings, settings.getIamPolicySettings(), clientContext); + this.testIamPermissionsCallable = + callableFactory.createUnaryCallable( + testIamPermissionsTransportSettings, + settings.testIamPermissionsSettings(), + clientContext); + + backgroundResources = new BackgroundResourceAggregation(clientContext.getBackgroundResources()); + } + + public UnaryCallable listSecretsPagedCallable() { + return listSecretsPagedCallable; + } + + public UnaryCallable listSecretsCallable() { + return listSecretsCallable; + } + + public UnaryCallable createSecretCallable() { + return createSecretCallable; + } + + public UnaryCallable addSecretVersionCallable() { + return addSecretVersionCallable; + } + + public UnaryCallable getSecretCallable() { + return getSecretCallable; + } + + public UnaryCallable updateSecretCallable() { + return updateSecretCallable; + } + + public UnaryCallable deleteSecretCallable() { + return deleteSecretCallable; + } + + public UnaryCallable + listSecretVersionsPagedCallable() { + return listSecretVersionsPagedCallable; + } + + public UnaryCallable + listSecretVersionsCallable() { + return listSecretVersionsCallable; + } + + public UnaryCallable getSecretVersionCallable() { + return getSecretVersionCallable; + } + + public UnaryCallable + accessSecretVersionCallable() { + return accessSecretVersionCallable; + } + + public UnaryCallable disableSecretVersionCallable() { + return disableSecretVersionCallable; + } + + public UnaryCallable enableSecretVersionCallable() { + return enableSecretVersionCallable; + } + + public UnaryCallable destroySecretVersionCallable() { + return destroySecretVersionCallable; + } + + public UnaryCallable setIamPolicyCallable() { + return setIamPolicyCallable; + } + + public UnaryCallable getIamPolicyCallable() { + return getIamPolicyCallable; + } + + public UnaryCallable + testIamPermissionsCallable() { + return testIamPermissionsCallable; + } + + @Override + public final void close() { + shutdown(); + } + + @Override + public void shutdown() { + backgroundResources.shutdown(); + } + + @Override + public boolean isShutdown() { + return backgroundResources.isShutdown(); + } + + @Override + public boolean isTerminated() { + return backgroundResources.isTerminated(); + } + + @Override + public void shutdownNow() { + backgroundResources.shutdownNow(); + } + + @Override + public boolean awaitTermination(long duration, TimeUnit unit) throws InterruptedException { + return backgroundResources.awaitTermination(duration, unit); + } +} diff --git a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/SecretManagerServiceStub.java b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/SecretManagerServiceStub.java new file mode 100644 index 00000000..fa622bc0 --- /dev/null +++ b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/SecretManagerServiceStub.java @@ -0,0 +1,133 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +package com.google.cloud.secretmanager.v1beta1.stub; + +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretVersionsPagedResponse; +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretsPagedResponse; + +import com.google.api.core.BetaApi; +import com.google.api.gax.core.BackgroundResource; +import com.google.api.gax.rpc.UnaryCallable; +import com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse; +import com.google.cloud.secrets.v1beta1.AddSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.CreateSecretRequest; +import com.google.cloud.secrets.v1beta1.DeleteSecretRequest; +import com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest; +import com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.GetSecretRequest; +import com.google.cloud.secrets.v1beta1.GetSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest; +import com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse; +import com.google.cloud.secrets.v1beta1.ListSecretsRequest; +import com.google.cloud.secrets.v1beta1.ListSecretsResponse; +import com.google.cloud.secrets.v1beta1.Secret; +import com.google.cloud.secrets.v1beta1.SecretVersion; +import com.google.cloud.secrets.v1beta1.UpdateSecretRequest; +import com.google.iam.v1.GetIamPolicyRequest; +import com.google.iam.v1.Policy; +import com.google.iam.v1.SetIamPolicyRequest; +import com.google.iam.v1.TestIamPermissionsRequest; +import com.google.iam.v1.TestIamPermissionsResponse; +import com.google.protobuf.Empty; +import javax.annotation.Generated; + +// AUTO-GENERATED DOCUMENTATION AND CLASS +/** + * Base stub class for Secret Manager API. + * + *

This class is for advanced usage and reflects the underlying API directly. + */ +@Generated("by gapic-generator") +@BetaApi("A restructuring of stub classes is planned, so this may break in the future") +public abstract class SecretManagerServiceStub implements BackgroundResource { + + public UnaryCallable listSecretsPagedCallable() { + throw new UnsupportedOperationException("Not implemented: listSecretsPagedCallable()"); + } + + public UnaryCallable listSecretsCallable() { + throw new UnsupportedOperationException("Not implemented: listSecretsCallable()"); + } + + public UnaryCallable createSecretCallable() { + throw new UnsupportedOperationException("Not implemented: createSecretCallable()"); + } + + public UnaryCallable addSecretVersionCallable() { + throw new UnsupportedOperationException("Not implemented: addSecretVersionCallable()"); + } + + public UnaryCallable getSecretCallable() { + throw new UnsupportedOperationException("Not implemented: getSecretCallable()"); + } + + public UnaryCallable updateSecretCallable() { + throw new UnsupportedOperationException("Not implemented: updateSecretCallable()"); + } + + public UnaryCallable deleteSecretCallable() { + throw new UnsupportedOperationException("Not implemented: deleteSecretCallable()"); + } + + public UnaryCallable + listSecretVersionsPagedCallable() { + throw new UnsupportedOperationException("Not implemented: listSecretVersionsPagedCallable()"); + } + + public UnaryCallable + listSecretVersionsCallable() { + throw new UnsupportedOperationException("Not implemented: listSecretVersionsCallable()"); + } + + public UnaryCallable getSecretVersionCallable() { + throw new UnsupportedOperationException("Not implemented: getSecretVersionCallable()"); + } + + public UnaryCallable + accessSecretVersionCallable() { + throw new UnsupportedOperationException("Not implemented: accessSecretVersionCallable()"); + } + + public UnaryCallable disableSecretVersionCallable() { + throw new UnsupportedOperationException("Not implemented: disableSecretVersionCallable()"); + } + + public UnaryCallable enableSecretVersionCallable() { + throw new UnsupportedOperationException("Not implemented: enableSecretVersionCallable()"); + } + + public UnaryCallable destroySecretVersionCallable() { + throw new UnsupportedOperationException("Not implemented: destroySecretVersionCallable()"); + } + + public UnaryCallable setIamPolicyCallable() { + throw new UnsupportedOperationException("Not implemented: setIamPolicyCallable()"); + } + + public UnaryCallable getIamPolicyCallable() { + throw new UnsupportedOperationException("Not implemented: getIamPolicyCallable()"); + } + + public UnaryCallable + testIamPermissionsCallable() { + throw new UnsupportedOperationException("Not implemented: testIamPermissionsCallable()"); + } + + @Override + public abstract void close(); +} diff --git a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/SecretManagerServiceStubSettings.java b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/SecretManagerServiceStubSettings.java new file mode 100644 index 00000000..d6a8c013 --- /dev/null +++ b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/SecretManagerServiceStubSettings.java @@ -0,0 +1,775 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +package com.google.cloud.secretmanager.v1beta1.stub; + +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretVersionsPagedResponse; +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretsPagedResponse; + +import com.google.api.core.ApiFunction; +import com.google.api.core.ApiFuture; +import com.google.api.core.BetaApi; +import com.google.api.gax.core.GaxProperties; +import com.google.api.gax.core.GoogleCredentialsProvider; +import com.google.api.gax.core.InstantiatingExecutorProvider; +import com.google.api.gax.grpc.GaxGrpcProperties; +import com.google.api.gax.grpc.GrpcTransportChannel; +import com.google.api.gax.grpc.InstantiatingGrpcChannelProvider; +import com.google.api.gax.retrying.RetrySettings; +import com.google.api.gax.rpc.ApiCallContext; +import com.google.api.gax.rpc.ApiClientHeaderProvider; +import com.google.api.gax.rpc.ClientContext; +import com.google.api.gax.rpc.PageContext; +import com.google.api.gax.rpc.PagedCallSettings; +import com.google.api.gax.rpc.PagedListDescriptor; +import com.google.api.gax.rpc.PagedListResponseFactory; +import com.google.api.gax.rpc.StatusCode; +import com.google.api.gax.rpc.StubSettings; +import com.google.api.gax.rpc.TransportChannelProvider; +import com.google.api.gax.rpc.UnaryCallSettings; +import com.google.api.gax.rpc.UnaryCallable; +import com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse; +import com.google.cloud.secrets.v1beta1.AddSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.CreateSecretRequest; +import com.google.cloud.secrets.v1beta1.DeleteSecretRequest; +import com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest; +import com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.GetSecretRequest; +import com.google.cloud.secrets.v1beta1.GetSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest; +import com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse; +import com.google.cloud.secrets.v1beta1.ListSecretsRequest; +import com.google.cloud.secrets.v1beta1.ListSecretsResponse; +import com.google.cloud.secrets.v1beta1.Secret; +import com.google.cloud.secrets.v1beta1.SecretVersion; +import com.google.cloud.secrets.v1beta1.UpdateSecretRequest; +import com.google.common.collect.ImmutableList; +import com.google.common.collect.ImmutableMap; +import com.google.common.collect.ImmutableSet; +import com.google.common.collect.Lists; +import com.google.iam.v1.GetIamPolicyRequest; +import com.google.iam.v1.Policy; +import com.google.iam.v1.SetIamPolicyRequest; +import com.google.iam.v1.TestIamPermissionsRequest; +import com.google.iam.v1.TestIamPermissionsResponse; +import com.google.protobuf.Empty; +import java.io.IOException; +import java.util.List; +import javax.annotation.Generated; +import org.threeten.bp.Duration; + +// AUTO-GENERATED DOCUMENTATION AND CLASS +/** + * Settings class to configure an instance of {@link SecretManagerServiceStub}. + * + *

The default instance has everything set to sensible defaults: + * + *

    + *
  • The default service address (secretmanager.googleapis.com) and default port (443) are used. + *
  • Credentials are acquired automatically through Application Default Credentials. + *
  • Retries are configured for idempotent methods but not for non-idempotent methods. + *
+ * + *

The builder of this class is recursive, so contained classes are themselves builders. When + * build() is called, the tree of builders is called to create the complete settings object. + * + *

For example, to set the total timeout of createSecret to 30 seconds: + * + *

+ * 
+ * SecretManagerServiceStubSettings.Builder secretManagerServiceSettingsBuilder =
+ *     SecretManagerServiceStubSettings.newBuilder();
+ * secretManagerServiceSettingsBuilder.createSecretSettings().getRetrySettings().toBuilder()
+ *     .setTotalTimeout(Duration.ofSeconds(30));
+ * SecretManagerServiceStubSettings secretManagerServiceSettings = secretManagerServiceSettingsBuilder.build();
+ * 
+ * 
+ */ +@Generated("by gapic-generator") +@BetaApi +public class SecretManagerServiceStubSettings + extends StubSettings { + /** The default scopes of the service. */ + private static final ImmutableList DEFAULT_SERVICE_SCOPES = + ImmutableList.builder().add("https://www.googleapis.com/auth/cloud-platform").build(); + + private final PagedCallSettings + listSecretsSettings; + private final UnaryCallSettings createSecretSettings; + private final UnaryCallSettings addSecretVersionSettings; + private final UnaryCallSettings getSecretSettings; + private final UnaryCallSettings updateSecretSettings; + private final UnaryCallSettings deleteSecretSettings; + private final PagedCallSettings< + ListSecretVersionsRequest, ListSecretVersionsResponse, ListSecretVersionsPagedResponse> + listSecretVersionsSettings; + private final UnaryCallSettings getSecretVersionSettings; + private final UnaryCallSettings + accessSecretVersionSettings; + private final UnaryCallSettings + disableSecretVersionSettings; + private final UnaryCallSettings + enableSecretVersionSettings; + private final UnaryCallSettings + destroySecretVersionSettings; + private final UnaryCallSettings setIamPolicySettings; + private final UnaryCallSettings getIamPolicySettings; + private final UnaryCallSettings + testIamPermissionsSettings; + + /** Returns the object with the settings used for calls to listSecrets. */ + public PagedCallSettings + listSecretsSettings() { + return listSecretsSettings; + } + + /** Returns the object with the settings used for calls to createSecret. */ + public UnaryCallSettings createSecretSettings() { + return createSecretSettings; + } + + /** Returns the object with the settings used for calls to addSecretVersion. */ + public UnaryCallSettings addSecretVersionSettings() { + return addSecretVersionSettings; + } + + /** Returns the object with the settings used for calls to getSecret. */ + public UnaryCallSettings getSecretSettings() { + return getSecretSettings; + } + + /** Returns the object with the settings used for calls to updateSecret. */ + public UnaryCallSettings updateSecretSettings() { + return updateSecretSettings; + } + + /** Returns the object with the settings used for calls to deleteSecret. */ + public UnaryCallSettings deleteSecretSettings() { + return deleteSecretSettings; + } + + /** Returns the object with the settings used for calls to listSecretVersions. */ + public PagedCallSettings< + ListSecretVersionsRequest, ListSecretVersionsResponse, ListSecretVersionsPagedResponse> + listSecretVersionsSettings() { + return listSecretVersionsSettings; + } + + /** Returns the object with the settings used for calls to getSecretVersion. */ + public UnaryCallSettings getSecretVersionSettings() { + return getSecretVersionSettings; + } + + /** Returns the object with the settings used for calls to accessSecretVersion. */ + public UnaryCallSettings + accessSecretVersionSettings() { + return accessSecretVersionSettings; + } + + /** Returns the object with the settings used for calls to disableSecretVersion. */ + public UnaryCallSettings + disableSecretVersionSettings() { + return disableSecretVersionSettings; + } + + /** Returns the object with the settings used for calls to enableSecretVersion. */ + public UnaryCallSettings + enableSecretVersionSettings() { + return enableSecretVersionSettings; + } + + /** Returns the object with the settings used for calls to destroySecretVersion. */ + public UnaryCallSettings + destroySecretVersionSettings() { + return destroySecretVersionSettings; + } + + /** Returns the object with the settings used for calls to setIamPolicy. */ + public UnaryCallSettings setIamPolicySettings() { + return setIamPolicySettings; + } + + /** Returns the object with the settings used for calls to getIamPolicy. */ + public UnaryCallSettings getIamPolicySettings() { + return getIamPolicySettings; + } + + /** Returns the object with the settings used for calls to testIamPermissions. */ + public UnaryCallSettings + testIamPermissionsSettings() { + return testIamPermissionsSettings; + } + + @BetaApi("A restructuring of stub classes is planned, so this may break in the future") + public SecretManagerServiceStub createStub() throws IOException { + if (getTransportChannelProvider() + .getTransportName() + .equals(GrpcTransportChannel.getGrpcTransportName())) { + return GrpcSecretManagerServiceStub.create(this); + } else { + throw new UnsupportedOperationException( + "Transport not supported: " + getTransportChannelProvider().getTransportName()); + } + } + + /** Returns a builder for the default ExecutorProvider for this service. */ + public static InstantiatingExecutorProvider.Builder defaultExecutorProviderBuilder() { + return InstantiatingExecutorProvider.newBuilder(); + } + + /** Returns the default service endpoint. */ + public static String getDefaultEndpoint() { + return "secretmanager.googleapis.com:443"; + } + + /** Returns the default service scopes. */ + public static List getDefaultServiceScopes() { + return DEFAULT_SERVICE_SCOPES; + } + + /** Returns a builder for the default credentials for this service. */ + public static GoogleCredentialsProvider.Builder defaultCredentialsProviderBuilder() { + return GoogleCredentialsProvider.newBuilder().setScopesToApply(DEFAULT_SERVICE_SCOPES); + } + + /** Returns a builder for the default ChannelProvider for this service. */ + public static InstantiatingGrpcChannelProvider.Builder defaultGrpcTransportProviderBuilder() { + return InstantiatingGrpcChannelProvider.newBuilder() + .setMaxInboundMessageSize(Integer.MAX_VALUE); + } + + public static TransportChannelProvider defaultTransportChannelProvider() { + return defaultGrpcTransportProviderBuilder().build(); + } + + @BetaApi("The surface for customizing headers is not stable yet and may change in the future.") + public static ApiClientHeaderProvider.Builder defaultApiClientHeaderProviderBuilder() { + return ApiClientHeaderProvider.newBuilder() + .setGeneratedLibToken( + "gapic", GaxProperties.getLibraryVersion(SecretManagerServiceStubSettings.class)) + .setTransportToken( + GaxGrpcProperties.getGrpcTokenName(), GaxGrpcProperties.getGrpcVersion()); + } + + /** Returns a new builder for this class. */ + public static Builder newBuilder() { + return Builder.createDefault(); + } + + /** Returns a new builder for this class. */ + public static Builder newBuilder(ClientContext clientContext) { + return new Builder(clientContext); + } + + /** Returns a builder containing all the values of this settings class. */ + public Builder toBuilder() { + return new Builder(this); + } + + protected SecretManagerServiceStubSettings(Builder settingsBuilder) throws IOException { + super(settingsBuilder); + + listSecretsSettings = settingsBuilder.listSecretsSettings().build(); + createSecretSettings = settingsBuilder.createSecretSettings().build(); + addSecretVersionSettings = settingsBuilder.addSecretVersionSettings().build(); + getSecretSettings = settingsBuilder.getSecretSettings().build(); + updateSecretSettings = settingsBuilder.updateSecretSettings().build(); + deleteSecretSettings = settingsBuilder.deleteSecretSettings().build(); + listSecretVersionsSettings = settingsBuilder.listSecretVersionsSettings().build(); + getSecretVersionSettings = settingsBuilder.getSecretVersionSettings().build(); + accessSecretVersionSettings = settingsBuilder.accessSecretVersionSettings().build(); + disableSecretVersionSettings = settingsBuilder.disableSecretVersionSettings().build(); + enableSecretVersionSettings = settingsBuilder.enableSecretVersionSettings().build(); + destroySecretVersionSettings = settingsBuilder.destroySecretVersionSettings().build(); + setIamPolicySettings = settingsBuilder.setIamPolicySettings().build(); + getIamPolicySettings = settingsBuilder.getIamPolicySettings().build(); + testIamPermissionsSettings = settingsBuilder.testIamPermissionsSettings().build(); + } + + private static final PagedListDescriptor + LIST_SECRETS_PAGE_STR_DESC = + new PagedListDescriptor() { + @Override + public String emptyToken() { + return ""; + } + + @Override + public ListSecretsRequest injectToken(ListSecretsRequest payload, String token) { + return ListSecretsRequest.newBuilder(payload).setPageToken(token).build(); + } + + @Override + public ListSecretsRequest injectPageSize(ListSecretsRequest payload, int pageSize) { + return ListSecretsRequest.newBuilder(payload).setPageSize(pageSize).build(); + } + + @Override + public Integer extractPageSize(ListSecretsRequest payload) { + return payload.getPageSize(); + } + + @Override + public String extractNextToken(ListSecretsResponse payload) { + return payload.getNextPageToken(); + } + + @Override + public Iterable extractResources(ListSecretsResponse payload) { + return payload.getSecretsList() != null + ? payload.getSecretsList() + : ImmutableList.of(); + } + }; + + private static final PagedListDescriptor< + ListSecretVersionsRequest, ListSecretVersionsResponse, SecretVersion> + LIST_SECRET_VERSIONS_PAGE_STR_DESC = + new PagedListDescriptor< + ListSecretVersionsRequest, ListSecretVersionsResponse, SecretVersion>() { + @Override + public String emptyToken() { + return ""; + } + + @Override + public ListSecretVersionsRequest injectToken( + ListSecretVersionsRequest payload, String token) { + return ListSecretVersionsRequest.newBuilder(payload).setPageToken(token).build(); + } + + @Override + public ListSecretVersionsRequest injectPageSize( + ListSecretVersionsRequest payload, int pageSize) { + return ListSecretVersionsRequest.newBuilder(payload).setPageSize(pageSize).build(); + } + + @Override + public Integer extractPageSize(ListSecretVersionsRequest payload) { + return payload.getPageSize(); + } + + @Override + public String extractNextToken(ListSecretVersionsResponse payload) { + return payload.getNextPageToken(); + } + + @Override + public Iterable extractResources(ListSecretVersionsResponse payload) { + return payload.getVersionsList() != null + ? payload.getVersionsList() + : ImmutableList.of(); + } + }; + + private static final PagedListResponseFactory< + ListSecretsRequest, ListSecretsResponse, ListSecretsPagedResponse> + LIST_SECRETS_PAGE_STR_FACT = + new PagedListResponseFactory< + ListSecretsRequest, ListSecretsResponse, ListSecretsPagedResponse>() { + @Override + public ApiFuture getFuturePagedResponse( + UnaryCallable callable, + ListSecretsRequest request, + ApiCallContext context, + ApiFuture futureResponse) { + PageContext pageContext = + PageContext.create(callable, LIST_SECRETS_PAGE_STR_DESC, request, context); + return ListSecretsPagedResponse.createAsync(pageContext, futureResponse); + } + }; + + private static final PagedListResponseFactory< + ListSecretVersionsRequest, ListSecretVersionsResponse, ListSecretVersionsPagedResponse> + LIST_SECRET_VERSIONS_PAGE_STR_FACT = + new PagedListResponseFactory< + ListSecretVersionsRequest, + ListSecretVersionsResponse, + ListSecretVersionsPagedResponse>() { + @Override + public ApiFuture getFuturePagedResponse( + UnaryCallable callable, + ListSecretVersionsRequest request, + ApiCallContext context, + ApiFuture futureResponse) { + PageContext + pageContext = + PageContext.create( + callable, LIST_SECRET_VERSIONS_PAGE_STR_DESC, request, context); + return ListSecretVersionsPagedResponse.createAsync(pageContext, futureResponse); + } + }; + + /** Builder for SecretManagerServiceStubSettings. */ + public static class Builder + extends StubSettings.Builder { + private final ImmutableList> unaryMethodSettingsBuilders; + + private final PagedCallSettings.Builder< + ListSecretsRequest, ListSecretsResponse, ListSecretsPagedResponse> + listSecretsSettings; + private final UnaryCallSettings.Builder createSecretSettings; + private final UnaryCallSettings.Builder + addSecretVersionSettings; + private final UnaryCallSettings.Builder getSecretSettings; + private final UnaryCallSettings.Builder updateSecretSettings; + private final UnaryCallSettings.Builder deleteSecretSettings; + private final PagedCallSettings.Builder< + ListSecretVersionsRequest, ListSecretVersionsResponse, ListSecretVersionsPagedResponse> + listSecretVersionsSettings; + private final UnaryCallSettings.Builder + getSecretVersionSettings; + private final UnaryCallSettings.Builder + accessSecretVersionSettings; + private final UnaryCallSettings.Builder + disableSecretVersionSettings; + private final UnaryCallSettings.Builder + enableSecretVersionSettings; + private final UnaryCallSettings.Builder + destroySecretVersionSettings; + private final UnaryCallSettings.Builder setIamPolicySettings; + private final UnaryCallSettings.Builder getIamPolicySettings; + private final UnaryCallSettings.Builder + testIamPermissionsSettings; + + private static final ImmutableMap> + RETRYABLE_CODE_DEFINITIONS; + + static { + ImmutableMap.Builder> definitions = + ImmutableMap.builder(); + definitions.put( + "idempotent", + ImmutableSet.copyOf( + Lists.newArrayList( + StatusCode.Code.DEADLINE_EXCEEDED, StatusCode.Code.UNAVAILABLE))); + definitions.put("non_idempotent", ImmutableSet.copyOf(Lists.newArrayList())); + RETRYABLE_CODE_DEFINITIONS = definitions.build(); + } + + private static final ImmutableMap RETRY_PARAM_DEFINITIONS; + + static { + ImmutableMap.Builder definitions = ImmutableMap.builder(); + RetrySettings settings = null; + settings = + RetrySettings.newBuilder() + .setInitialRetryDelay(Duration.ofMillis(100L)) + .setRetryDelayMultiplier(1.3) + .setMaxRetryDelay(Duration.ofMillis(60000L)) + .setInitialRpcTimeout(Duration.ofMillis(20000L)) + .setRpcTimeoutMultiplier(1.0) + .setMaxRpcTimeout(Duration.ofMillis(20000L)) + .setTotalTimeout(Duration.ofMillis(600000L)) + .build(); + definitions.put("default", settings); + RETRY_PARAM_DEFINITIONS = definitions.build(); + } + + protected Builder() { + this((ClientContext) null); + } + + protected Builder(ClientContext clientContext) { + super(clientContext); + + listSecretsSettings = PagedCallSettings.newBuilder(LIST_SECRETS_PAGE_STR_FACT); + + createSecretSettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + + addSecretVersionSettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + + getSecretSettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + + updateSecretSettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + + deleteSecretSettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + + listSecretVersionsSettings = PagedCallSettings.newBuilder(LIST_SECRET_VERSIONS_PAGE_STR_FACT); + + getSecretVersionSettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + + accessSecretVersionSettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + + disableSecretVersionSettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + + enableSecretVersionSettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + + destroySecretVersionSettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + + setIamPolicySettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + + getIamPolicySettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + + testIamPermissionsSettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + + unaryMethodSettingsBuilders = + ImmutableList.>of( + listSecretsSettings, + createSecretSettings, + addSecretVersionSettings, + getSecretSettings, + updateSecretSettings, + deleteSecretSettings, + listSecretVersionsSettings, + getSecretVersionSettings, + accessSecretVersionSettings, + disableSecretVersionSettings, + enableSecretVersionSettings, + destroySecretVersionSettings, + setIamPolicySettings, + getIamPolicySettings, + testIamPermissionsSettings); + + initDefaults(this); + } + + private static Builder createDefault() { + Builder builder = new Builder((ClientContext) null); + builder.setTransportChannelProvider(defaultTransportChannelProvider()); + builder.setCredentialsProvider(defaultCredentialsProviderBuilder().build()); + builder.setInternalHeaderProvider(defaultApiClientHeaderProviderBuilder().build()); + builder.setEndpoint(getDefaultEndpoint()); + return initDefaults(builder); + } + + private static Builder initDefaults(Builder builder) { + + builder + .listSecretsSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("idempotent")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("default")); + + builder + .createSecretSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("non_idempotent")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("default")); + + builder + .addSecretVersionSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("non_idempotent")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("default")); + + builder + .getSecretSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("idempotent")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("default")); + + builder + .updateSecretSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("non_idempotent")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("default")); + + builder + .deleteSecretSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("non_idempotent")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("default")); + + builder + .listSecretVersionsSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("idempotent")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("default")); + + builder + .getSecretVersionSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("idempotent")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("default")); + + builder + .accessSecretVersionSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("idempotent")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("default")); + + builder + .disableSecretVersionSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("non_idempotent")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("default")); + + builder + .enableSecretVersionSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("non_idempotent")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("default")); + + builder + .destroySecretVersionSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("non_idempotent")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("default")); + + builder + .setIamPolicySettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("non_idempotent")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("default")); + + builder + .getIamPolicySettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("idempotent")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("default")); + + builder + .testIamPermissionsSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("non_idempotent")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("default")); + + return builder; + } + + protected Builder(SecretManagerServiceStubSettings settings) { + super(settings); + + listSecretsSettings = settings.listSecretsSettings.toBuilder(); + createSecretSettings = settings.createSecretSettings.toBuilder(); + addSecretVersionSettings = settings.addSecretVersionSettings.toBuilder(); + getSecretSettings = settings.getSecretSettings.toBuilder(); + updateSecretSettings = settings.updateSecretSettings.toBuilder(); + deleteSecretSettings = settings.deleteSecretSettings.toBuilder(); + listSecretVersionsSettings = settings.listSecretVersionsSettings.toBuilder(); + getSecretVersionSettings = settings.getSecretVersionSettings.toBuilder(); + accessSecretVersionSettings = settings.accessSecretVersionSettings.toBuilder(); + disableSecretVersionSettings = settings.disableSecretVersionSettings.toBuilder(); + enableSecretVersionSettings = settings.enableSecretVersionSettings.toBuilder(); + destroySecretVersionSettings = settings.destroySecretVersionSettings.toBuilder(); + setIamPolicySettings = settings.setIamPolicySettings.toBuilder(); + getIamPolicySettings = settings.getIamPolicySettings.toBuilder(); + testIamPermissionsSettings = settings.testIamPermissionsSettings.toBuilder(); + + unaryMethodSettingsBuilders = + ImmutableList.>of( + listSecretsSettings, + createSecretSettings, + addSecretVersionSettings, + getSecretSettings, + updateSecretSettings, + deleteSecretSettings, + listSecretVersionsSettings, + getSecretVersionSettings, + accessSecretVersionSettings, + disableSecretVersionSettings, + enableSecretVersionSettings, + destroySecretVersionSettings, + setIamPolicySettings, + getIamPolicySettings, + testIamPermissionsSettings); + } + + // NEXT_MAJOR_VER: remove 'throws Exception' + /** + * Applies the given settings updater function to all of the unary API methods in this service. + * + *

Note: This method does not support applying settings to streaming methods. + */ + public Builder applyToAllUnaryMethods( + ApiFunction, Void> settingsUpdater) throws Exception { + super.applyToAllUnaryMethods(unaryMethodSettingsBuilders, settingsUpdater); + return this; + } + + public ImmutableList> unaryMethodSettingsBuilders() { + return unaryMethodSettingsBuilders; + } + + /** Returns the builder for the settings used for calls to listSecrets. */ + public PagedCallSettings.Builder< + ListSecretsRequest, ListSecretsResponse, ListSecretsPagedResponse> + listSecretsSettings() { + return listSecretsSettings; + } + + /** Returns the builder for the settings used for calls to createSecret. */ + public UnaryCallSettings.Builder createSecretSettings() { + return createSecretSettings; + } + + /** Returns the builder for the settings used for calls to addSecretVersion. */ + public UnaryCallSettings.Builder + addSecretVersionSettings() { + return addSecretVersionSettings; + } + + /** Returns the builder for the settings used for calls to getSecret. */ + public UnaryCallSettings.Builder getSecretSettings() { + return getSecretSettings; + } + + /** Returns the builder for the settings used for calls to updateSecret. */ + public UnaryCallSettings.Builder updateSecretSettings() { + return updateSecretSettings; + } + + /** Returns the builder for the settings used for calls to deleteSecret. */ + public UnaryCallSettings.Builder deleteSecretSettings() { + return deleteSecretSettings; + } + + /** Returns the builder for the settings used for calls to listSecretVersions. */ + public PagedCallSettings.Builder< + ListSecretVersionsRequest, ListSecretVersionsResponse, ListSecretVersionsPagedResponse> + listSecretVersionsSettings() { + return listSecretVersionsSettings; + } + + /** Returns the builder for the settings used for calls to getSecretVersion. */ + public UnaryCallSettings.Builder + getSecretVersionSettings() { + return getSecretVersionSettings; + } + + /** Returns the builder for the settings used for calls to accessSecretVersion. */ + public UnaryCallSettings.Builder + accessSecretVersionSettings() { + return accessSecretVersionSettings; + } + + /** Returns the builder for the settings used for calls to disableSecretVersion. */ + public UnaryCallSettings.Builder + disableSecretVersionSettings() { + return disableSecretVersionSettings; + } + + /** Returns the builder for the settings used for calls to enableSecretVersion. */ + public UnaryCallSettings.Builder + enableSecretVersionSettings() { + return enableSecretVersionSettings; + } + + /** Returns the builder for the settings used for calls to destroySecretVersion. */ + public UnaryCallSettings.Builder + destroySecretVersionSettings() { + return destroySecretVersionSettings; + } + + /** Returns the builder for the settings used for calls to setIamPolicy. */ + public UnaryCallSettings.Builder setIamPolicySettings() { + return setIamPolicySettings; + } + + /** Returns the builder for the settings used for calls to getIamPolicy. */ + public UnaryCallSettings.Builder getIamPolicySettings() { + return getIamPolicySettings; + } + + /** Returns the builder for the settings used for calls to testIamPermissions. */ + public UnaryCallSettings.Builder + testIamPermissionsSettings() { + return testIamPermissionsSettings; + } + + @Override + public SecretManagerServiceStubSettings build() throws IOException { + return new SecretManagerServiceStubSettings(this); + } + } +} diff --git a/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/MockSecretManagerService.java b/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/MockSecretManagerService.java new file mode 100644 index 00000000..cf1c5103 --- /dev/null +++ b/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/MockSecretManagerService.java @@ -0,0 +1,57 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +package com.google.cloud.secretmanager.v1beta1; + +import com.google.api.core.BetaApi; +import com.google.api.gax.grpc.testing.MockGrpcService; +import com.google.protobuf.AbstractMessage; +import io.grpc.ServerServiceDefinition; +import java.util.List; + +@javax.annotation.Generated("by GAPIC") +@BetaApi +public class MockSecretManagerService implements MockGrpcService { + private final MockSecretManagerServiceImpl serviceImpl; + + public MockSecretManagerService() { + serviceImpl = new MockSecretManagerServiceImpl(); + } + + @Override + public List getRequests() { + return serviceImpl.getRequests(); + } + + @Override + public void addResponse(AbstractMessage response) { + serviceImpl.addResponse(response); + } + + @Override + public void addException(Exception exception) { + serviceImpl.addException(exception); + } + + @Override + public ServerServiceDefinition getServiceDefinition() { + return serviceImpl.bindService(); + } + + @Override + public void reset() { + serviceImpl.reset(); + } +} diff --git a/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/MockSecretManagerServiceImpl.java b/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/MockSecretManagerServiceImpl.java new file mode 100644 index 00000000..8ebee154 --- /dev/null +++ b/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/MockSecretManagerServiceImpl.java @@ -0,0 +1,303 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +package com.google.cloud.secretmanager.v1beta1; + +import com.google.api.core.BetaApi; +import com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse; +import com.google.cloud.secrets.v1beta1.AddSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.CreateSecretRequest; +import com.google.cloud.secrets.v1beta1.DeleteSecretRequest; +import com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest; +import com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.GetSecretRequest; +import com.google.cloud.secrets.v1beta1.GetSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest; +import com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse; +import com.google.cloud.secrets.v1beta1.ListSecretsRequest; +import com.google.cloud.secrets.v1beta1.ListSecretsResponse; +import com.google.cloud.secrets.v1beta1.Secret; +import com.google.cloud.secrets.v1beta1.SecretManagerServiceGrpc.SecretManagerServiceImplBase; +import com.google.cloud.secrets.v1beta1.SecretVersion; +import com.google.cloud.secrets.v1beta1.UpdateSecretRequest; +import com.google.iam.v1.GetIamPolicyRequest; +import com.google.iam.v1.Policy; +import com.google.iam.v1.SetIamPolicyRequest; +import com.google.iam.v1.TestIamPermissionsRequest; +import com.google.iam.v1.TestIamPermissionsResponse; +import com.google.protobuf.AbstractMessage; +import com.google.protobuf.Empty; +import io.grpc.stub.StreamObserver; +import java.util.ArrayList; +import java.util.LinkedList; +import java.util.List; +import java.util.Queue; + +@javax.annotation.Generated("by GAPIC") +@BetaApi +public class MockSecretManagerServiceImpl extends SecretManagerServiceImplBase { + private List requests; + private Queue responses; + + public MockSecretManagerServiceImpl() { + requests = new ArrayList<>(); + responses = new LinkedList<>(); + } + + public List getRequests() { + return requests; + } + + public void addResponse(AbstractMessage response) { + responses.add(response); + } + + public void setResponses(List responses) { + this.responses = new LinkedList(responses); + } + + public void addException(Exception exception) { + responses.add(exception); + } + + public void reset() { + requests = new ArrayList<>(); + responses = new LinkedList<>(); + } + + @Override + public void listSecrets( + ListSecretsRequest request, StreamObserver responseObserver) { + Object response = responses.remove(); + if (response instanceof ListSecretsResponse) { + requests.add(request); + responseObserver.onNext((ListSecretsResponse) response); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError((Exception) response); + } else { + responseObserver.onError(new IllegalArgumentException("Unrecognized response type")); + } + } + + @Override + public void createSecret(CreateSecretRequest request, StreamObserver responseObserver) { + Object response = responses.remove(); + if (response instanceof Secret) { + requests.add(request); + responseObserver.onNext((Secret) response); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError((Exception) response); + } else { + responseObserver.onError(new IllegalArgumentException("Unrecognized response type")); + } + } + + @Override + public void addSecretVersion( + AddSecretVersionRequest request, StreamObserver responseObserver) { + Object response = responses.remove(); + if (response instanceof SecretVersion) { + requests.add(request); + responseObserver.onNext((SecretVersion) response); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError((Exception) response); + } else { + responseObserver.onError(new IllegalArgumentException("Unrecognized response type")); + } + } + + @Override + public void getSecret(GetSecretRequest request, StreamObserver responseObserver) { + Object response = responses.remove(); + if (response instanceof Secret) { + requests.add(request); + responseObserver.onNext((Secret) response); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError((Exception) response); + } else { + responseObserver.onError(new IllegalArgumentException("Unrecognized response type")); + } + } + + @Override + public void updateSecret(UpdateSecretRequest request, StreamObserver responseObserver) { + Object response = responses.remove(); + if (response instanceof Secret) { + requests.add(request); + responseObserver.onNext((Secret) response); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError((Exception) response); + } else { + responseObserver.onError(new IllegalArgumentException("Unrecognized response type")); + } + } + + @Override + public void deleteSecret(DeleteSecretRequest request, StreamObserver responseObserver) { + Object response = responses.remove(); + if (response instanceof Empty) { + requests.add(request); + responseObserver.onNext((Empty) response); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError((Exception) response); + } else { + responseObserver.onError(new IllegalArgumentException("Unrecognized response type")); + } + } + + @Override + public void listSecretVersions( + ListSecretVersionsRequest request, + StreamObserver responseObserver) { + Object response = responses.remove(); + if (response instanceof ListSecretVersionsResponse) { + requests.add(request); + responseObserver.onNext((ListSecretVersionsResponse) response); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError((Exception) response); + } else { + responseObserver.onError(new IllegalArgumentException("Unrecognized response type")); + } + } + + @Override + public void getSecretVersion( + GetSecretVersionRequest request, StreamObserver responseObserver) { + Object response = responses.remove(); + if (response instanceof SecretVersion) { + requests.add(request); + responseObserver.onNext((SecretVersion) response); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError((Exception) response); + } else { + responseObserver.onError(new IllegalArgumentException("Unrecognized response type")); + } + } + + @Override + public void accessSecretVersion( + AccessSecretVersionRequest request, + StreamObserver responseObserver) { + Object response = responses.remove(); + if (response instanceof AccessSecretVersionResponse) { + requests.add(request); + responseObserver.onNext((AccessSecretVersionResponse) response); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError((Exception) response); + } else { + responseObserver.onError(new IllegalArgumentException("Unrecognized response type")); + } + } + + @Override + public void disableSecretVersion( + DisableSecretVersionRequest request, StreamObserver responseObserver) { + Object response = responses.remove(); + if (response instanceof SecretVersion) { + requests.add(request); + responseObserver.onNext((SecretVersion) response); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError((Exception) response); + } else { + responseObserver.onError(new IllegalArgumentException("Unrecognized response type")); + } + } + + @Override + public void enableSecretVersion( + EnableSecretVersionRequest request, StreamObserver responseObserver) { + Object response = responses.remove(); + if (response instanceof SecretVersion) { + requests.add(request); + responseObserver.onNext((SecretVersion) response); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError((Exception) response); + } else { + responseObserver.onError(new IllegalArgumentException("Unrecognized response type")); + } + } + + @Override + public void destroySecretVersion( + DestroySecretVersionRequest request, StreamObserver responseObserver) { + Object response = responses.remove(); + if (response instanceof SecretVersion) { + requests.add(request); + responseObserver.onNext((SecretVersion) response); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError((Exception) response); + } else { + responseObserver.onError(new IllegalArgumentException("Unrecognized response type")); + } + } + + @Override + public void setIamPolicy(SetIamPolicyRequest request, StreamObserver responseObserver) { + Object response = responses.remove(); + if (response instanceof Policy) { + requests.add(request); + responseObserver.onNext((Policy) response); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError((Exception) response); + } else { + responseObserver.onError(new IllegalArgumentException("Unrecognized response type")); + } + } + + @Override + public void getIamPolicy(GetIamPolicyRequest request, StreamObserver responseObserver) { + Object response = responses.remove(); + if (response instanceof Policy) { + requests.add(request); + responseObserver.onNext((Policy) response); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError((Exception) response); + } else { + responseObserver.onError(new IllegalArgumentException("Unrecognized response type")); + } + } + + @Override + public void testIamPermissions( + TestIamPermissionsRequest request, + StreamObserver responseObserver) { + Object response = responses.remove(); + if (response instanceof TestIamPermissionsResponse) { + requests.add(request); + responseObserver.onNext((TestIamPermissionsResponse) response); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError((Exception) response); + } else { + responseObserver.onError(new IllegalArgumentException("Unrecognized response type")); + } + } +} diff --git a/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceClientTest.java b/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceClientTest.java new file mode 100644 index 00000000..999ab2fc --- /dev/null +++ b/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceClientTest.java @@ -0,0 +1,603 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +package com.google.cloud.secretmanager.v1beta1; + +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretVersionsPagedResponse; +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretsPagedResponse; + +import com.google.api.gax.core.NoCredentialsProvider; +import com.google.api.gax.grpc.GaxGrpcProperties; +import com.google.api.gax.grpc.testing.LocalChannelProvider; +import com.google.api.gax.grpc.testing.MockGrpcService; +import com.google.api.gax.grpc.testing.MockServiceHelper; +import com.google.api.gax.rpc.ApiClientHeaderProvider; +import com.google.api.gax.rpc.InvalidArgumentException; +import com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse; +import com.google.cloud.secrets.v1beta1.AddSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.CreateSecretRequest; +import com.google.cloud.secrets.v1beta1.DeleteSecretRequest; +import com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest; +import com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.GetSecretRequest; +import com.google.cloud.secrets.v1beta1.GetSecretVersionRequest; +import com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest; +import com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse; +import com.google.cloud.secrets.v1beta1.ListSecretsRequest; +import com.google.cloud.secrets.v1beta1.ListSecretsResponse; +import com.google.cloud.secrets.v1beta1.ProjectName; +import com.google.cloud.secrets.v1beta1.Secret; +import com.google.cloud.secrets.v1beta1.SecretName; +import com.google.cloud.secrets.v1beta1.SecretPayload; +import com.google.cloud.secrets.v1beta1.SecretVersion; +import com.google.cloud.secrets.v1beta1.SecretVersionName; +import com.google.cloud.secrets.v1beta1.UpdateSecretRequest; +import com.google.common.collect.Lists; +import com.google.protobuf.AbstractMessage; +import com.google.protobuf.Empty; +import com.google.protobuf.FieldMask; +import io.grpc.Status; +import io.grpc.StatusRuntimeException; +import java.io.IOException; +import java.util.Arrays; +import java.util.List; +import org.junit.After; +import org.junit.AfterClass; +import org.junit.Assert; +import org.junit.Before; +import org.junit.BeforeClass; +import org.junit.Test; + +@javax.annotation.Generated("by GAPIC") +public class SecretManagerServiceClientTest { + private static MockSecretManagerService mockSecretManagerService; + private static MockServiceHelper serviceHelper; + private SecretManagerServiceClient client; + private LocalChannelProvider channelProvider; + + @BeforeClass + public static void startStaticServer() { + mockSecretManagerService = new MockSecretManagerService(); + serviceHelper = + new MockServiceHelper( + "in-process-1", Arrays.asList(mockSecretManagerService)); + serviceHelper.start(); + } + + @AfterClass + public static void stopServer() { + serviceHelper.stop(); + } + + @Before + public void setUp() throws IOException { + serviceHelper.reset(); + channelProvider = serviceHelper.createChannelProvider(); + SecretManagerServiceSettings settings = + SecretManagerServiceSettings.newBuilder() + .setTransportChannelProvider(channelProvider) + .setCredentialsProvider(NoCredentialsProvider.create()) + .build(); + client = SecretManagerServiceClient.create(settings); + } + + @After + public void tearDown() throws Exception { + client.close(); + } + + @Test + @SuppressWarnings("all") + public void listSecretsTest() { + String nextPageToken = ""; + int totalSize = 705419236; + Secret secretsElement = Secret.newBuilder().build(); + List secrets = Arrays.asList(secretsElement); + ListSecretsResponse expectedResponse = + ListSecretsResponse.newBuilder() + .setNextPageToken(nextPageToken) + .setTotalSize(totalSize) + .addAllSecrets(secrets) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + ProjectName parent = ProjectName.of("[PROJECT]"); + + ListSecretsPagedResponse pagedListResponse = client.listSecrets(parent); + + List resources = Lists.newArrayList(pagedListResponse.iterateAll()); + Assert.assertEquals(1, resources.size()); + Assert.assertEquals(expectedResponse.getSecretsList().get(0), resources.get(0)); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + ListSecretsRequest actualRequest = (ListSecretsRequest) actualRequests.get(0); + + Assert.assertEquals(parent, ProjectName.parse(actualRequest.getParent())); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + @SuppressWarnings("all") + public void listSecretsExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + ProjectName parent = ProjectName.of("[PROJECT]"); + + client.listSecrets(parent); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception + } + } + + @Test + @SuppressWarnings("all") + public void createSecretTest() { + SecretName name = SecretName.of("[PROJECT]", "[SECRET]"); + Secret expectedResponse = Secret.newBuilder().setName(name.toString()).build(); + mockSecretManagerService.addResponse(expectedResponse); + + ProjectName parent = ProjectName.of("[PROJECT]"); + String secretId = "secretId-739547894"; + Secret secret = Secret.newBuilder().build(); + + Secret actualResponse = client.createSecret(parent, secretId, secret); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + CreateSecretRequest actualRequest = (CreateSecretRequest) actualRequests.get(0); + + Assert.assertEquals(parent, ProjectName.parse(actualRequest.getParent())); + Assert.assertEquals(secretId, actualRequest.getSecretId()); + Assert.assertEquals(secret, actualRequest.getSecret()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + @SuppressWarnings("all") + public void createSecretExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + ProjectName parent = ProjectName.of("[PROJECT]"); + String secretId = "secretId-739547894"; + Secret secret = Secret.newBuilder().build(); + + client.createSecret(parent, secretId, secret); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception + } + } + + @Test + @SuppressWarnings("all") + public void addSecretVersionTest() { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + SecretVersion expectedResponse = SecretVersion.newBuilder().setName(name.toString()).build(); + mockSecretManagerService.addResponse(expectedResponse); + + SecretName parent = SecretName.of("[PROJECT]", "[SECRET]"); + SecretPayload payload = SecretPayload.newBuilder().build(); + + SecretVersion actualResponse = client.addSecretVersion(parent, payload); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + AddSecretVersionRequest actualRequest = (AddSecretVersionRequest) actualRequests.get(0); + + Assert.assertEquals(parent, SecretName.parse(actualRequest.getParent())); + Assert.assertEquals(payload, actualRequest.getPayload()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + @SuppressWarnings("all") + public void addSecretVersionExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + SecretName parent = SecretName.of("[PROJECT]", "[SECRET]"); + SecretPayload payload = SecretPayload.newBuilder().build(); + + client.addSecretVersion(parent, payload); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception + } + } + + @Test + @SuppressWarnings("all") + public void getSecretTest() { + SecretName name2 = SecretName.of("[PROJECT]", "[SECRET]"); + Secret expectedResponse = Secret.newBuilder().setName(name2.toString()).build(); + mockSecretManagerService.addResponse(expectedResponse); + + SecretName name = SecretName.of("[PROJECT]", "[SECRET]"); + + Secret actualResponse = client.getSecret(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + GetSecretRequest actualRequest = (GetSecretRequest) actualRequests.get(0); + + Assert.assertEquals(name, SecretName.parse(actualRequest.getName())); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + @SuppressWarnings("all") + public void getSecretExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + SecretName name = SecretName.of("[PROJECT]", "[SECRET]"); + + client.getSecret(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception + } + } + + @Test + @SuppressWarnings("all") + public void updateSecretTest() { + SecretName name = SecretName.of("[PROJECT]", "[SECRET]"); + Secret expectedResponse = Secret.newBuilder().setName(name.toString()).build(); + mockSecretManagerService.addResponse(expectedResponse); + + Secret secret = Secret.newBuilder().build(); + FieldMask updateMask = FieldMask.newBuilder().build(); + + Secret actualResponse = client.updateSecret(secret, updateMask); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + UpdateSecretRequest actualRequest = (UpdateSecretRequest) actualRequests.get(0); + + Assert.assertEquals(secret, actualRequest.getSecret()); + Assert.assertEquals(updateMask, actualRequest.getUpdateMask()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + @SuppressWarnings("all") + public void updateSecretExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + Secret secret = Secret.newBuilder().build(); + FieldMask updateMask = FieldMask.newBuilder().build(); + + client.updateSecret(secret, updateMask); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception + } + } + + @Test + @SuppressWarnings("all") + public void deleteSecretTest() { + Empty expectedResponse = Empty.newBuilder().build(); + mockSecretManagerService.addResponse(expectedResponse); + + SecretName name = SecretName.of("[PROJECT]", "[SECRET]"); + + client.deleteSecret(name); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + DeleteSecretRequest actualRequest = (DeleteSecretRequest) actualRequests.get(0); + + Assert.assertEquals(name, SecretName.parse(actualRequest.getName())); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + @SuppressWarnings("all") + public void deleteSecretExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + SecretName name = SecretName.of("[PROJECT]", "[SECRET]"); + + client.deleteSecret(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception + } + } + + @Test + @SuppressWarnings("all") + public void listSecretVersionsTest() { + String nextPageToken = ""; + int totalSize = 705419236; + SecretVersion versionsElement = SecretVersion.newBuilder().build(); + List versions = Arrays.asList(versionsElement); + ListSecretVersionsResponse expectedResponse = + ListSecretVersionsResponse.newBuilder() + .setNextPageToken(nextPageToken) + .setTotalSize(totalSize) + .addAllVersions(versions) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + SecretName parent = SecretName.of("[PROJECT]", "[SECRET]"); + + ListSecretVersionsPagedResponse pagedListResponse = client.listSecretVersions(parent); + + List resources = Lists.newArrayList(pagedListResponse.iterateAll()); + Assert.assertEquals(1, resources.size()); + Assert.assertEquals(expectedResponse.getVersionsList().get(0), resources.get(0)); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + ListSecretVersionsRequest actualRequest = (ListSecretVersionsRequest) actualRequests.get(0); + + Assert.assertEquals(parent, SecretName.parse(actualRequest.getParent())); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + @SuppressWarnings("all") + public void listSecretVersionsExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + SecretName parent = SecretName.of("[PROJECT]", "[SECRET]"); + + client.listSecretVersions(parent); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception + } + } + + @Test + @SuppressWarnings("all") + public void getSecretVersionTest() { + SecretVersionName name2 = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + SecretVersion expectedResponse = SecretVersion.newBuilder().setName(name2.toString()).build(); + mockSecretManagerService.addResponse(expectedResponse); + + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + SecretVersion actualResponse = client.getSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + GetSecretVersionRequest actualRequest = (GetSecretVersionRequest) actualRequests.get(0); + + Assert.assertEquals(name, SecretVersionName.parse(actualRequest.getName())); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + @SuppressWarnings("all") + public void getSecretVersionExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + client.getSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception + } + } + + @Test + @SuppressWarnings("all") + public void accessSecretVersionTest() { + SecretVersionName name2 = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + AccessSecretVersionResponse expectedResponse = + AccessSecretVersionResponse.newBuilder().setName(name2.toString()).build(); + mockSecretManagerService.addResponse(expectedResponse); + + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + AccessSecretVersionResponse actualResponse = client.accessSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + AccessSecretVersionRequest actualRequest = (AccessSecretVersionRequest) actualRequests.get(0); + + Assert.assertEquals(name, SecretVersionName.parse(actualRequest.getName())); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + @SuppressWarnings("all") + public void accessSecretVersionExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + client.accessSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception + } + } + + @Test + @SuppressWarnings("all") + public void disableSecretVersionTest() { + SecretVersionName name2 = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + SecretVersion expectedResponse = SecretVersion.newBuilder().setName(name2.toString()).build(); + mockSecretManagerService.addResponse(expectedResponse); + + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + SecretVersion actualResponse = client.disableSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + DisableSecretVersionRequest actualRequest = (DisableSecretVersionRequest) actualRequests.get(0); + + Assert.assertEquals(name, SecretVersionName.parse(actualRequest.getName())); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + @SuppressWarnings("all") + public void disableSecretVersionExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + client.disableSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception + } + } + + @Test + @SuppressWarnings("all") + public void enableSecretVersionTest() { + SecretVersionName name2 = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + SecretVersion expectedResponse = SecretVersion.newBuilder().setName(name2.toString()).build(); + mockSecretManagerService.addResponse(expectedResponse); + + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + SecretVersion actualResponse = client.enableSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + EnableSecretVersionRequest actualRequest = (EnableSecretVersionRequest) actualRequests.get(0); + + Assert.assertEquals(name, SecretVersionName.parse(actualRequest.getName())); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + @SuppressWarnings("all") + public void enableSecretVersionExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + client.enableSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception + } + } + + @Test + @SuppressWarnings("all") + public void destroySecretVersionTest() { + SecretVersionName name2 = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + SecretVersion expectedResponse = SecretVersion.newBuilder().setName(name2.toString()).build(); + mockSecretManagerService.addResponse(expectedResponse); + + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + SecretVersion actualResponse = client.destroySecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + DestroySecretVersionRequest actualRequest = (DestroySecretVersionRequest) actualRequests.get(0); + + Assert.assertEquals(name, SecretVersionName.parse(actualRequest.getName())); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + @SuppressWarnings("all") + public void destroySecretVersionExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + client.destroySecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception + } + } +} diff --git a/grpc-google-cloud-secretmanager-v1beta1/pom.xml b/grpc-google-cloud-secretmanager-v1beta1/pom.xml new file mode 100644 index 00000000..617bc234 --- /dev/null +++ b/grpc-google-cloud-secretmanager-v1beta1/pom.xml @@ -0,0 +1,60 @@ + + 4.0.0 + com.google.api.grpc + grpc-google-cloud-secretmanager-v1beta1 + 0.0.1-SNAPSHOT + grpc-google-cloud-secretmanager-v1beta1 + GRPC library for grpc-google-cloud-secretmanager-v1beta1 + + com.google.cloud + google-cloud-secretmanager-parent + 0.0.1-SNAPSHOT + + + + io.grpc + grpc-api + + + io.grpc + grpc-stub + + + io.grpc + grpc-protobuf + + + com.google.protobuf + protobuf-java + + + com.google.api.grpc + proto-google-cloud-secretmanager-v1beta1 + + + com.google.guava + guava + + + com.google.api.grpc + proto-google-common-protos + + + + + + java9 + + [9,) + + + + javax.annotation + javax.annotation-api + + + + + \ No newline at end of file diff --git a/grpc-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretManagerServiceGrpc.java b/grpc-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretManagerServiceGrpc.java new file mode 100644 index 00000000..bb20de11 --- /dev/null +++ b/grpc-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretManagerServiceGrpc.java @@ -0,0 +1,2097 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +package com.google.cloud.secrets.v1beta1; + +import static io.grpc.MethodDescriptor.generateFullMethodName; +import static io.grpc.stub.ClientCalls.asyncUnaryCall; +import static io.grpc.stub.ClientCalls.blockingUnaryCall; +import static io.grpc.stub.ClientCalls.futureUnaryCall; +import static io.grpc.stub.ServerCalls.asyncUnaryCall; +import static io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall; + +/** + * + * + *
+ * Secret Manager Service
+ * Manages secrets and operations using those secrets. Implements a REST
+ * model with the following objects:
+ * * [Secret][google.cloud.secrets.v1beta1.Secret]
+ * * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
+ * 
+ */ +@javax.annotation.Generated( + value = "by gRPC proto compiler", + comments = "Source: google/cloud/secrets/v1beta1/service.proto") +public final class SecretManagerServiceGrpc { + + private SecretManagerServiceGrpc() {} + + public static final String SERVICE_NAME = "google.cloud.secrets.v1beta1.SecretManagerService"; + + // Static method descriptors that strictly reflect the proto. + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.ListSecretsRequest, + com.google.cloud.secrets.v1beta1.ListSecretsResponse> + getListSecretsMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "ListSecrets", + requestType = com.google.cloud.secrets.v1beta1.ListSecretsRequest.class, + responseType = com.google.cloud.secrets.v1beta1.ListSecretsResponse.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.ListSecretsRequest, + com.google.cloud.secrets.v1beta1.ListSecretsResponse> + getListSecretsMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.ListSecretsRequest, + com.google.cloud.secrets.v1beta1.ListSecretsResponse> + getListSecretsMethod; + if ((getListSecretsMethod = SecretManagerServiceGrpc.getListSecretsMethod) == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getListSecretsMethod = SecretManagerServiceGrpc.getListSecretsMethod) == null) { + SecretManagerServiceGrpc.getListSecretsMethod = + getListSecretsMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName(generateFullMethodName(SERVICE_NAME, "ListSecrets")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secrets.v1beta1.ListSecretsRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secrets.v1beta1.ListSecretsResponse + .getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("ListSecrets")) + .build(); + } + } + } + return getListSecretsMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.CreateSecretRequest, + com.google.cloud.secrets.v1beta1.Secret> + getCreateSecretMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "CreateSecret", + requestType = com.google.cloud.secrets.v1beta1.CreateSecretRequest.class, + responseType = com.google.cloud.secrets.v1beta1.Secret.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.CreateSecretRequest, + com.google.cloud.secrets.v1beta1.Secret> + getCreateSecretMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.CreateSecretRequest, + com.google.cloud.secrets.v1beta1.Secret> + getCreateSecretMethod; + if ((getCreateSecretMethod = SecretManagerServiceGrpc.getCreateSecretMethod) == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getCreateSecretMethod = SecretManagerServiceGrpc.getCreateSecretMethod) == null) { + SecretManagerServiceGrpc.getCreateSecretMethod = + getCreateSecretMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName(generateFullMethodName(SERVICE_NAME, "CreateSecret")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secrets.v1beta1.CreateSecretRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secrets.v1beta1.Secret.getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("CreateSecret")) + .build(); + } + } + } + return getCreateSecretMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.AddSecretVersionRequest, + com.google.cloud.secrets.v1beta1.SecretVersion> + getAddSecretVersionMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "AddSecretVersion", + requestType = com.google.cloud.secrets.v1beta1.AddSecretVersionRequest.class, + responseType = com.google.cloud.secrets.v1beta1.SecretVersion.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.AddSecretVersionRequest, + com.google.cloud.secrets.v1beta1.SecretVersion> + getAddSecretVersionMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.AddSecretVersionRequest, + com.google.cloud.secrets.v1beta1.SecretVersion> + getAddSecretVersionMethod; + if ((getAddSecretVersionMethod = SecretManagerServiceGrpc.getAddSecretVersionMethod) == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getAddSecretVersionMethod = SecretManagerServiceGrpc.getAddSecretVersionMethod) + == null) { + SecretManagerServiceGrpc.getAddSecretVersionMethod = + getAddSecretVersionMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName(generateFullMethodName(SERVICE_NAME, "AddSecretVersion")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secrets.v1beta1.AddSecretVersionRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secrets.v1beta1.SecretVersion.getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("AddSecretVersion")) + .build(); + } + } + } + return getAddSecretVersionMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.GetSecretRequest, + com.google.cloud.secrets.v1beta1.Secret> + getGetSecretMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "GetSecret", + requestType = com.google.cloud.secrets.v1beta1.GetSecretRequest.class, + responseType = com.google.cloud.secrets.v1beta1.Secret.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.GetSecretRequest, + com.google.cloud.secrets.v1beta1.Secret> + getGetSecretMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.GetSecretRequest, + com.google.cloud.secrets.v1beta1.Secret> + getGetSecretMethod; + if ((getGetSecretMethod = SecretManagerServiceGrpc.getGetSecretMethod) == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getGetSecretMethod = SecretManagerServiceGrpc.getGetSecretMethod) == null) { + SecretManagerServiceGrpc.getGetSecretMethod = + getGetSecretMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName(generateFullMethodName(SERVICE_NAME, "GetSecret")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secrets.v1beta1.GetSecretRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secrets.v1beta1.Secret.getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("GetSecret")) + .build(); + } + } + } + return getGetSecretMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.UpdateSecretRequest, + com.google.cloud.secrets.v1beta1.Secret> + getUpdateSecretMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "UpdateSecret", + requestType = com.google.cloud.secrets.v1beta1.UpdateSecretRequest.class, + responseType = com.google.cloud.secrets.v1beta1.Secret.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.UpdateSecretRequest, + com.google.cloud.secrets.v1beta1.Secret> + getUpdateSecretMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.UpdateSecretRequest, + com.google.cloud.secrets.v1beta1.Secret> + getUpdateSecretMethod; + if ((getUpdateSecretMethod = SecretManagerServiceGrpc.getUpdateSecretMethod) == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getUpdateSecretMethod = SecretManagerServiceGrpc.getUpdateSecretMethod) == null) { + SecretManagerServiceGrpc.getUpdateSecretMethod = + getUpdateSecretMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName(generateFullMethodName(SERVICE_NAME, "UpdateSecret")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secrets.v1beta1.UpdateSecretRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secrets.v1beta1.Secret.getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("UpdateSecret")) + .build(); + } + } + } + return getUpdateSecretMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.DeleteSecretRequest, com.google.protobuf.Empty> + getDeleteSecretMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "DeleteSecret", + requestType = com.google.cloud.secrets.v1beta1.DeleteSecretRequest.class, + responseType = com.google.protobuf.Empty.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.DeleteSecretRequest, com.google.protobuf.Empty> + getDeleteSecretMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.DeleteSecretRequest, com.google.protobuf.Empty> + getDeleteSecretMethod; + if ((getDeleteSecretMethod = SecretManagerServiceGrpc.getDeleteSecretMethod) == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getDeleteSecretMethod = SecretManagerServiceGrpc.getDeleteSecretMethod) == null) { + SecretManagerServiceGrpc.getDeleteSecretMethod = + getDeleteSecretMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName(generateFullMethodName(SERVICE_NAME, "DeleteSecret")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secrets.v1beta1.DeleteSecretRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.protobuf.Empty.getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("DeleteSecret")) + .build(); + } + } + } + return getDeleteSecretMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest, + com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse> + getListSecretVersionsMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "ListSecretVersions", + requestType = com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest.class, + responseType = com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest, + com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse> + getListSecretVersionsMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest, + com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse> + getListSecretVersionsMethod; + if ((getListSecretVersionsMethod = SecretManagerServiceGrpc.getListSecretVersionsMethod) + == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getListSecretVersionsMethod = SecretManagerServiceGrpc.getListSecretVersionsMethod) + == null) { + SecretManagerServiceGrpc.getListSecretVersionsMethod = + getListSecretVersionsMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName(generateFullMethodName(SERVICE_NAME, "ListSecretVersions")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse + .getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("ListSecretVersions")) + .build(); + } + } + } + return getListSecretVersionsMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.GetSecretVersionRequest, + com.google.cloud.secrets.v1beta1.SecretVersion> + getGetSecretVersionMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "GetSecretVersion", + requestType = com.google.cloud.secrets.v1beta1.GetSecretVersionRequest.class, + responseType = com.google.cloud.secrets.v1beta1.SecretVersion.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.GetSecretVersionRequest, + com.google.cloud.secrets.v1beta1.SecretVersion> + getGetSecretVersionMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.GetSecretVersionRequest, + com.google.cloud.secrets.v1beta1.SecretVersion> + getGetSecretVersionMethod; + if ((getGetSecretVersionMethod = SecretManagerServiceGrpc.getGetSecretVersionMethod) == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getGetSecretVersionMethod = SecretManagerServiceGrpc.getGetSecretVersionMethod) + == null) { + SecretManagerServiceGrpc.getGetSecretVersionMethod = + getGetSecretVersionMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName(generateFullMethodName(SERVICE_NAME, "GetSecretVersion")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secrets.v1beta1.GetSecretVersionRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secrets.v1beta1.SecretVersion.getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("GetSecretVersion")) + .build(); + } + } + } + return getGetSecretVersionMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest, + com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse> + getAccessSecretVersionMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "AccessSecretVersion", + requestType = com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest.class, + responseType = com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest, + com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse> + getAccessSecretVersionMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest, + com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse> + getAccessSecretVersionMethod; + if ((getAccessSecretVersionMethod = SecretManagerServiceGrpc.getAccessSecretVersionMethod) + == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getAccessSecretVersionMethod = SecretManagerServiceGrpc.getAccessSecretVersionMethod) + == null) { + SecretManagerServiceGrpc.getAccessSecretVersionMethod = + getAccessSecretVersionMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + generateFullMethodName(SERVICE_NAME, "AccessSecretVersion")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse + .getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("AccessSecretVersion")) + .build(); + } + } + } + return getAccessSecretVersionMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest, + com.google.cloud.secrets.v1beta1.SecretVersion> + getDisableSecretVersionMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "DisableSecretVersion", + requestType = com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest.class, + responseType = com.google.cloud.secrets.v1beta1.SecretVersion.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest, + com.google.cloud.secrets.v1beta1.SecretVersion> + getDisableSecretVersionMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest, + com.google.cloud.secrets.v1beta1.SecretVersion> + getDisableSecretVersionMethod; + if ((getDisableSecretVersionMethod = SecretManagerServiceGrpc.getDisableSecretVersionMethod) + == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getDisableSecretVersionMethod = SecretManagerServiceGrpc.getDisableSecretVersionMethod) + == null) { + SecretManagerServiceGrpc.getDisableSecretVersionMethod = + getDisableSecretVersionMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + generateFullMethodName(SERVICE_NAME, "DisableSecretVersion")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secrets.v1beta1.SecretVersion.getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("DisableSecretVersion")) + .build(); + } + } + } + return getDisableSecretVersionMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest, + com.google.cloud.secrets.v1beta1.SecretVersion> + getEnableSecretVersionMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "EnableSecretVersion", + requestType = com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest.class, + responseType = com.google.cloud.secrets.v1beta1.SecretVersion.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest, + com.google.cloud.secrets.v1beta1.SecretVersion> + getEnableSecretVersionMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest, + com.google.cloud.secrets.v1beta1.SecretVersion> + getEnableSecretVersionMethod; + if ((getEnableSecretVersionMethod = SecretManagerServiceGrpc.getEnableSecretVersionMethod) + == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getEnableSecretVersionMethod = SecretManagerServiceGrpc.getEnableSecretVersionMethod) + == null) { + SecretManagerServiceGrpc.getEnableSecretVersionMethod = + getEnableSecretVersionMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + generateFullMethodName(SERVICE_NAME, "EnableSecretVersion")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secrets.v1beta1.SecretVersion.getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("EnableSecretVersion")) + .build(); + } + } + } + return getEnableSecretVersionMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest, + com.google.cloud.secrets.v1beta1.SecretVersion> + getDestroySecretVersionMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "DestroySecretVersion", + requestType = com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest.class, + responseType = com.google.cloud.secrets.v1beta1.SecretVersion.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest, + com.google.cloud.secrets.v1beta1.SecretVersion> + getDestroySecretVersionMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest, + com.google.cloud.secrets.v1beta1.SecretVersion> + getDestroySecretVersionMethod; + if ((getDestroySecretVersionMethod = SecretManagerServiceGrpc.getDestroySecretVersionMethod) + == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getDestroySecretVersionMethod = SecretManagerServiceGrpc.getDestroySecretVersionMethod) + == null) { + SecretManagerServiceGrpc.getDestroySecretVersionMethod = + getDestroySecretVersionMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + generateFullMethodName(SERVICE_NAME, "DestroySecretVersion")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secrets.v1beta1.SecretVersion.getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("DestroySecretVersion")) + .build(); + } + } + } + return getDestroySecretVersionMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.iam.v1.SetIamPolicyRequest, com.google.iam.v1.Policy> + getSetIamPolicyMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "SetIamPolicy", + requestType = com.google.iam.v1.SetIamPolicyRequest.class, + responseType = com.google.iam.v1.Policy.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.iam.v1.SetIamPolicyRequest, com.google.iam.v1.Policy> + getSetIamPolicyMethod() { + io.grpc.MethodDescriptor + getSetIamPolicyMethod; + if ((getSetIamPolicyMethod = SecretManagerServiceGrpc.getSetIamPolicyMethod) == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getSetIamPolicyMethod = SecretManagerServiceGrpc.getSetIamPolicyMethod) == null) { + SecretManagerServiceGrpc.getSetIamPolicyMethod = + getSetIamPolicyMethod = + io.grpc.MethodDescriptor + .newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName(generateFullMethodName(SERVICE_NAME, "SetIamPolicy")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.iam.v1.SetIamPolicyRequest.getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.iam.v1.Policy.getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("SetIamPolicy")) + .build(); + } + } + } + return getSetIamPolicyMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.iam.v1.GetIamPolicyRequest, com.google.iam.v1.Policy> + getGetIamPolicyMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "GetIamPolicy", + requestType = com.google.iam.v1.GetIamPolicyRequest.class, + responseType = com.google.iam.v1.Policy.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.iam.v1.GetIamPolicyRequest, com.google.iam.v1.Policy> + getGetIamPolicyMethod() { + io.grpc.MethodDescriptor + getGetIamPolicyMethod; + if ((getGetIamPolicyMethod = SecretManagerServiceGrpc.getGetIamPolicyMethod) == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getGetIamPolicyMethod = SecretManagerServiceGrpc.getGetIamPolicyMethod) == null) { + SecretManagerServiceGrpc.getGetIamPolicyMethod = + getGetIamPolicyMethod = + io.grpc.MethodDescriptor + .newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName(generateFullMethodName(SERVICE_NAME, "GetIamPolicy")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.iam.v1.GetIamPolicyRequest.getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.iam.v1.Policy.getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("GetIamPolicy")) + .build(); + } + } + } + return getGetIamPolicyMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.iam.v1.TestIamPermissionsRequest, com.google.iam.v1.TestIamPermissionsResponse> + getTestIamPermissionsMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "TestIamPermissions", + requestType = com.google.iam.v1.TestIamPermissionsRequest.class, + responseType = com.google.iam.v1.TestIamPermissionsResponse.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.iam.v1.TestIamPermissionsRequest, com.google.iam.v1.TestIamPermissionsResponse> + getTestIamPermissionsMethod() { + io.grpc.MethodDescriptor< + com.google.iam.v1.TestIamPermissionsRequest, + com.google.iam.v1.TestIamPermissionsResponse> + getTestIamPermissionsMethod; + if ((getTestIamPermissionsMethod = SecretManagerServiceGrpc.getTestIamPermissionsMethod) + == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getTestIamPermissionsMethod = SecretManagerServiceGrpc.getTestIamPermissionsMethod) + == null) { + SecretManagerServiceGrpc.getTestIamPermissionsMethod = + getTestIamPermissionsMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName(generateFullMethodName(SERVICE_NAME, "TestIamPermissions")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.iam.v1.TestIamPermissionsRequest.getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.iam.v1.TestIamPermissionsResponse.getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("TestIamPermissions")) + .build(); + } + } + } + return getTestIamPermissionsMethod; + } + + /** Creates a new async stub that supports all call types for the service */ + public static SecretManagerServiceStub newStub(io.grpc.Channel channel) { + return new SecretManagerServiceStub(channel); + } + + /** + * Creates a new blocking-style stub that supports unary and streaming output calls on the service + */ + public static SecretManagerServiceBlockingStub newBlockingStub(io.grpc.Channel channel) { + return new SecretManagerServiceBlockingStub(channel); + } + + /** Creates a new ListenableFuture-style stub that supports unary calls on the service */ + public static SecretManagerServiceFutureStub newFutureStub(io.grpc.Channel channel) { + return new SecretManagerServiceFutureStub(channel); + } + + /** + * + * + *
+   * Secret Manager Service
+   * Manages secrets and operations using those secrets. Implements a REST
+   * model with the following objects:
+   * * [Secret][google.cloud.secrets.v1beta1.Secret]
+   * * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
+   * 
+ */ + public abstract static class SecretManagerServiceImplBase implements io.grpc.BindableService { + + /** + * + * + *
+     * Lists [Secrets][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public void listSecrets( + com.google.cloud.secrets.v1beta1.ListSecretsRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + asyncUnimplementedUnaryCall(getListSecretsMethod(), responseObserver); + } + + /** + * + * + *
+     * Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + public void createSecret( + com.google.cloud.secrets.v1beta1.CreateSecretRequest request, + io.grpc.stub.StreamObserver responseObserver) { + asyncUnimplementedUnaryCall(getCreateSecretMethod(), responseObserver); + } + + /** + * + * + *
+     * Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret data and attaches
+     * it to an existing [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public void addSecretVersion( + com.google.cloud.secrets.v1beta1.AddSecretVersionRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + asyncUnimplementedUnaryCall(getAddSecretVersionMethod(), responseObserver); + } + + /** + * + * + *
+     * Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public void getSecret( + com.google.cloud.secrets.v1beta1.GetSecretRequest request, + io.grpc.stub.StreamObserver responseObserver) { + asyncUnimplementedUnaryCall(getGetSecretMethod(), responseObserver); + } + + /** + * + * + *
+     * Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public void updateSecret( + com.google.cloud.secrets.v1beta1.UpdateSecretRequest request, + io.grpc.stub.StreamObserver responseObserver) { + asyncUnimplementedUnaryCall(getUpdateSecretMethod(), responseObserver); + } + + /** + * + * + *
+     * Deletes a [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public void deleteSecret( + com.google.cloud.secrets.v1beta1.DeleteSecretRequest request, + io.grpc.stub.StreamObserver responseObserver) { + asyncUnimplementedUnaryCall(getDeleteSecretMethod(), responseObserver); + } + + /** + * + * + *
+     * Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return secret
+     * data.
+     * 
+ */ + public void listSecretVersions( + com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + asyncUnimplementedUnaryCall(getListSecretVersionsMethod(), responseObserver); + } + + /** + * + * + *
+     * Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + public void getSecretVersion( + com.google.cloud.secrets.v1beta1.GetSecretVersionRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + asyncUnimplementedUnaryCall(getGetSecretVersionMethod(), responseObserver); + } + + /** + * + * + *
+     * Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the secret data.
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + public void accessSecretVersion( + com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + asyncUnimplementedUnaryCall(getAccessSecretVersionMethod(), responseObserver); + } + + /** + * + * + *
+     * Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED].
+     * 
+ */ + public void disableSecretVersion( + com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + asyncUnimplementedUnaryCall(getDisableSecretVersionMethod(), responseObserver); + } + + /** + * + * + *
+     * Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED].
+     * 
+ */ + public void enableSecretVersion( + com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + asyncUnimplementedUnaryCall(getEnableSecretVersionMethod(), responseObserver); + } + + /** + * + * + *
+     * Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably destroys the
+     * secret data.
+     * 
+ */ + public void destroySecretVersion( + com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + asyncUnimplementedUnaryCall(getDestroySecretVersionMethod(), responseObserver); + } + + /** + * + * + *
+     * Sets the access control policy on the specified secret. Replaces any
+     * existing policy.
+     * Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced according
+     * to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public void setIamPolicy( + com.google.iam.v1.SetIamPolicyRequest request, + io.grpc.stub.StreamObserver responseObserver) { + asyncUnimplementedUnaryCall(getSetIamPolicyMethod(), responseObserver); + } + + /** + * + * + *
+     * Gets the access control policy for a secret.
+     * Returns empty policy if the secret exists and does not have a policy set.
+     * 
+ */ + public void getIamPolicy( + com.google.iam.v1.GetIamPolicyRequest request, + io.grpc.stub.StreamObserver responseObserver) { + asyncUnimplementedUnaryCall(getGetIamPolicyMethod(), responseObserver); + } + + /** + * + * + *
+     * Returns permissions that a caller has for the specified secret.
+     * If the secret does not exist, this call returns an empty set of
+     * permissions, not a NOT_FOUND error.
+     * Note: This operation is designed to be used for building permission-aware
+     * UIs and command-line tools, not for authorization checking. This operation
+     * may "fail open" without warning.
+     * 
+ */ + public void testIamPermissions( + com.google.iam.v1.TestIamPermissionsRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + asyncUnimplementedUnaryCall(getTestIamPermissionsMethod(), responseObserver); + } + + @java.lang.Override + public final io.grpc.ServerServiceDefinition bindService() { + return io.grpc.ServerServiceDefinition.builder(getServiceDescriptor()) + .addMethod( + getListSecretsMethod(), + asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secrets.v1beta1.ListSecretsRequest, + com.google.cloud.secrets.v1beta1.ListSecretsResponse>( + this, METHODID_LIST_SECRETS))) + .addMethod( + getCreateSecretMethod(), + asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secrets.v1beta1.CreateSecretRequest, + com.google.cloud.secrets.v1beta1.Secret>(this, METHODID_CREATE_SECRET))) + .addMethod( + getAddSecretVersionMethod(), + asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secrets.v1beta1.AddSecretVersionRequest, + com.google.cloud.secrets.v1beta1.SecretVersion>( + this, METHODID_ADD_SECRET_VERSION))) + .addMethod( + getGetSecretMethod(), + asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secrets.v1beta1.GetSecretRequest, + com.google.cloud.secrets.v1beta1.Secret>(this, METHODID_GET_SECRET))) + .addMethod( + getUpdateSecretMethod(), + asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secrets.v1beta1.UpdateSecretRequest, + com.google.cloud.secrets.v1beta1.Secret>(this, METHODID_UPDATE_SECRET))) + .addMethod( + getDeleteSecretMethod(), + asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secrets.v1beta1.DeleteSecretRequest, + com.google.protobuf.Empty>(this, METHODID_DELETE_SECRET))) + .addMethod( + getListSecretVersionsMethod(), + asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest, + com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse>( + this, METHODID_LIST_SECRET_VERSIONS))) + .addMethod( + getGetSecretVersionMethod(), + asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secrets.v1beta1.GetSecretVersionRequest, + com.google.cloud.secrets.v1beta1.SecretVersion>( + this, METHODID_GET_SECRET_VERSION))) + .addMethod( + getAccessSecretVersionMethod(), + asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest, + com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse>( + this, METHODID_ACCESS_SECRET_VERSION))) + .addMethod( + getDisableSecretVersionMethod(), + asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest, + com.google.cloud.secrets.v1beta1.SecretVersion>( + this, METHODID_DISABLE_SECRET_VERSION))) + .addMethod( + getEnableSecretVersionMethod(), + asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest, + com.google.cloud.secrets.v1beta1.SecretVersion>( + this, METHODID_ENABLE_SECRET_VERSION))) + .addMethod( + getDestroySecretVersionMethod(), + asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest, + com.google.cloud.secrets.v1beta1.SecretVersion>( + this, METHODID_DESTROY_SECRET_VERSION))) + .addMethod( + getSetIamPolicyMethod(), + asyncUnaryCall( + new MethodHandlers< + com.google.iam.v1.SetIamPolicyRequest, com.google.iam.v1.Policy>( + this, METHODID_SET_IAM_POLICY))) + .addMethod( + getGetIamPolicyMethod(), + asyncUnaryCall( + new MethodHandlers< + com.google.iam.v1.GetIamPolicyRequest, com.google.iam.v1.Policy>( + this, METHODID_GET_IAM_POLICY))) + .addMethod( + getTestIamPermissionsMethod(), + asyncUnaryCall( + new MethodHandlers< + com.google.iam.v1.TestIamPermissionsRequest, + com.google.iam.v1.TestIamPermissionsResponse>( + this, METHODID_TEST_IAM_PERMISSIONS))) + .build(); + } + } + + /** + * + * + *
+   * Secret Manager Service
+   * Manages secrets and operations using those secrets. Implements a REST
+   * model with the following objects:
+   * * [Secret][google.cloud.secrets.v1beta1.Secret]
+   * * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
+   * 
+ */ + public static final class SecretManagerServiceStub + extends io.grpc.stub.AbstractStub { + private SecretManagerServiceStub(io.grpc.Channel channel) { + super(channel); + } + + private SecretManagerServiceStub(io.grpc.Channel channel, io.grpc.CallOptions callOptions) { + super(channel, callOptions); + } + + @java.lang.Override + protected SecretManagerServiceStub build( + io.grpc.Channel channel, io.grpc.CallOptions callOptions) { + return new SecretManagerServiceStub(channel, callOptions); + } + + /** + * + * + *
+     * Lists [Secrets][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public void listSecrets( + com.google.cloud.secrets.v1beta1.ListSecretsRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + asyncUnaryCall( + getChannel().newCall(getListSecretsMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + public void createSecret( + com.google.cloud.secrets.v1beta1.CreateSecretRequest request, + io.grpc.stub.StreamObserver responseObserver) { + asyncUnaryCall( + getChannel().newCall(getCreateSecretMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret data and attaches
+     * it to an existing [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public void addSecretVersion( + com.google.cloud.secrets.v1beta1.AddSecretVersionRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + asyncUnaryCall( + getChannel().newCall(getAddSecretVersionMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public void getSecret( + com.google.cloud.secrets.v1beta1.GetSecretRequest request, + io.grpc.stub.StreamObserver responseObserver) { + asyncUnaryCall( + getChannel().newCall(getGetSecretMethod(), getCallOptions()), request, responseObserver); + } + + /** + * + * + *
+     * Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public void updateSecret( + com.google.cloud.secrets.v1beta1.UpdateSecretRequest request, + io.grpc.stub.StreamObserver responseObserver) { + asyncUnaryCall( + getChannel().newCall(getUpdateSecretMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Deletes a [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public void deleteSecret( + com.google.cloud.secrets.v1beta1.DeleteSecretRequest request, + io.grpc.stub.StreamObserver responseObserver) { + asyncUnaryCall( + getChannel().newCall(getDeleteSecretMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return secret
+     * data.
+     * 
+ */ + public void listSecretVersions( + com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + asyncUnaryCall( + getChannel().newCall(getListSecretVersionsMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + public void getSecretVersion( + com.google.cloud.secrets.v1beta1.GetSecretVersionRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + asyncUnaryCall( + getChannel().newCall(getGetSecretVersionMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the secret data.
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + public void accessSecretVersion( + com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + asyncUnaryCall( + getChannel().newCall(getAccessSecretVersionMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED].
+     * 
+ */ + public void disableSecretVersion( + com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + asyncUnaryCall( + getChannel().newCall(getDisableSecretVersionMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED].
+     * 
+ */ + public void enableSecretVersion( + com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + asyncUnaryCall( + getChannel().newCall(getEnableSecretVersionMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably destroys the
+     * secret data.
+     * 
+ */ + public void destroySecretVersion( + com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + asyncUnaryCall( + getChannel().newCall(getDestroySecretVersionMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Sets the access control policy on the specified secret. Replaces any
+     * existing policy.
+     * Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced according
+     * to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public void setIamPolicy( + com.google.iam.v1.SetIamPolicyRequest request, + io.grpc.stub.StreamObserver responseObserver) { + asyncUnaryCall( + getChannel().newCall(getSetIamPolicyMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Gets the access control policy for a secret.
+     * Returns empty policy if the secret exists and does not have a policy set.
+     * 
+ */ + public void getIamPolicy( + com.google.iam.v1.GetIamPolicyRequest request, + io.grpc.stub.StreamObserver responseObserver) { + asyncUnaryCall( + getChannel().newCall(getGetIamPolicyMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Returns permissions that a caller has for the specified secret.
+     * If the secret does not exist, this call returns an empty set of
+     * permissions, not a NOT_FOUND error.
+     * Note: This operation is designed to be used for building permission-aware
+     * UIs and command-line tools, not for authorization checking. This operation
+     * may "fail open" without warning.
+     * 
+ */ + public void testIamPermissions( + com.google.iam.v1.TestIamPermissionsRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + asyncUnaryCall( + getChannel().newCall(getTestIamPermissionsMethod(), getCallOptions()), + request, + responseObserver); + } + } + + /** + * + * + *
+   * Secret Manager Service
+   * Manages secrets and operations using those secrets. Implements a REST
+   * model with the following objects:
+   * * [Secret][google.cloud.secrets.v1beta1.Secret]
+   * * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
+   * 
+ */ + public static final class SecretManagerServiceBlockingStub + extends io.grpc.stub.AbstractStub { + private SecretManagerServiceBlockingStub(io.grpc.Channel channel) { + super(channel); + } + + private SecretManagerServiceBlockingStub( + io.grpc.Channel channel, io.grpc.CallOptions callOptions) { + super(channel, callOptions); + } + + @java.lang.Override + protected SecretManagerServiceBlockingStub build( + io.grpc.Channel channel, io.grpc.CallOptions callOptions) { + return new SecretManagerServiceBlockingStub(channel, callOptions); + } + + /** + * + * + *
+     * Lists [Secrets][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.cloud.secrets.v1beta1.ListSecretsResponse listSecrets( + com.google.cloud.secrets.v1beta1.ListSecretsRequest request) { + return blockingUnaryCall(getChannel(), getListSecretsMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + public com.google.cloud.secrets.v1beta1.Secret createSecret( + com.google.cloud.secrets.v1beta1.CreateSecretRequest request) { + return blockingUnaryCall(getChannel(), getCreateSecretMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret data and attaches
+     * it to an existing [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.cloud.secrets.v1beta1.SecretVersion addSecretVersion( + com.google.cloud.secrets.v1beta1.AddSecretVersionRequest request) { + return blockingUnaryCall( + getChannel(), getAddSecretVersionMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.cloud.secrets.v1beta1.Secret getSecret( + com.google.cloud.secrets.v1beta1.GetSecretRequest request) { + return blockingUnaryCall(getChannel(), getGetSecretMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.cloud.secrets.v1beta1.Secret updateSecret( + com.google.cloud.secrets.v1beta1.UpdateSecretRequest request) { + return blockingUnaryCall(getChannel(), getUpdateSecretMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Deletes a [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.protobuf.Empty deleteSecret( + com.google.cloud.secrets.v1beta1.DeleteSecretRequest request) { + return blockingUnaryCall(getChannel(), getDeleteSecretMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return secret
+     * data.
+     * 
+ */ + public com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse listSecretVersions( + com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest request) { + return blockingUnaryCall( + getChannel(), getListSecretVersionsMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + public com.google.cloud.secrets.v1beta1.SecretVersion getSecretVersion( + com.google.cloud.secrets.v1beta1.GetSecretVersionRequest request) { + return blockingUnaryCall( + getChannel(), getGetSecretVersionMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the secret data.
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + public com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse accessSecretVersion( + com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest request) { + return blockingUnaryCall( + getChannel(), getAccessSecretVersionMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED].
+     * 
+ */ + public com.google.cloud.secrets.v1beta1.SecretVersion disableSecretVersion( + com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest request) { + return blockingUnaryCall( + getChannel(), getDisableSecretVersionMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED].
+     * 
+ */ + public com.google.cloud.secrets.v1beta1.SecretVersion enableSecretVersion( + com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest request) { + return blockingUnaryCall( + getChannel(), getEnableSecretVersionMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably destroys the
+     * secret data.
+     * 
+ */ + public com.google.cloud.secrets.v1beta1.SecretVersion destroySecretVersion( + com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest request) { + return blockingUnaryCall( + getChannel(), getDestroySecretVersionMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Sets the access control policy on the specified secret. Replaces any
+     * existing policy.
+     * Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced according
+     * to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.iam.v1.Policy setIamPolicy(com.google.iam.v1.SetIamPolicyRequest request) { + return blockingUnaryCall(getChannel(), getSetIamPolicyMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Gets the access control policy for a secret.
+     * Returns empty policy if the secret exists and does not have a policy set.
+     * 
+ */ + public com.google.iam.v1.Policy getIamPolicy(com.google.iam.v1.GetIamPolicyRequest request) { + return blockingUnaryCall(getChannel(), getGetIamPolicyMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Returns permissions that a caller has for the specified secret.
+     * If the secret does not exist, this call returns an empty set of
+     * permissions, not a NOT_FOUND error.
+     * Note: This operation is designed to be used for building permission-aware
+     * UIs and command-line tools, not for authorization checking. This operation
+     * may "fail open" without warning.
+     * 
+ */ + public com.google.iam.v1.TestIamPermissionsResponse testIamPermissions( + com.google.iam.v1.TestIamPermissionsRequest request) { + return blockingUnaryCall( + getChannel(), getTestIamPermissionsMethod(), getCallOptions(), request); + } + } + + /** + * + * + *
+   * Secret Manager Service
+   * Manages secrets and operations using those secrets. Implements a REST
+   * model with the following objects:
+   * * [Secret][google.cloud.secrets.v1beta1.Secret]
+   * * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
+   * 
+ */ + public static final class SecretManagerServiceFutureStub + extends io.grpc.stub.AbstractStub { + private SecretManagerServiceFutureStub(io.grpc.Channel channel) { + super(channel); + } + + private SecretManagerServiceFutureStub( + io.grpc.Channel channel, io.grpc.CallOptions callOptions) { + super(channel, callOptions); + } + + @java.lang.Override + protected SecretManagerServiceFutureStub build( + io.grpc.Channel channel, io.grpc.CallOptions callOptions) { + return new SecretManagerServiceFutureStub(channel, callOptions); + } + + /** + * + * + *
+     * Lists [Secrets][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.cloud.secrets.v1beta1.ListSecretsResponse> + listSecrets(com.google.cloud.secrets.v1beta1.ListSecretsRequest request) { + return futureUnaryCall( + getChannel().newCall(getListSecretsMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.cloud.secrets.v1beta1.Secret> + createSecret(com.google.cloud.secrets.v1beta1.CreateSecretRequest request) { + return futureUnaryCall( + getChannel().newCall(getCreateSecretMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret data and attaches
+     * it to an existing [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.cloud.secrets.v1beta1.SecretVersion> + addSecretVersion(com.google.cloud.secrets.v1beta1.AddSecretVersionRequest request) { + return futureUnaryCall( + getChannel().newCall(getAddSecretVersionMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.cloud.secrets.v1beta1.Secret> + getSecret(com.google.cloud.secrets.v1beta1.GetSecretRequest request) { + return futureUnaryCall(getChannel().newCall(getGetSecretMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.cloud.secrets.v1beta1.Secret> + updateSecret(com.google.cloud.secrets.v1beta1.UpdateSecretRequest request) { + return futureUnaryCall( + getChannel().newCall(getUpdateSecretMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Deletes a [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture + deleteSecret(com.google.cloud.secrets.v1beta1.DeleteSecretRequest request) { + return futureUnaryCall( + getChannel().newCall(getDeleteSecretMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return secret
+     * data.
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse> + listSecretVersions(com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest request) { + return futureUnaryCall( + getChannel().newCall(getListSecretVersionsMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.cloud.secrets.v1beta1.SecretVersion> + getSecretVersion(com.google.cloud.secrets.v1beta1.GetSecretVersionRequest request) { + return futureUnaryCall( + getChannel().newCall(getGetSecretVersionMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the secret data.
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse> + accessSecretVersion(com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest request) { + return futureUnaryCall( + getChannel().newCall(getAccessSecretVersionMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED].
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.cloud.secrets.v1beta1.SecretVersion> + disableSecretVersion(com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest request) { + return futureUnaryCall( + getChannel().newCall(getDisableSecretVersionMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED].
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.cloud.secrets.v1beta1.SecretVersion> + enableSecretVersion(com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest request) { + return futureUnaryCall( + getChannel().newCall(getEnableSecretVersionMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably destroys the
+     * secret data.
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.cloud.secrets.v1beta1.SecretVersion> + destroySecretVersion(com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest request) { + return futureUnaryCall( + getChannel().newCall(getDestroySecretVersionMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Sets the access control policy on the specified secret. Replaces any
+     * existing policy.
+     * Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced according
+     * to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture + setIamPolicy(com.google.iam.v1.SetIamPolicyRequest request) { + return futureUnaryCall( + getChannel().newCall(getSetIamPolicyMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Gets the access control policy for a secret.
+     * Returns empty policy if the secret exists and does not have a policy set.
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture + getIamPolicy(com.google.iam.v1.GetIamPolicyRequest request) { + return futureUnaryCall( + getChannel().newCall(getGetIamPolicyMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Returns permissions that a caller has for the specified secret.
+     * If the secret does not exist, this call returns an empty set of
+     * permissions, not a NOT_FOUND error.
+     * Note: This operation is designed to be used for building permission-aware
+     * UIs and command-line tools, not for authorization checking. This operation
+     * may "fail open" without warning.
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.iam.v1.TestIamPermissionsResponse> + testIamPermissions(com.google.iam.v1.TestIamPermissionsRequest request) { + return futureUnaryCall( + getChannel().newCall(getTestIamPermissionsMethod(), getCallOptions()), request); + } + } + + private static final int METHODID_LIST_SECRETS = 0; + private static final int METHODID_CREATE_SECRET = 1; + private static final int METHODID_ADD_SECRET_VERSION = 2; + private static final int METHODID_GET_SECRET = 3; + private static final int METHODID_UPDATE_SECRET = 4; + private static final int METHODID_DELETE_SECRET = 5; + private static final int METHODID_LIST_SECRET_VERSIONS = 6; + private static final int METHODID_GET_SECRET_VERSION = 7; + private static final int METHODID_ACCESS_SECRET_VERSION = 8; + private static final int METHODID_DISABLE_SECRET_VERSION = 9; + private static final int METHODID_ENABLE_SECRET_VERSION = 10; + private static final int METHODID_DESTROY_SECRET_VERSION = 11; + private static final int METHODID_SET_IAM_POLICY = 12; + private static final int METHODID_GET_IAM_POLICY = 13; + private static final int METHODID_TEST_IAM_PERMISSIONS = 14; + + private static final class MethodHandlers + implements io.grpc.stub.ServerCalls.UnaryMethod, + io.grpc.stub.ServerCalls.ServerStreamingMethod, + io.grpc.stub.ServerCalls.ClientStreamingMethod, + io.grpc.stub.ServerCalls.BidiStreamingMethod { + private final SecretManagerServiceImplBase serviceImpl; + private final int methodId; + + MethodHandlers(SecretManagerServiceImplBase serviceImpl, int methodId) { + this.serviceImpl = serviceImpl; + this.methodId = methodId; + } + + @java.lang.Override + @java.lang.SuppressWarnings("unchecked") + public void invoke(Req request, io.grpc.stub.StreamObserver responseObserver) { + switch (methodId) { + case METHODID_LIST_SECRETS: + serviceImpl.listSecrets( + (com.google.cloud.secrets.v1beta1.ListSecretsRequest) request, + (io.grpc.stub.StreamObserver) + responseObserver); + break; + case METHODID_CREATE_SECRET: + serviceImpl.createSecret( + (com.google.cloud.secrets.v1beta1.CreateSecretRequest) request, + (io.grpc.stub.StreamObserver) + responseObserver); + break; + case METHODID_ADD_SECRET_VERSION: + serviceImpl.addSecretVersion( + (com.google.cloud.secrets.v1beta1.AddSecretVersionRequest) request, + (io.grpc.stub.StreamObserver) + responseObserver); + break; + case METHODID_GET_SECRET: + serviceImpl.getSecret( + (com.google.cloud.secrets.v1beta1.GetSecretRequest) request, + (io.grpc.stub.StreamObserver) + responseObserver); + break; + case METHODID_UPDATE_SECRET: + serviceImpl.updateSecret( + (com.google.cloud.secrets.v1beta1.UpdateSecretRequest) request, + (io.grpc.stub.StreamObserver) + responseObserver); + break; + case METHODID_DELETE_SECRET: + serviceImpl.deleteSecret( + (com.google.cloud.secrets.v1beta1.DeleteSecretRequest) request, + (io.grpc.stub.StreamObserver) responseObserver); + break; + case METHODID_LIST_SECRET_VERSIONS: + serviceImpl.listSecretVersions( + (com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest) request, + (io.grpc.stub.StreamObserver< + com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse>) + responseObserver); + break; + case METHODID_GET_SECRET_VERSION: + serviceImpl.getSecretVersion( + (com.google.cloud.secrets.v1beta1.GetSecretVersionRequest) request, + (io.grpc.stub.StreamObserver) + responseObserver); + break; + case METHODID_ACCESS_SECRET_VERSION: + serviceImpl.accessSecretVersion( + (com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest) request, + (io.grpc.stub.StreamObserver< + com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse>) + responseObserver); + break; + case METHODID_DISABLE_SECRET_VERSION: + serviceImpl.disableSecretVersion( + (com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest) request, + (io.grpc.stub.StreamObserver) + responseObserver); + break; + case METHODID_ENABLE_SECRET_VERSION: + serviceImpl.enableSecretVersion( + (com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest) request, + (io.grpc.stub.StreamObserver) + responseObserver); + break; + case METHODID_DESTROY_SECRET_VERSION: + serviceImpl.destroySecretVersion( + (com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest) request, + (io.grpc.stub.StreamObserver) + responseObserver); + break; + case METHODID_SET_IAM_POLICY: + serviceImpl.setIamPolicy( + (com.google.iam.v1.SetIamPolicyRequest) request, + (io.grpc.stub.StreamObserver) responseObserver); + break; + case METHODID_GET_IAM_POLICY: + serviceImpl.getIamPolicy( + (com.google.iam.v1.GetIamPolicyRequest) request, + (io.grpc.stub.StreamObserver) responseObserver); + break; + case METHODID_TEST_IAM_PERMISSIONS: + serviceImpl.testIamPermissions( + (com.google.iam.v1.TestIamPermissionsRequest) request, + (io.grpc.stub.StreamObserver) + responseObserver); + break; + default: + throw new AssertionError(); + } + } + + @java.lang.Override + @java.lang.SuppressWarnings("unchecked") + public io.grpc.stub.StreamObserver invoke( + io.grpc.stub.StreamObserver responseObserver) { + switch (methodId) { + default: + throw new AssertionError(); + } + } + } + + private abstract static class SecretManagerServiceBaseDescriptorSupplier + implements io.grpc.protobuf.ProtoFileDescriptorSupplier, + io.grpc.protobuf.ProtoServiceDescriptorSupplier { + SecretManagerServiceBaseDescriptorSupplier() {} + + @java.lang.Override + public com.google.protobuf.Descriptors.FileDescriptor getFileDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto.getDescriptor(); + } + + @java.lang.Override + public com.google.protobuf.Descriptors.ServiceDescriptor getServiceDescriptor() { + return getFileDescriptor().findServiceByName("SecretManagerService"); + } + } + + private static final class SecretManagerServiceFileDescriptorSupplier + extends SecretManagerServiceBaseDescriptorSupplier { + SecretManagerServiceFileDescriptorSupplier() {} + } + + private static final class SecretManagerServiceMethodDescriptorSupplier + extends SecretManagerServiceBaseDescriptorSupplier + implements io.grpc.protobuf.ProtoMethodDescriptorSupplier { + private final String methodName; + + SecretManagerServiceMethodDescriptorSupplier(String methodName) { + this.methodName = methodName; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.MethodDescriptor getMethodDescriptor() { + return getServiceDescriptor().findMethodByName(methodName); + } + } + + private static volatile io.grpc.ServiceDescriptor serviceDescriptor; + + public static io.grpc.ServiceDescriptor getServiceDescriptor() { + io.grpc.ServiceDescriptor result = serviceDescriptor; + if (result == null) { + synchronized (SecretManagerServiceGrpc.class) { + result = serviceDescriptor; + if (result == null) { + serviceDescriptor = + result = + io.grpc.ServiceDescriptor.newBuilder(SERVICE_NAME) + .setSchemaDescriptor(new SecretManagerServiceFileDescriptorSupplier()) + .addMethod(getListSecretsMethod()) + .addMethod(getCreateSecretMethod()) + .addMethod(getAddSecretVersionMethod()) + .addMethod(getGetSecretMethod()) + .addMethod(getUpdateSecretMethod()) + .addMethod(getDeleteSecretMethod()) + .addMethod(getListSecretVersionsMethod()) + .addMethod(getGetSecretVersionMethod()) + .addMethod(getAccessSecretVersionMethod()) + .addMethod(getDisableSecretVersionMethod()) + .addMethod(getEnableSecretVersionMethod()) + .addMethod(getDestroySecretVersionMethod()) + .addMethod(getSetIamPolicyMethod()) + .addMethod(getGetIamPolicyMethod()) + .addMethod(getTestIamPermissionsMethod()) + .build(); + } + } + } + return result; + } +} diff --git a/java.header b/java.header new file mode 100644 index 00000000..3a9b503a --- /dev/null +++ b/java.header @@ -0,0 +1,15 @@ +^/\*$ +^ \* Copyright \d\d\d\d,? Google (Inc\.|LLC)( All [rR]ights [rR]eserved\.)?$ +^ \*$ +^ \* Licensed under the Apache License, Version 2\.0 \(the "License"\);$ +^ \* you may not use this file except in compliance with the License\.$ +^ \* You may obtain a copy of the License at$ +^ \*$ +^ \*[ ]+https?://www.apache.org/licenses/LICENSE-2\.0$ +^ \*$ +^ \* Unless required by applicable law or agreed to in writing, software$ +^ \* distributed under the License is distributed on an "AS IS" BASIS,$ +^ \* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied\.$ +^ \* See the License for the specific language governing permissions and$ +^ \* limitations under the License\.$ +^ \*/$ diff --git a/license-checks.xml b/license-checks.xml new file mode 100644 index 00000000..6597fced --- /dev/null +++ b/license-checks.xml @@ -0,0 +1,10 @@ + + + + + + + + diff --git a/pom.xml b/pom.xml new file mode 100644 index 00000000..84845f2a --- /dev/null +++ b/pom.xml @@ -0,0 +1,261 @@ + + + 4.0.0 + com.google.cloud + google-cloud-secretmanager-parent + pom + 0.0.1-SNAPSHOT + Google Cloud secretmanager Parent + https://github.com/googleapis/java-secretmanager + + Java idiomatic client for Google Cloud Platform services. + + + + com.google.cloud + google-cloud-shared-config + 0.3.0 + + + + + chingor + Jeff Ching + chingor@google.com + Google + + Developer + + + + + Google LLC + + + scm:git:git@github.com:googleapis/java-secretmanager.git + scm:git:git@github.com:googleapis/java-secretmanager.git + https://github.com/googleapis/java-secretmanager + HEAD + + + https://github.com/googleapis/java-secretmanager/issues + GitHub Issues + + + + sonatype-nexus-snapshots + https://oss.sonatype.org/content/repositories/snapshots + + + sonatype-nexus-staging + https://oss.sonatype.org/service/local/staging/deploy/maven2/ + + + + + Apache-2.0 + https://www.apache.org/licenses/LICENSE-2.0.txt + + + + + UTF-8 + UTF-8 + github + google-cloud-secretmanager-parent + 1.91.3 + 1.8.1 + 1.17.0 + 1.51.0 + 1.25.0 + 3.11.1 + 4.12 + 28.1-android + 1.4.0 + 1.3.2 + 1.18 + + + + + + com.google.api.grpc + proto-google-cloud-secretmanager-v1beta1 + 0.0.1-SNAPSHOT + + + com.google.api.grpc + grpc-google-cloud-secretmanager-v1beta1 + 0.0.1-SNAPSHOT + + + com.google.cloud + google-cloud-secretmanager + 0.0.1-SNAPSHOT + + + + io.grpc + grpc-bom + ${grpc.version} + pom + import + + + com.google.api + gax-bom + ${gax.version} + pom + import + + + com.google.guava + guava-bom + ${guava.version} + pom + import + + + + com.google.protobuf + protobuf-java + ${protobuf.version} + + + com.google.api + api-common + ${google.api-common.version} + + + com.google.api.grpc + proto-google-common-protos + ${google.common-protos.version} + + + org.threeten + threetenbp + ${threeten.version} + + + javax.annotation + javax.annotation-api + ${javax.annotations.version} + + + org.codehaus.mojo + animal-sniffer-annotations + ${animal-sniffer.version} + + + com.google.api.grpc + proto-google-iam-v1 + 0.13.0 + + + + junit + junit + ${junit.version} + test + + + com.google.api + gax-grpc + ${gax.version} + testlib + test + + + + + + + + + org.apache.maven.plugins + maven-dependency-plugin + + org.objenesis:objenesis + + + + + + + + proto-google-cloud-secretmanager-v1beta1 + grpc-google-cloud-secretmanager-v1beta1 + google-cloud-secretmanager + google-cloud-secretmanager-bom + + + + + + org.apache.maven.plugins + maven-project-info-reports-plugin + 3.0.0 + + + + index + dependency-info + team + ci-management + issue-management + licenses + scm + dependency-management + distribution-management + summary + modules + + + + + true + ${site.installationModule} + jar + + + + org.apache.maven.plugins + maven-javadoc-plugin + 3.1.1 + + + html + + aggregate + javadoc + + + + + none + protected + true + ${project.build.directory}/javadoc + + + Test helpers packages + com.google.cloud.testing + + + SPI packages + com.google.cloud.spi* + + + + + https://grpc.io/grpc-java/javadoc/ + https://developers.google.com/protocol-buffers/docs/reference/java/ + https://googleapis.dev/java/google-auth-library/latest/ + https://googleapis.dev/java/gax/latest/ + https://googleapis.github.io/api-common-java/${google.api-common.version}/apidocs/ + + + + + + \ No newline at end of file diff --git a/proto-google-cloud-secretmanager-v1beta1/pom.xml b/proto-google-cloud-secretmanager-v1beta1/pom.xml new file mode 100644 index 00000000..08173cde --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/pom.xml @@ -0,0 +1,37 @@ + + 4.0.0 + com.google.api.grpc + proto-google-cloud-secretmanager-v1beta1 + 0.0.1-SNAPSHOT + proto-google-cloud-secretmanager-v1beta1 + PROTO library for proto-google-cloud-secretmanager-v1beta1 + + com.google.cloud + google-cloud-secretmanager-parent + 0.0.1-SNAPSHOT + + + + com.google.protobuf + protobuf-java + + + com.google.api.grpc + proto-google-common-protos + + + com.google.guava + guava + + + com.google.api + api-common + + + com.google.api.grpc + proto-google-iam-v1 + + + \ No newline at end of file diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/AccessSecretVersionRequest.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/AccessSecretVersionRequest.java new file mode 100644 index 00000000..72f1f807 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/AccessSecretVersionRequest.java @@ -0,0 +1,656 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.AccessSecretVersionRequest} + */ +public final class AccessSecretVersionRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.AccessSecretVersionRequest) + AccessSecretVersionRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use AccessSecretVersionRequest.newBuilder() to construct. + private AccessSecretVersionRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private AccessSecretVersionRequest() { + name_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new AccessSecretVersionRequest(); + } + + @java.lang.Override + public final com.google.protobuf.UnknownFieldSet getUnknownFields() { + return this.unknownFields; + } + + private AccessSecretVersionRequest( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + this(); + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + com.google.protobuf.UnknownFieldSet.Builder unknownFields = + com.google.protobuf.UnknownFieldSet.newBuilder(); + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + java.lang.String s = input.readStringRequireUtf8(); + + name_ = s; + break; + } + default: + { + if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { + done = true; + } + break; + } + } + } + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(this); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); + } finally { + this.unknownFields = unknownFields.build(); + makeExtensionsImmutable(); + } + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest.class, + com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest.Builder.class); + } + + public static final int NAME_FIELD_NUMBER = 1; + private volatile java.lang.Object name_; + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } + } + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!getNameBytes().isEmpty()) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); + } + unknownFields.writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!getNameBytes().isEmpty()) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); + } + size += unknownFields.getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest)) { + return super.equals(obj); + } + com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest other = + (com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest) obj; + + if (!getName().equals(other.getName())) return false; + if (!unknownFields.equals(other.unknownFields)) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + NAME_FIELD_NUMBER; + hash = (53 * hash) + getName().hashCode(); + hash = (29 * hash) + unknownFields.hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.AccessSecretVersionRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.AccessSecretVersionRequest) + com.google.cloud.secrets.v1beta1.AccessSecretVersionRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest.class, + com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest.Builder.class); + } + + // Construct using com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) {} + } + + @java.lang.Override + public Builder clear() { + super.clear(); + name_ = ""; + + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest getDefaultInstanceForType() { + return com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest build() { + com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest buildPartial() { + com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest result = + new com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest(this); + result.name_ = name_; + onBuilt(); + return result; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest) { + return mergeFrom((com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest other) { + if (other == com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest.getDefaultInstance()) + return this; + if (!other.getName().isEmpty()) { + name_ = other.name_; + onChanged(); + } + this.mergeUnknownFields(other.unknownFields); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest parsedMessage = null; + try { + parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + parsedMessage = + (com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest) e.getUnfinishedMessage(); + throw e.unwrapIOException(); + } finally { + if (parsedMessage != null) { + mergeFrom(parsedMessage); + } + } + return this; + } + + private java.lang.Object name_ = ""; + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The name to set. + * @return This builder for chaining. + */ + public Builder setName(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + + name_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return This builder for chaining. + */ + public Builder clearName() { + + name_ = getDefaultInstance().getName(); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The bytes for name to set. + * @return This builder for chaining. + */ + public Builder setNameBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + + name_ = value; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.AccessSecretVersionRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.AccessSecretVersionRequest) + private static final com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest(); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public AccessSecretVersionRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return new AccessSecretVersionRequest(input, extensionRegistry); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.AccessSecretVersionRequest getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/AccessSecretVersionRequestOrBuilder.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/AccessSecretVersionRequestOrBuilder.java new file mode 100644 index 00000000..ff4fab28 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/AccessSecretVersionRequestOrBuilder.java @@ -0,0 +1,56 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +public interface AccessSecretVersionRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.AccessSecretVersionRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + java.lang.String getName(); + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + com.google.protobuf.ByteString getNameBytes(); +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/AccessSecretVersionResponse.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/AccessSecretVersionResponse.java new file mode 100644 index 00000000..efbc7390 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/AccessSecretVersionResponse.java @@ -0,0 +1,920 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +/** + * + * + *
+ * Response message for [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.AccessSecretVersionResponse} + */ +public final class AccessSecretVersionResponse extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.AccessSecretVersionResponse) + AccessSecretVersionResponseOrBuilder { + private static final long serialVersionUID = 0L; + // Use AccessSecretVersionResponse.newBuilder() to construct. + private AccessSecretVersionResponse(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private AccessSecretVersionResponse() { + name_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new AccessSecretVersionResponse(); + } + + @java.lang.Override + public final com.google.protobuf.UnknownFieldSet getUnknownFields() { + return this.unknownFields; + } + + private AccessSecretVersionResponse( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + this(); + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + com.google.protobuf.UnknownFieldSet.Builder unknownFields = + com.google.protobuf.UnknownFieldSet.newBuilder(); + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + java.lang.String s = input.readStringRequireUtf8(); + + name_ = s; + break; + } + case 18: + { + com.google.cloud.secrets.v1beta1.SecretPayload.Builder subBuilder = null; + if (payload_ != null) { + subBuilder = payload_.toBuilder(); + } + payload_ = + input.readMessage( + com.google.cloud.secrets.v1beta1.SecretPayload.parser(), extensionRegistry); + if (subBuilder != null) { + subBuilder.mergeFrom(payload_); + payload_ = subBuilder.buildPartial(); + } + + break; + } + default: + { + if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { + done = true; + } + break; + } + } + } + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(this); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); + } finally { + this.unknownFields = unknownFields.build(); + makeExtensionsImmutable(); + } + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionResponse_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionResponse_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse.class, + com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse.Builder.class); + } + + public static final int NAME_FIELD_NUMBER = 1; + private volatile java.lang.Object name_; + /** + * + * + *
+   * The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * string name = 1 [(.google.api.resource_reference) = { ... } + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } + } + /** + * + * + *
+   * The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * string name = 1 [(.google.api.resource_reference) = { ... } + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + public static final int PAYLOAD_FIELD_NUMBER = 2; + private com.google.cloud.secrets.v1beta1.SecretPayload payload_; + /** + * + * + *
+   * Secret payload
+   * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + * + * @return Whether the payload field is set. + */ + public boolean hasPayload() { + return payload_ != null; + } + /** + * + * + *
+   * Secret payload
+   * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + * + * @return The payload. + */ + public com.google.cloud.secrets.v1beta1.SecretPayload getPayload() { + return payload_ == null + ? com.google.cloud.secrets.v1beta1.SecretPayload.getDefaultInstance() + : payload_; + } + /** + * + * + *
+   * Secret payload
+   * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + */ + public com.google.cloud.secrets.v1beta1.SecretPayloadOrBuilder getPayloadOrBuilder() { + return getPayload(); + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!getNameBytes().isEmpty()) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); + } + if (payload_ != null) { + output.writeMessage(2, getPayload()); + } + unknownFields.writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!getNameBytes().isEmpty()) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); + } + if (payload_ != null) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(2, getPayload()); + } + size += unknownFields.getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse)) { + return super.equals(obj); + } + com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse other = + (com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse) obj; + + if (!getName().equals(other.getName())) return false; + if (hasPayload() != other.hasPayload()) return false; + if (hasPayload()) { + if (!getPayload().equals(other.getPayload())) return false; + } + if (!unknownFields.equals(other.unknownFields)) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + NAME_FIELD_NUMBER; + hash = (53 * hash) + getName().hashCode(); + if (hasPayload()) { + hash = (37 * hash) + PAYLOAD_FIELD_NUMBER; + hash = (53 * hash) + getPayload().hashCode(); + } + hash = (29 * hash) + unknownFields.hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Response message for [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.AccessSecretVersionResponse} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.AccessSecretVersionResponse) + com.google.cloud.secrets.v1beta1.AccessSecretVersionResponseOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionResponse_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionResponse_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse.class, + com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse.Builder.class); + } + + // Construct using com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) {} + } + + @java.lang.Override + public Builder clear() { + super.clear(); + name_ = ""; + + if (payloadBuilder_ == null) { + payload_ = null; + } else { + payload_ = null; + payloadBuilder_ = null; + } + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionResponse_descriptor; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse + getDefaultInstanceForType() { + return com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse build() { + com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse buildPartial() { + com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse result = + new com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse(this); + result.name_ = name_; + if (payloadBuilder_ == null) { + result.payload_ = payload_; + } else { + result.payload_ = payloadBuilder_.build(); + } + onBuilt(); + return result; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse) { + return mergeFrom((com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse other) { + if (other + == com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse.getDefaultInstance()) + return this; + if (!other.getName().isEmpty()) { + name_ = other.name_; + onChanged(); + } + if (other.hasPayload()) { + mergePayload(other.getPayload()); + } + this.mergeUnknownFields(other.unknownFields); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse parsedMessage = null; + try { + parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + parsedMessage = + (com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse) e.getUnfinishedMessage(); + throw e.unwrapIOException(); + } finally { + if (parsedMessage != null) { + mergeFrom(parsedMessage); + } + } + return this; + } + + private java.lang.Object name_ = ""; + /** + * + * + *
+     * The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * string name = 1 [(.google.api.resource_reference) = { ... } + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * string name = 1 [(.google.api.resource_reference) = { ... } + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * string name = 1 [(.google.api.resource_reference) = { ... } + * + * @param value The name to set. + * @return This builder for chaining. + */ + public Builder setName(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + + name_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * string name = 1 [(.google.api.resource_reference) = { ... } + * + * @return This builder for chaining. + */ + public Builder clearName() { + + name_ = getDefaultInstance().getName(); + onChanged(); + return this; + } + /** + * + * + *
+     * The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * string name = 1 [(.google.api.resource_reference) = { ... } + * + * @param value The bytes for name to set. + * @return This builder for chaining. + */ + public Builder setNameBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + + name_ = value; + onChanged(); + return this; + } + + private com.google.cloud.secrets.v1beta1.SecretPayload payload_; + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secrets.v1beta1.SecretPayload, + com.google.cloud.secrets.v1beta1.SecretPayload.Builder, + com.google.cloud.secrets.v1beta1.SecretPayloadOrBuilder> + payloadBuilder_; + /** + * + * + *
+     * Secret payload
+     * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + * + * @return Whether the payload field is set. + */ + public boolean hasPayload() { + return payloadBuilder_ != null || payload_ != null; + } + /** + * + * + *
+     * Secret payload
+     * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + * + * @return The payload. + */ + public com.google.cloud.secrets.v1beta1.SecretPayload getPayload() { + if (payloadBuilder_ == null) { + return payload_ == null + ? com.google.cloud.secrets.v1beta1.SecretPayload.getDefaultInstance() + : payload_; + } else { + return payloadBuilder_.getMessage(); + } + } + /** + * + * + *
+     * Secret payload
+     * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + */ + public Builder setPayload(com.google.cloud.secrets.v1beta1.SecretPayload value) { + if (payloadBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + payload_ = value; + onChanged(); + } else { + payloadBuilder_.setMessage(value); + } + + return this; + } + /** + * + * + *
+     * Secret payload
+     * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + */ + public Builder setPayload( + com.google.cloud.secrets.v1beta1.SecretPayload.Builder builderForValue) { + if (payloadBuilder_ == null) { + payload_ = builderForValue.build(); + onChanged(); + } else { + payloadBuilder_.setMessage(builderForValue.build()); + } + + return this; + } + /** + * + * + *
+     * Secret payload
+     * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + */ + public Builder mergePayload(com.google.cloud.secrets.v1beta1.SecretPayload value) { + if (payloadBuilder_ == null) { + if (payload_ != null) { + payload_ = + com.google.cloud.secrets.v1beta1.SecretPayload.newBuilder(payload_) + .mergeFrom(value) + .buildPartial(); + } else { + payload_ = value; + } + onChanged(); + } else { + payloadBuilder_.mergeFrom(value); + } + + return this; + } + /** + * + * + *
+     * Secret payload
+     * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + */ + public Builder clearPayload() { + if (payloadBuilder_ == null) { + payload_ = null; + onChanged(); + } else { + payload_ = null; + payloadBuilder_ = null; + } + + return this; + } + /** + * + * + *
+     * Secret payload
+     * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + */ + public com.google.cloud.secrets.v1beta1.SecretPayload.Builder getPayloadBuilder() { + + onChanged(); + return getPayloadFieldBuilder().getBuilder(); + } + /** + * + * + *
+     * Secret payload
+     * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + */ + public com.google.cloud.secrets.v1beta1.SecretPayloadOrBuilder getPayloadOrBuilder() { + if (payloadBuilder_ != null) { + return payloadBuilder_.getMessageOrBuilder(); + } else { + return payload_ == null + ? com.google.cloud.secrets.v1beta1.SecretPayload.getDefaultInstance() + : payload_; + } + } + /** + * + * + *
+     * Secret payload
+     * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + */ + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secrets.v1beta1.SecretPayload, + com.google.cloud.secrets.v1beta1.SecretPayload.Builder, + com.google.cloud.secrets.v1beta1.SecretPayloadOrBuilder> + getPayloadFieldBuilder() { + if (payloadBuilder_ == null) { + payloadBuilder_ = + new com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secrets.v1beta1.SecretPayload, + com.google.cloud.secrets.v1beta1.SecretPayload.Builder, + com.google.cloud.secrets.v1beta1.SecretPayloadOrBuilder>( + getPayload(), getParentForChildren(), isClean()); + payload_ = null; + } + return payloadBuilder_; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.AccessSecretVersionResponse) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.AccessSecretVersionResponse) + private static final com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse + DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse(); + } + + public static com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public AccessSecretVersionResponse parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return new AccessSecretVersionResponse(input, extensionRegistry); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.AccessSecretVersionResponse getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/AccessSecretVersionResponseOrBuilder.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/AccessSecretVersionResponseOrBuilder.java new file mode 100644 index 00000000..65b74913 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/AccessSecretVersionResponseOrBuilder.java @@ -0,0 +1,87 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +public interface AccessSecretVersionResponseOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.AccessSecretVersionResponse) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * string name = 1 [(.google.api.resource_reference) = { ... } + * + * @return The name. + */ + java.lang.String getName(); + /** + * + * + *
+   * The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * string name = 1 [(.google.api.resource_reference) = { ... } + * + * @return The bytes for name. + */ + com.google.protobuf.ByteString getNameBytes(); + + /** + * + * + *
+   * Secret payload
+   * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + * + * @return Whether the payload field is set. + */ + boolean hasPayload(); + /** + * + * + *
+   * Secret payload
+   * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + * + * @return The payload. + */ + com.google.cloud.secrets.v1beta1.SecretPayload getPayload(); + /** + * + * + *
+   * Secret payload
+   * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + */ + com.google.cloud.secrets.v1beta1.SecretPayloadOrBuilder getPayloadOrBuilder(); +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/AddSecretVersionRequest.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/AddSecretVersionRequest.java new file mode 100644 index 00000000..7b8b2572 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/AddSecretVersionRequest.java @@ -0,0 +1,955 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.AddSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AddSecretVersion].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.AddSecretVersionRequest} + */ +public final class AddSecretVersionRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.AddSecretVersionRequest) + AddSecretVersionRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use AddSecretVersionRequest.newBuilder() to construct. + private AddSecretVersionRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private AddSecretVersionRequest() { + parent_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new AddSecretVersionRequest(); + } + + @java.lang.Override + public final com.google.protobuf.UnknownFieldSet getUnknownFields() { + return this.unknownFields; + } + + private AddSecretVersionRequest( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + this(); + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + com.google.protobuf.UnknownFieldSet.Builder unknownFields = + com.google.protobuf.UnknownFieldSet.newBuilder(); + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + java.lang.String s = input.readStringRequireUtf8(); + + parent_ = s; + break; + } + case 18: + { + com.google.cloud.secrets.v1beta1.SecretPayload.Builder subBuilder = null; + if (payload_ != null) { + subBuilder = payload_.toBuilder(); + } + payload_ = + input.readMessage( + com.google.cloud.secrets.v1beta1.SecretPayload.parser(), extensionRegistry); + if (subBuilder != null) { + subBuilder.mergeFrom(payload_); + payload_ = subBuilder.buildPartial(); + } + + break; + } + default: + { + if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { + done = true; + } + break; + } + } + } + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(this); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); + } finally { + this.unknownFields = unknownFields.build(); + makeExtensionsImmutable(); + } + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_AddSecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_AddSecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.AddSecretVersionRequest.class, + com.google.cloud.secrets.v1beta1.AddSecretVersionRequest.Builder.class); + } + + public static final int PARENT_FIELD_NUMBER = 1; + private volatile java.lang.Object parent_; + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + public java.lang.String getParent() { + java.lang.Object ref = parent_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + parent_ = s; + return s; + } + } + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + public com.google.protobuf.ByteString getParentBytes() { + java.lang.Object ref = parent_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + parent_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + public static final int PAYLOAD_FIELD_NUMBER = 2; + private com.google.cloud.secrets.v1beta1.SecretPayload payload_; + /** + * + * + *
+   * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the payload field is set. + */ + public boolean hasPayload() { + return payload_ != null; + } + /** + * + * + *
+   * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return The payload. + */ + public com.google.cloud.secrets.v1beta1.SecretPayload getPayload() { + return payload_ == null + ? com.google.cloud.secrets.v1beta1.SecretPayload.getDefaultInstance() + : payload_; + } + /** + * + * + *
+   * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secrets.v1beta1.SecretPayloadOrBuilder getPayloadOrBuilder() { + return getPayload(); + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!getParentBytes().isEmpty()) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, parent_); + } + if (payload_ != null) { + output.writeMessage(2, getPayload()); + } + unknownFields.writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!getParentBytes().isEmpty()) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, parent_); + } + if (payload_ != null) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(2, getPayload()); + } + size += unknownFields.getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secrets.v1beta1.AddSecretVersionRequest)) { + return super.equals(obj); + } + com.google.cloud.secrets.v1beta1.AddSecretVersionRequest other = + (com.google.cloud.secrets.v1beta1.AddSecretVersionRequest) obj; + + if (!getParent().equals(other.getParent())) return false; + if (hasPayload() != other.hasPayload()) return false; + if (hasPayload()) { + if (!getPayload().equals(other.getPayload())) return false; + } + if (!unknownFields.equals(other.unknownFields)) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + PARENT_FIELD_NUMBER; + hash = (53 * hash) + getParent().hashCode(); + if (hasPayload()) { + hash = (37 * hash) + PAYLOAD_FIELD_NUMBER; + hash = (53 * hash) + getPayload().hashCode(); + } + hash = (29 * hash) + unknownFields.hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secrets.v1beta1.AddSecretVersionRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.AddSecretVersionRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.AddSecretVersionRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.AddSecretVersionRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.AddSecretVersionRequest parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.AddSecretVersionRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.AddSecretVersionRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.AddSecretVersionRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.AddSecretVersionRequest parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.AddSecretVersionRequest parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.AddSecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.AddSecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secrets.v1beta1.AddSecretVersionRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.AddSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AddSecretVersion].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.AddSecretVersionRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.AddSecretVersionRequest) + com.google.cloud.secrets.v1beta1.AddSecretVersionRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_AddSecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_AddSecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.AddSecretVersionRequest.class, + com.google.cloud.secrets.v1beta1.AddSecretVersionRequest.Builder.class); + } + + // Construct using com.google.cloud.secrets.v1beta1.AddSecretVersionRequest.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) {} + } + + @java.lang.Override + public Builder clear() { + super.clear(); + parent_ = ""; + + if (payloadBuilder_ == null) { + payload_ = null; + } else { + payload_ = null; + payloadBuilder_ = null; + } + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_AddSecretVersionRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.AddSecretVersionRequest getDefaultInstanceForType() { + return com.google.cloud.secrets.v1beta1.AddSecretVersionRequest.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.AddSecretVersionRequest build() { + com.google.cloud.secrets.v1beta1.AddSecretVersionRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.AddSecretVersionRequest buildPartial() { + com.google.cloud.secrets.v1beta1.AddSecretVersionRequest result = + new com.google.cloud.secrets.v1beta1.AddSecretVersionRequest(this); + result.parent_ = parent_; + if (payloadBuilder_ == null) { + result.payload_ = payload_; + } else { + result.payload_ = payloadBuilder_.build(); + } + onBuilt(); + return result; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secrets.v1beta1.AddSecretVersionRequest) { + return mergeFrom((com.google.cloud.secrets.v1beta1.AddSecretVersionRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secrets.v1beta1.AddSecretVersionRequest other) { + if (other == com.google.cloud.secrets.v1beta1.AddSecretVersionRequest.getDefaultInstance()) + return this; + if (!other.getParent().isEmpty()) { + parent_ = other.parent_; + onChanged(); + } + if (other.hasPayload()) { + mergePayload(other.getPayload()); + } + this.mergeUnknownFields(other.unknownFields); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + com.google.cloud.secrets.v1beta1.AddSecretVersionRequest parsedMessage = null; + try { + parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + parsedMessage = + (com.google.cloud.secrets.v1beta1.AddSecretVersionRequest) e.getUnfinishedMessage(); + throw e.unwrapIOException(); + } finally { + if (parsedMessage != null) { + mergeFrom(parsedMessage); + } + } + return this; + } + + private java.lang.Object parent_ = ""; + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + public java.lang.String getParent() { + java.lang.Object ref = parent_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + parent_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + public com.google.protobuf.ByteString getParentBytes() { + java.lang.Object ref = parent_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + parent_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The parent to set. + * @return This builder for chaining. + */ + public Builder setParent(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + + parent_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return This builder for chaining. + */ + public Builder clearParent() { + + parent_ = getDefaultInstance().getParent(); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The bytes for parent to set. + * @return This builder for chaining. + */ + public Builder setParentBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + + parent_ = value; + onChanged(); + return this; + } + + private com.google.cloud.secrets.v1beta1.SecretPayload payload_; + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secrets.v1beta1.SecretPayload, + com.google.cloud.secrets.v1beta1.SecretPayload.Builder, + com.google.cloud.secrets.v1beta1.SecretPayloadOrBuilder> + payloadBuilder_; + /** + * + * + *
+     * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the payload field is set. + */ + public boolean hasPayload() { + return payloadBuilder_ != null || payload_ != null; + } + /** + * + * + *
+     * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return The payload. + */ + public com.google.cloud.secrets.v1beta1.SecretPayload getPayload() { + if (payloadBuilder_ == null) { + return payload_ == null + ? com.google.cloud.secrets.v1beta1.SecretPayload.getDefaultInstance() + : payload_; + } else { + return payloadBuilder_.getMessage(); + } + } + /** + * + * + *
+     * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder setPayload(com.google.cloud.secrets.v1beta1.SecretPayload value) { + if (payloadBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + payload_ = value; + onChanged(); + } else { + payloadBuilder_.setMessage(value); + } + + return this; + } + /** + * + * + *
+     * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder setPayload( + com.google.cloud.secrets.v1beta1.SecretPayload.Builder builderForValue) { + if (payloadBuilder_ == null) { + payload_ = builderForValue.build(); + onChanged(); + } else { + payloadBuilder_.setMessage(builderForValue.build()); + } + + return this; + } + /** + * + * + *
+     * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder mergePayload(com.google.cloud.secrets.v1beta1.SecretPayload value) { + if (payloadBuilder_ == null) { + if (payload_ != null) { + payload_ = + com.google.cloud.secrets.v1beta1.SecretPayload.newBuilder(payload_) + .mergeFrom(value) + .buildPartial(); + } else { + payload_ = value; + } + onChanged(); + } else { + payloadBuilder_.mergeFrom(value); + } + + return this; + } + /** + * + * + *
+     * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder clearPayload() { + if (payloadBuilder_ == null) { + payload_ = null; + onChanged(); + } else { + payload_ = null; + payloadBuilder_ = null; + } + + return this; + } + /** + * + * + *
+     * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secrets.v1beta1.SecretPayload.Builder getPayloadBuilder() { + + onChanged(); + return getPayloadFieldBuilder().getBuilder(); + } + /** + * + * + *
+     * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secrets.v1beta1.SecretPayloadOrBuilder getPayloadOrBuilder() { + if (payloadBuilder_ != null) { + return payloadBuilder_.getMessageOrBuilder(); + } else { + return payload_ == null + ? com.google.cloud.secrets.v1beta1.SecretPayload.getDefaultInstance() + : payload_; + } + } + /** + * + * + *
+     * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secrets.v1beta1.SecretPayload, + com.google.cloud.secrets.v1beta1.SecretPayload.Builder, + com.google.cloud.secrets.v1beta1.SecretPayloadOrBuilder> + getPayloadFieldBuilder() { + if (payloadBuilder_ == null) { + payloadBuilder_ = + new com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secrets.v1beta1.SecretPayload, + com.google.cloud.secrets.v1beta1.SecretPayload.Builder, + com.google.cloud.secrets.v1beta1.SecretPayloadOrBuilder>( + getPayload(), getParentForChildren(), isClean()); + payload_ = null; + } + return payloadBuilder_; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.AddSecretVersionRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.AddSecretVersionRequest) + private static final com.google.cloud.secrets.v1beta1.AddSecretVersionRequest DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secrets.v1beta1.AddSecretVersionRequest(); + } + + public static com.google.cloud.secrets.v1beta1.AddSecretVersionRequest getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public AddSecretVersionRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return new AddSecretVersionRequest(input, extensionRegistry); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.AddSecretVersionRequest getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/AddSecretVersionRequestOrBuilder.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/AddSecretVersionRequestOrBuilder.java new file mode 100644 index 00000000..f9fa0ef6 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/AddSecretVersionRequestOrBuilder.java @@ -0,0 +1,97 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +public interface AddSecretVersionRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.AddSecretVersionRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + java.lang.String getParent(); + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + com.google.protobuf.ByteString getParentBytes(); + + /** + * + * + *
+   * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the payload field is set. + */ + boolean hasPayload(); + /** + * + * + *
+   * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return The payload. + */ + com.google.cloud.secrets.v1beta1.SecretPayload getPayload(); + /** + * + * + *
+   * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + com.google.cloud.secrets.v1beta1.SecretPayloadOrBuilder getPayloadOrBuilder(); +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/CreateSecretRequest.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/CreateSecretRequest.java new file mode 100644 index 00000000..1a4741fd --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/CreateSecretRequest.java @@ -0,0 +1,1104 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.CreateSecret][google.cloud.secrets.v1beta1.SecretManagerService.CreateSecret].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.CreateSecretRequest} + */ +public final class CreateSecretRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.CreateSecretRequest) + CreateSecretRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use CreateSecretRequest.newBuilder() to construct. + private CreateSecretRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private CreateSecretRequest() { + parent_ = ""; + secretId_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new CreateSecretRequest(); + } + + @java.lang.Override + public final com.google.protobuf.UnknownFieldSet getUnknownFields() { + return this.unknownFields; + } + + private CreateSecretRequest( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + this(); + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + com.google.protobuf.UnknownFieldSet.Builder unknownFields = + com.google.protobuf.UnknownFieldSet.newBuilder(); + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + java.lang.String s = input.readStringRequireUtf8(); + + parent_ = s; + break; + } + case 18: + { + java.lang.String s = input.readStringRequireUtf8(); + + secretId_ = s; + break; + } + case 26: + { + com.google.cloud.secrets.v1beta1.Secret.Builder subBuilder = null; + if (secret_ != null) { + subBuilder = secret_.toBuilder(); + } + secret_ = + input.readMessage( + com.google.cloud.secrets.v1beta1.Secret.parser(), extensionRegistry); + if (subBuilder != null) { + subBuilder.mergeFrom(secret_); + secret_ = subBuilder.buildPartial(); + } + + break; + } + default: + { + if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { + done = true; + } + break; + } + } + } + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(this); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); + } finally { + this.unknownFields = unknownFields.build(); + makeExtensionsImmutable(); + } + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_CreateSecretRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_CreateSecretRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.CreateSecretRequest.class, + com.google.cloud.secrets.v1beta1.CreateSecretRequest.Builder.class); + } + + public static final int PARENT_FIELD_NUMBER = 1; + private volatile java.lang.Object parent_; + /** + * + * + *
+   * Required. The resource name of the project to associate with the
+   * [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + public java.lang.String getParent() { + java.lang.Object ref = parent_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + parent_ = s; + return s; + } + } + /** + * + * + *
+   * Required. The resource name of the project to associate with the
+   * [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + public com.google.protobuf.ByteString getParentBytes() { + java.lang.Object ref = parent_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + parent_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + public static final int SECRET_ID_FIELD_NUMBER = 2; + private volatile java.lang.Object secretId_; + /** + * + * + *
+   * Required. This must be unique within the project.
+   * 
+ * + * string secret_id = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * @return The secretId. + */ + public java.lang.String getSecretId() { + java.lang.Object ref = secretId_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + secretId_ = s; + return s; + } + } + /** + * + * + *
+   * Required. This must be unique within the project.
+   * 
+ * + * string secret_id = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * @return The bytes for secretId. + */ + public com.google.protobuf.ByteString getSecretIdBytes() { + java.lang.Object ref = secretId_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + secretId_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + public static final int SECRET_FIELD_NUMBER = 3; + private com.google.cloud.secrets.v1beta1.Secret secret_; + /** + * + * + *
+   * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Secret secret = 3; + * + * @return Whether the secret field is set. + */ + public boolean hasSecret() { + return secret_ != null; + } + /** + * + * + *
+   * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Secret secret = 3; + * + * @return The secret. + */ + public com.google.cloud.secrets.v1beta1.Secret getSecret() { + return secret_ == null ? com.google.cloud.secrets.v1beta1.Secret.getDefaultInstance() : secret_; + } + /** + * + * + *
+   * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Secret secret = 3; + */ + public com.google.cloud.secrets.v1beta1.SecretOrBuilder getSecretOrBuilder() { + return getSecret(); + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!getParentBytes().isEmpty()) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, parent_); + } + if (!getSecretIdBytes().isEmpty()) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 2, secretId_); + } + if (secret_ != null) { + output.writeMessage(3, getSecret()); + } + unknownFields.writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!getParentBytes().isEmpty()) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, parent_); + } + if (!getSecretIdBytes().isEmpty()) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(2, secretId_); + } + if (secret_ != null) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(3, getSecret()); + } + size += unknownFields.getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secrets.v1beta1.CreateSecretRequest)) { + return super.equals(obj); + } + com.google.cloud.secrets.v1beta1.CreateSecretRequest other = + (com.google.cloud.secrets.v1beta1.CreateSecretRequest) obj; + + if (!getParent().equals(other.getParent())) return false; + if (!getSecretId().equals(other.getSecretId())) return false; + if (hasSecret() != other.hasSecret()) return false; + if (hasSecret()) { + if (!getSecret().equals(other.getSecret())) return false; + } + if (!unknownFields.equals(other.unknownFields)) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + PARENT_FIELD_NUMBER; + hash = (53 * hash) + getParent().hashCode(); + hash = (37 * hash) + SECRET_ID_FIELD_NUMBER; + hash = (53 * hash) + getSecretId().hashCode(); + if (hasSecret()) { + hash = (37 * hash) + SECRET_FIELD_NUMBER; + hash = (53 * hash) + getSecret().hashCode(); + } + hash = (29 * hash) + unknownFields.hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secrets.v1beta1.CreateSecretRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.CreateSecretRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.CreateSecretRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.CreateSecretRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.CreateSecretRequest parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.CreateSecretRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.CreateSecretRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.CreateSecretRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.CreateSecretRequest parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.CreateSecretRequest parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.CreateSecretRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.CreateSecretRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder(com.google.cloud.secrets.v1beta1.CreateSecretRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.CreateSecret][google.cloud.secrets.v1beta1.SecretManagerService.CreateSecret].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.CreateSecretRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.CreateSecretRequest) + com.google.cloud.secrets.v1beta1.CreateSecretRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_CreateSecretRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_CreateSecretRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.CreateSecretRequest.class, + com.google.cloud.secrets.v1beta1.CreateSecretRequest.Builder.class); + } + + // Construct using com.google.cloud.secrets.v1beta1.CreateSecretRequest.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) {} + } + + @java.lang.Override + public Builder clear() { + super.clear(); + parent_ = ""; + + secretId_ = ""; + + if (secretBuilder_ == null) { + secret_ = null; + } else { + secret_ = null; + secretBuilder_ = null; + } + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_CreateSecretRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.CreateSecretRequest getDefaultInstanceForType() { + return com.google.cloud.secrets.v1beta1.CreateSecretRequest.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.CreateSecretRequest build() { + com.google.cloud.secrets.v1beta1.CreateSecretRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.CreateSecretRequest buildPartial() { + com.google.cloud.secrets.v1beta1.CreateSecretRequest result = + new com.google.cloud.secrets.v1beta1.CreateSecretRequest(this); + result.parent_ = parent_; + result.secretId_ = secretId_; + if (secretBuilder_ == null) { + result.secret_ = secret_; + } else { + result.secret_ = secretBuilder_.build(); + } + onBuilt(); + return result; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secrets.v1beta1.CreateSecretRequest) { + return mergeFrom((com.google.cloud.secrets.v1beta1.CreateSecretRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secrets.v1beta1.CreateSecretRequest other) { + if (other == com.google.cloud.secrets.v1beta1.CreateSecretRequest.getDefaultInstance()) + return this; + if (!other.getParent().isEmpty()) { + parent_ = other.parent_; + onChanged(); + } + if (!other.getSecretId().isEmpty()) { + secretId_ = other.secretId_; + onChanged(); + } + if (other.hasSecret()) { + mergeSecret(other.getSecret()); + } + this.mergeUnknownFields(other.unknownFields); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + com.google.cloud.secrets.v1beta1.CreateSecretRequest parsedMessage = null; + try { + parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + parsedMessage = + (com.google.cloud.secrets.v1beta1.CreateSecretRequest) e.getUnfinishedMessage(); + throw e.unwrapIOException(); + } finally { + if (parsedMessage != null) { + mergeFrom(parsedMessage); + } + } + return this; + } + + private java.lang.Object parent_ = ""; + /** + * + * + *
+     * Required. The resource name of the project to associate with the
+     * [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + public java.lang.String getParent() { + java.lang.Object ref = parent_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + parent_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the project to associate with the
+     * [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + public com.google.protobuf.ByteString getParentBytes() { + java.lang.Object ref = parent_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + parent_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the project to associate with the
+     * [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The parent to set. + * @return This builder for chaining. + */ + public Builder setParent(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + + parent_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the project to associate with the
+     * [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return This builder for chaining. + */ + public Builder clearParent() { + + parent_ = getDefaultInstance().getParent(); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the project to associate with the
+     * [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The bytes for parent to set. + * @return This builder for chaining. + */ + public Builder setParentBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + + parent_ = value; + onChanged(); + return this; + } + + private java.lang.Object secretId_ = ""; + /** + * + * + *
+     * Required. This must be unique within the project.
+     * 
+ * + * string secret_id = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * @return The secretId. + */ + public java.lang.String getSecretId() { + java.lang.Object ref = secretId_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + secretId_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. This must be unique within the project.
+     * 
+ * + * string secret_id = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * @return The bytes for secretId. + */ + public com.google.protobuf.ByteString getSecretIdBytes() { + java.lang.Object ref = secretId_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + secretId_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. This must be unique within the project.
+     * 
+ * + * string secret_id = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * @param value The secretId to set. + * @return This builder for chaining. + */ + public Builder setSecretId(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + + secretId_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. This must be unique within the project.
+     * 
+ * + * string secret_id = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * @return This builder for chaining. + */ + public Builder clearSecretId() { + + secretId_ = getDefaultInstance().getSecretId(); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. This must be unique within the project.
+     * 
+ * + * string secret_id = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * @param value The bytes for secretId to set. + * @return This builder for chaining. + */ + public Builder setSecretIdBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + + secretId_ = value; + onChanged(); + return this; + } + + private com.google.cloud.secrets.v1beta1.Secret secret_; + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secrets.v1beta1.Secret, + com.google.cloud.secrets.v1beta1.Secret.Builder, + com.google.cloud.secrets.v1beta1.SecretOrBuilder> + secretBuilder_; + /** + * + * + *
+     * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Secret secret = 3; + * + * @return Whether the secret field is set. + */ + public boolean hasSecret() { + return secretBuilder_ != null || secret_ != null; + } + /** + * + * + *
+     * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Secret secret = 3; + * + * @return The secret. + */ + public com.google.cloud.secrets.v1beta1.Secret getSecret() { + if (secretBuilder_ == null) { + return secret_ == null + ? com.google.cloud.secrets.v1beta1.Secret.getDefaultInstance() + : secret_; + } else { + return secretBuilder_.getMessage(); + } + } + /** + * + * + *
+     * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Secret secret = 3; + */ + public Builder setSecret(com.google.cloud.secrets.v1beta1.Secret value) { + if (secretBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + secret_ = value; + onChanged(); + } else { + secretBuilder_.setMessage(value); + } + + return this; + } + /** + * + * + *
+     * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Secret secret = 3; + */ + public Builder setSecret(com.google.cloud.secrets.v1beta1.Secret.Builder builderForValue) { + if (secretBuilder_ == null) { + secret_ = builderForValue.build(); + onChanged(); + } else { + secretBuilder_.setMessage(builderForValue.build()); + } + + return this; + } + /** + * + * + *
+     * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Secret secret = 3; + */ + public Builder mergeSecret(com.google.cloud.secrets.v1beta1.Secret value) { + if (secretBuilder_ == null) { + if (secret_ != null) { + secret_ = + com.google.cloud.secrets.v1beta1.Secret.newBuilder(secret_) + .mergeFrom(value) + .buildPartial(); + } else { + secret_ = value; + } + onChanged(); + } else { + secretBuilder_.mergeFrom(value); + } + + return this; + } + /** + * + * + *
+     * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Secret secret = 3; + */ + public Builder clearSecret() { + if (secretBuilder_ == null) { + secret_ = null; + onChanged(); + } else { + secret_ = null; + secretBuilder_ = null; + } + + return this; + } + /** + * + * + *
+     * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Secret secret = 3; + */ + public com.google.cloud.secrets.v1beta1.Secret.Builder getSecretBuilder() { + + onChanged(); + return getSecretFieldBuilder().getBuilder(); + } + /** + * + * + *
+     * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Secret secret = 3; + */ + public com.google.cloud.secrets.v1beta1.SecretOrBuilder getSecretOrBuilder() { + if (secretBuilder_ != null) { + return secretBuilder_.getMessageOrBuilder(); + } else { + return secret_ == null + ? com.google.cloud.secrets.v1beta1.Secret.getDefaultInstance() + : secret_; + } + } + /** + * + * + *
+     * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Secret secret = 3; + */ + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secrets.v1beta1.Secret, + com.google.cloud.secrets.v1beta1.Secret.Builder, + com.google.cloud.secrets.v1beta1.SecretOrBuilder> + getSecretFieldBuilder() { + if (secretBuilder_ == null) { + secretBuilder_ = + new com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secrets.v1beta1.Secret, + com.google.cloud.secrets.v1beta1.Secret.Builder, + com.google.cloud.secrets.v1beta1.SecretOrBuilder>( + getSecret(), getParentForChildren(), isClean()); + secret_ = null; + } + return secretBuilder_; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.CreateSecretRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.CreateSecretRequest) + private static final com.google.cloud.secrets.v1beta1.CreateSecretRequest DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secrets.v1beta1.CreateSecretRequest(); + } + + public static com.google.cloud.secrets.v1beta1.CreateSecretRequest getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public CreateSecretRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return new CreateSecretRequest(input, extensionRegistry); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.CreateSecretRequest getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/CreateSecretRequestOrBuilder.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/CreateSecretRequestOrBuilder.java new file mode 100644 index 00000000..0f3f77cc --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/CreateSecretRequestOrBuilder.java @@ -0,0 +1,116 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +public interface CreateSecretRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.CreateSecretRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. The resource name of the project to associate with the
+   * [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + java.lang.String getParent(); + /** + * + * + *
+   * Required. The resource name of the project to associate with the
+   * [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + com.google.protobuf.ByteString getParentBytes(); + + /** + * + * + *
+   * Required. This must be unique within the project.
+   * 
+ * + * string secret_id = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * @return The secretId. + */ + java.lang.String getSecretId(); + /** + * + * + *
+   * Required. This must be unique within the project.
+   * 
+ * + * string secret_id = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * @return The bytes for secretId. + */ + com.google.protobuf.ByteString getSecretIdBytes(); + + /** + * + * + *
+   * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Secret secret = 3; + * + * @return Whether the secret field is set. + */ + boolean hasSecret(); + /** + * + * + *
+   * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Secret secret = 3; + * + * @return The secret. + */ + com.google.cloud.secrets.v1beta1.Secret getSecret(); + /** + * + * + *
+   * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Secret secret = 3; + */ + com.google.cloud.secrets.v1beta1.SecretOrBuilder getSecretOrBuilder(); +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/DeleteSecretRequest.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/DeleteSecretRequest.java new file mode 100644 index 00000000..0d4baea2 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/DeleteSecretRequest.java @@ -0,0 +1,655 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.DeleteSecret][google.cloud.secrets.v1beta1.SecretManagerService.DeleteSecret].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.DeleteSecretRequest} + */ +public final class DeleteSecretRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.DeleteSecretRequest) + DeleteSecretRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use DeleteSecretRequest.newBuilder() to construct. + private DeleteSecretRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private DeleteSecretRequest() { + name_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new DeleteSecretRequest(); + } + + @java.lang.Override + public final com.google.protobuf.UnknownFieldSet getUnknownFields() { + return this.unknownFields; + } + + private DeleteSecretRequest( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + this(); + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + com.google.protobuf.UnknownFieldSet.Builder unknownFields = + com.google.protobuf.UnknownFieldSet.newBuilder(); + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + java.lang.String s = input.readStringRequireUtf8(); + + name_ = s; + break; + } + default: + { + if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { + done = true; + } + break; + } + } + } + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(this); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); + } finally { + this.unknownFields = unknownFields.build(); + makeExtensionsImmutable(); + } + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_DeleteSecretRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_DeleteSecretRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.DeleteSecretRequest.class, + com.google.cloud.secrets.v1beta1.DeleteSecretRequest.Builder.class); + } + + public static final int NAME_FIELD_NUMBER = 1; + private volatile java.lang.Object name_; + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format
+   * `projects/*/secrets/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } + } + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format
+   * `projects/*/secrets/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!getNameBytes().isEmpty()) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); + } + unknownFields.writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!getNameBytes().isEmpty()) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); + } + size += unknownFields.getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secrets.v1beta1.DeleteSecretRequest)) { + return super.equals(obj); + } + com.google.cloud.secrets.v1beta1.DeleteSecretRequest other = + (com.google.cloud.secrets.v1beta1.DeleteSecretRequest) obj; + + if (!getName().equals(other.getName())) return false; + if (!unknownFields.equals(other.unknownFields)) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + NAME_FIELD_NUMBER; + hash = (53 * hash) + getName().hashCode(); + hash = (29 * hash) + unknownFields.hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secrets.v1beta1.DeleteSecretRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.DeleteSecretRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.DeleteSecretRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.DeleteSecretRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.DeleteSecretRequest parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.DeleteSecretRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.DeleteSecretRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.DeleteSecretRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.DeleteSecretRequest parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.DeleteSecretRequest parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.DeleteSecretRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.DeleteSecretRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder(com.google.cloud.secrets.v1beta1.DeleteSecretRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.DeleteSecret][google.cloud.secrets.v1beta1.SecretManagerService.DeleteSecret].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.DeleteSecretRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.DeleteSecretRequest) + com.google.cloud.secrets.v1beta1.DeleteSecretRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_DeleteSecretRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_DeleteSecretRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.DeleteSecretRequest.class, + com.google.cloud.secrets.v1beta1.DeleteSecretRequest.Builder.class); + } + + // Construct using com.google.cloud.secrets.v1beta1.DeleteSecretRequest.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) {} + } + + @java.lang.Override + public Builder clear() { + super.clear(); + name_ = ""; + + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_DeleteSecretRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.DeleteSecretRequest getDefaultInstanceForType() { + return com.google.cloud.secrets.v1beta1.DeleteSecretRequest.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.DeleteSecretRequest build() { + com.google.cloud.secrets.v1beta1.DeleteSecretRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.DeleteSecretRequest buildPartial() { + com.google.cloud.secrets.v1beta1.DeleteSecretRequest result = + new com.google.cloud.secrets.v1beta1.DeleteSecretRequest(this); + result.name_ = name_; + onBuilt(); + return result; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secrets.v1beta1.DeleteSecretRequest) { + return mergeFrom((com.google.cloud.secrets.v1beta1.DeleteSecretRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secrets.v1beta1.DeleteSecretRequest other) { + if (other == com.google.cloud.secrets.v1beta1.DeleteSecretRequest.getDefaultInstance()) + return this; + if (!other.getName().isEmpty()) { + name_ = other.name_; + onChanged(); + } + this.mergeUnknownFields(other.unknownFields); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + com.google.cloud.secrets.v1beta1.DeleteSecretRequest parsedMessage = null; + try { + parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + parsedMessage = + (com.google.cloud.secrets.v1beta1.DeleteSecretRequest) e.getUnfinishedMessage(); + throw e.unwrapIOException(); + } finally { + if (parsedMessage != null) { + mergeFrom(parsedMessage); + } + } + return this; + } + + private java.lang.Object name_ = ""; + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format
+     * `projects/*/secrets/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format
+     * `projects/*/secrets/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format
+     * `projects/*/secrets/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The name to set. + * @return This builder for chaining. + */ + public Builder setName(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + + name_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format
+     * `projects/*/secrets/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return This builder for chaining. + */ + public Builder clearName() { + + name_ = getDefaultInstance().getName(); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format
+     * `projects/*/secrets/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The bytes for name to set. + * @return This builder for chaining. + */ + public Builder setNameBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + + name_ = value; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.DeleteSecretRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.DeleteSecretRequest) + private static final com.google.cloud.secrets.v1beta1.DeleteSecretRequest DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secrets.v1beta1.DeleteSecretRequest(); + } + + public static com.google.cloud.secrets.v1beta1.DeleteSecretRequest getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public DeleteSecretRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return new DeleteSecretRequest(input, extensionRegistry); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.DeleteSecretRequest getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/DeleteSecretRequestOrBuilder.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/DeleteSecretRequestOrBuilder.java new file mode 100644 index 00000000..d9a41504 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/DeleteSecretRequestOrBuilder.java @@ -0,0 +1,56 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +public interface DeleteSecretRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.DeleteSecretRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format
+   * `projects/*/secrets/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + java.lang.String getName(); + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format
+   * `projects/*/secrets/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + com.google.protobuf.ByteString getNameBytes(); +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/DestroySecretVersionRequest.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/DestroySecretVersionRequest.java new file mode 100644 index 00000000..df233bb9 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/DestroySecretVersionRequest.java @@ -0,0 +1,659 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.DestroySecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DestroySecretVersion].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.DestroySecretVersionRequest} + */ +public final class DestroySecretVersionRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.DestroySecretVersionRequest) + DestroySecretVersionRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use DestroySecretVersionRequest.newBuilder() to construct. + private DestroySecretVersionRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private DestroySecretVersionRequest() { + name_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new DestroySecretVersionRequest(); + } + + @java.lang.Override + public final com.google.protobuf.UnknownFieldSet getUnknownFields() { + return this.unknownFields; + } + + private DestroySecretVersionRequest( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + this(); + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + com.google.protobuf.UnknownFieldSet.Builder unknownFields = + com.google.protobuf.UnknownFieldSet.newBuilder(); + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + java.lang.String s = input.readStringRequireUtf8(); + + name_ = s; + break; + } + default: + { + if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { + done = true; + } + break; + } + } + } + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(this); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); + } finally { + this.unknownFields = unknownFields.build(); + makeExtensionsImmutable(); + } + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_DestroySecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_DestroySecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest.class, + com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest.Builder.class); + } + + public static final int NAME_FIELD_NUMBER = 1; + private volatile java.lang.Object name_; + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } + } + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!getNameBytes().isEmpty()) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); + } + unknownFields.writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!getNameBytes().isEmpty()) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); + } + size += unknownFields.getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest)) { + return super.equals(obj); + } + com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest other = + (com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest) obj; + + if (!getName().equals(other.getName())) return false; + if (!unknownFields.equals(other.unknownFields)) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + NAME_FIELD_NUMBER; + hash = (53 * hash) + getName().hashCode(); + hash = (29 * hash) + unknownFields.hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.DestroySecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DestroySecretVersion].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.DestroySecretVersionRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.DestroySecretVersionRequest) + com.google.cloud.secrets.v1beta1.DestroySecretVersionRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_DestroySecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_DestroySecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest.class, + com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest.Builder.class); + } + + // Construct using com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) {} + } + + @java.lang.Override + public Builder clear() { + super.clear(); + name_ = ""; + + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_DestroySecretVersionRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest + getDefaultInstanceForType() { + return com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest build() { + com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest buildPartial() { + com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest result = + new com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest(this); + result.name_ = name_; + onBuilt(); + return result; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest) { + return mergeFrom((com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest other) { + if (other + == com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest.getDefaultInstance()) + return this; + if (!other.getName().isEmpty()) { + name_ = other.name_; + onChanged(); + } + this.mergeUnknownFields(other.unknownFields); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest parsedMessage = null; + try { + parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + parsedMessage = + (com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest) e.getUnfinishedMessage(); + throw e.unwrapIOException(); + } finally { + if (parsedMessage != null) { + mergeFrom(parsedMessage); + } + } + return this; + } + + private java.lang.Object name_ = ""; + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The name to set. + * @return This builder for chaining. + */ + public Builder setName(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + + name_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return This builder for chaining. + */ + public Builder clearName() { + + name_ = getDefaultInstance().getName(); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The bytes for name to set. + * @return This builder for chaining. + */ + public Builder setNameBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + + name_ = value; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.DestroySecretVersionRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.DestroySecretVersionRequest) + private static final com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest + DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest(); + } + + public static com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public DestroySecretVersionRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return new DestroySecretVersionRequest(input, extensionRegistry); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.DestroySecretVersionRequest getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/DestroySecretVersionRequestOrBuilder.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/DestroySecretVersionRequestOrBuilder.java new file mode 100644 index 00000000..60ef247e --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/DestroySecretVersionRequestOrBuilder.java @@ -0,0 +1,56 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +public interface DestroySecretVersionRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.DestroySecretVersionRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + java.lang.String getName(); + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + com.google.protobuf.ByteString getNameBytes(); +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/DisableSecretVersionRequest.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/DisableSecretVersionRequest.java new file mode 100644 index 00000000..cd49a8e0 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/DisableSecretVersionRequest.java @@ -0,0 +1,659 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.DisableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DisableSecretVersion].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.DisableSecretVersionRequest} + */ +public final class DisableSecretVersionRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.DisableSecretVersionRequest) + DisableSecretVersionRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use DisableSecretVersionRequest.newBuilder() to construct. + private DisableSecretVersionRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private DisableSecretVersionRequest() { + name_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new DisableSecretVersionRequest(); + } + + @java.lang.Override + public final com.google.protobuf.UnknownFieldSet getUnknownFields() { + return this.unknownFields; + } + + private DisableSecretVersionRequest( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + this(); + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + com.google.protobuf.UnknownFieldSet.Builder unknownFields = + com.google.protobuf.UnknownFieldSet.newBuilder(); + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + java.lang.String s = input.readStringRequireUtf8(); + + name_ = s; + break; + } + default: + { + if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { + done = true; + } + break; + } + } + } + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(this); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); + } finally { + this.unknownFields = unknownFields.build(); + makeExtensionsImmutable(); + } + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_DisableSecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_DisableSecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest.class, + com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest.Builder.class); + } + + public static final int NAME_FIELD_NUMBER = 1; + private volatile java.lang.Object name_; + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } + } + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!getNameBytes().isEmpty()) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); + } + unknownFields.writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!getNameBytes().isEmpty()) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); + } + size += unknownFields.getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest)) { + return super.equals(obj); + } + com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest other = + (com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest) obj; + + if (!getName().equals(other.getName())) return false; + if (!unknownFields.equals(other.unknownFields)) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + NAME_FIELD_NUMBER; + hash = (53 * hash) + getName().hashCode(); + hash = (29 * hash) + unknownFields.hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.DisableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DisableSecretVersion].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.DisableSecretVersionRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.DisableSecretVersionRequest) + com.google.cloud.secrets.v1beta1.DisableSecretVersionRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_DisableSecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_DisableSecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest.class, + com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest.Builder.class); + } + + // Construct using com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) {} + } + + @java.lang.Override + public Builder clear() { + super.clear(); + name_ = ""; + + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_DisableSecretVersionRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest + getDefaultInstanceForType() { + return com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest build() { + com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest buildPartial() { + com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest result = + new com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest(this); + result.name_ = name_; + onBuilt(); + return result; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest) { + return mergeFrom((com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest other) { + if (other + == com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest.getDefaultInstance()) + return this; + if (!other.getName().isEmpty()) { + name_ = other.name_; + onChanged(); + } + this.mergeUnknownFields(other.unknownFields); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest parsedMessage = null; + try { + parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + parsedMessage = + (com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest) e.getUnfinishedMessage(); + throw e.unwrapIOException(); + } finally { + if (parsedMessage != null) { + mergeFrom(parsedMessage); + } + } + return this; + } + + private java.lang.Object name_ = ""; + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The name to set. + * @return This builder for chaining. + */ + public Builder setName(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + + name_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return This builder for chaining. + */ + public Builder clearName() { + + name_ = getDefaultInstance().getName(); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The bytes for name to set. + * @return This builder for chaining. + */ + public Builder setNameBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + + name_ = value; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.DisableSecretVersionRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.DisableSecretVersionRequest) + private static final com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest + DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest(); + } + + public static com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public DisableSecretVersionRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return new DisableSecretVersionRequest(input, extensionRegistry); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.DisableSecretVersionRequest getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/DisableSecretVersionRequestOrBuilder.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/DisableSecretVersionRequestOrBuilder.java new file mode 100644 index 00000000..4bccd956 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/DisableSecretVersionRequestOrBuilder.java @@ -0,0 +1,56 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +public interface DisableSecretVersionRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.DisableSecretVersionRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + java.lang.String getName(); + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + com.google.protobuf.ByteString getNameBytes(); +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/EnableSecretVersionRequest.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/EnableSecretVersionRequest.java new file mode 100644 index 00000000..f3b47e02 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/EnableSecretVersionRequest.java @@ -0,0 +1,656 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.EnableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.EnableSecretVersion].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.EnableSecretVersionRequest} + */ +public final class EnableSecretVersionRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.EnableSecretVersionRequest) + EnableSecretVersionRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use EnableSecretVersionRequest.newBuilder() to construct. + private EnableSecretVersionRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private EnableSecretVersionRequest() { + name_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new EnableSecretVersionRequest(); + } + + @java.lang.Override + public final com.google.protobuf.UnknownFieldSet getUnknownFields() { + return this.unknownFields; + } + + private EnableSecretVersionRequest( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + this(); + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + com.google.protobuf.UnknownFieldSet.Builder unknownFields = + com.google.protobuf.UnknownFieldSet.newBuilder(); + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + java.lang.String s = input.readStringRequireUtf8(); + + name_ = s; + break; + } + default: + { + if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { + done = true; + } + break; + } + } + } + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(this); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); + } finally { + this.unknownFields = unknownFields.build(); + makeExtensionsImmutable(); + } + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_EnableSecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_EnableSecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest.class, + com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest.Builder.class); + } + + public static final int NAME_FIELD_NUMBER = 1; + private volatile java.lang.Object name_; + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } + } + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!getNameBytes().isEmpty()) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); + } + unknownFields.writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!getNameBytes().isEmpty()) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); + } + size += unknownFields.getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest)) { + return super.equals(obj); + } + com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest other = + (com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest) obj; + + if (!getName().equals(other.getName())) return false; + if (!unknownFields.equals(other.unknownFields)) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + NAME_FIELD_NUMBER; + hash = (53 * hash) + getName().hashCode(); + hash = (29 * hash) + unknownFields.hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.EnableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.EnableSecretVersion].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.EnableSecretVersionRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.EnableSecretVersionRequest) + com.google.cloud.secrets.v1beta1.EnableSecretVersionRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_EnableSecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_EnableSecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest.class, + com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest.Builder.class); + } + + // Construct using com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) {} + } + + @java.lang.Override + public Builder clear() { + super.clear(); + name_ = ""; + + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_EnableSecretVersionRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest getDefaultInstanceForType() { + return com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest build() { + com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest buildPartial() { + com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest result = + new com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest(this); + result.name_ = name_; + onBuilt(); + return result; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest) { + return mergeFrom((com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest other) { + if (other == com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest.getDefaultInstance()) + return this; + if (!other.getName().isEmpty()) { + name_ = other.name_; + onChanged(); + } + this.mergeUnknownFields(other.unknownFields); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest parsedMessage = null; + try { + parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + parsedMessage = + (com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest) e.getUnfinishedMessage(); + throw e.unwrapIOException(); + } finally { + if (parsedMessage != null) { + mergeFrom(parsedMessage); + } + } + return this; + } + + private java.lang.Object name_ = ""; + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The name to set. + * @return This builder for chaining. + */ + public Builder setName(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + + name_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return This builder for chaining. + */ + public Builder clearName() { + + name_ = getDefaultInstance().getName(); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The bytes for name to set. + * @return This builder for chaining. + */ + public Builder setNameBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + + name_ = value; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.EnableSecretVersionRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.EnableSecretVersionRequest) + private static final com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest(); + } + + public static com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public EnableSecretVersionRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return new EnableSecretVersionRequest(input, extensionRegistry); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.EnableSecretVersionRequest getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/EnableSecretVersionRequestOrBuilder.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/EnableSecretVersionRequestOrBuilder.java new file mode 100644 index 00000000..52a25503 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/EnableSecretVersionRequestOrBuilder.java @@ -0,0 +1,56 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +public interface EnableSecretVersionRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.EnableSecretVersionRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + java.lang.String getName(); + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + com.google.protobuf.ByteString getNameBytes(); +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/GetSecretRequest.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/GetSecretRequest.java new file mode 100644 index 00000000..54243a6e --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/GetSecretRequest.java @@ -0,0 +1,648 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.GetSecret][google.cloud.secrets.v1beta1.SecretManagerService.GetSecret].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.GetSecretRequest} + */ +public final class GetSecretRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.GetSecretRequest) + GetSecretRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use GetSecretRequest.newBuilder() to construct. + private GetSecretRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private GetSecretRequest() { + name_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new GetSecretRequest(); + } + + @java.lang.Override + public final com.google.protobuf.UnknownFieldSet getUnknownFields() { + return this.unknownFields; + } + + private GetSecretRequest( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + this(); + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + com.google.protobuf.UnknownFieldSet.Builder unknownFields = + com.google.protobuf.UnknownFieldSet.newBuilder(); + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + java.lang.String s = input.readStringRequireUtf8(); + + name_ = s; + break; + } + default: + { + if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { + done = true; + } + break; + } + } + } + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(this); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); + } finally { + this.unknownFields = unknownFields.build(); + makeExtensionsImmutable(); + } + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_GetSecretRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_GetSecretRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.GetSecretRequest.class, + com.google.cloud.secrets.v1beta1.GetSecretRequest.Builder.class); + } + + public static final int NAME_FIELD_NUMBER = 1; + private volatile java.lang.Object name_; + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } + } + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!getNameBytes().isEmpty()) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); + } + unknownFields.writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!getNameBytes().isEmpty()) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); + } + size += unknownFields.getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secrets.v1beta1.GetSecretRequest)) { + return super.equals(obj); + } + com.google.cloud.secrets.v1beta1.GetSecretRequest other = + (com.google.cloud.secrets.v1beta1.GetSecretRequest) obj; + + if (!getName().equals(other.getName())) return false; + if (!unknownFields.equals(other.unknownFields)) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + NAME_FIELD_NUMBER; + hash = (53 * hash) + getName().hashCode(); + hash = (29 * hash) + unknownFields.hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secrets.v1beta1.GetSecretRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretRequest parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretRequest parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretRequest parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder(com.google.cloud.secrets.v1beta1.GetSecretRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.GetSecret][google.cloud.secrets.v1beta1.SecretManagerService.GetSecret].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.GetSecretRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.GetSecretRequest) + com.google.cloud.secrets.v1beta1.GetSecretRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_GetSecretRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_GetSecretRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.GetSecretRequest.class, + com.google.cloud.secrets.v1beta1.GetSecretRequest.Builder.class); + } + + // Construct using com.google.cloud.secrets.v1beta1.GetSecretRequest.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) {} + } + + @java.lang.Override + public Builder clear() { + super.clear(); + name_ = ""; + + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_GetSecretRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.GetSecretRequest getDefaultInstanceForType() { + return com.google.cloud.secrets.v1beta1.GetSecretRequest.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.GetSecretRequest build() { + com.google.cloud.secrets.v1beta1.GetSecretRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.GetSecretRequest buildPartial() { + com.google.cloud.secrets.v1beta1.GetSecretRequest result = + new com.google.cloud.secrets.v1beta1.GetSecretRequest(this); + result.name_ = name_; + onBuilt(); + return result; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secrets.v1beta1.GetSecretRequest) { + return mergeFrom((com.google.cloud.secrets.v1beta1.GetSecretRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secrets.v1beta1.GetSecretRequest other) { + if (other == com.google.cloud.secrets.v1beta1.GetSecretRequest.getDefaultInstance()) + return this; + if (!other.getName().isEmpty()) { + name_ = other.name_; + onChanged(); + } + this.mergeUnknownFields(other.unknownFields); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + com.google.cloud.secrets.v1beta1.GetSecretRequest parsedMessage = null; + try { + parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + parsedMessage = + (com.google.cloud.secrets.v1beta1.GetSecretRequest) e.getUnfinishedMessage(); + throw e.unwrapIOException(); + } finally { + if (parsedMessage != null) { + mergeFrom(parsedMessage); + } + } + return this; + } + + private java.lang.Object name_ = ""; + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The name to set. + * @return This builder for chaining. + */ + public Builder setName(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + + name_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return This builder for chaining. + */ + public Builder clearName() { + + name_ = getDefaultInstance().getName(); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The bytes for name to set. + * @return This builder for chaining. + */ + public Builder setNameBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + + name_ = value; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.GetSecretRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.GetSecretRequest) + private static final com.google.cloud.secrets.v1beta1.GetSecretRequest DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secrets.v1beta1.GetSecretRequest(); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretRequest getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public GetSecretRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return new GetSecretRequest(input, extensionRegistry); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.GetSecretRequest getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/GetSecretRequestOrBuilder.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/GetSecretRequestOrBuilder.java new file mode 100644 index 00000000..fa31af20 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/GetSecretRequestOrBuilder.java @@ -0,0 +1,54 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +public interface GetSecretRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.GetSecretRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + java.lang.String getName(); + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + com.google.protobuf.ByteString getNameBytes(); +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/GetSecretVersionRequest.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/GetSecretVersionRequest.java new file mode 100644 index 00000000..de486aa3 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/GetSecretVersionRequest.java @@ -0,0 +1,670 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.GetSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.GetSecretVersion].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.GetSecretVersionRequest} + */ +public final class GetSecretVersionRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.GetSecretVersionRequest) + GetSecretVersionRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use GetSecretVersionRequest.newBuilder() to construct. + private GetSecretVersionRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private GetSecretVersionRequest() { + name_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new GetSecretVersionRequest(); + } + + @java.lang.Override + public final com.google.protobuf.UnknownFieldSet getUnknownFields() { + return this.unknownFields; + } + + private GetSecretVersionRequest( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + this(); + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + com.google.protobuf.UnknownFieldSet.Builder unknownFields = + com.google.protobuf.UnknownFieldSet.newBuilder(); + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + java.lang.String s = input.readStringRequireUtf8(); + + name_ = s; + break; + } + default: + { + if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { + done = true; + } + break; + } + } + } + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(this); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); + } finally { + this.unknownFields = unknownFields.build(); + makeExtensionsImmutable(); + } + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_GetSecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_GetSecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.GetSecretVersionRequest.class, + com.google.cloud.secrets.v1beta1.GetSecretVersionRequest.Builder.class); + } + + public static final int NAME_FIELD_NUMBER = 1; + private volatile java.lang.Object name_; + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } + } + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!getNameBytes().isEmpty()) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); + } + unknownFields.writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!getNameBytes().isEmpty()) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); + } + size += unknownFields.getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secrets.v1beta1.GetSecretVersionRequest)) { + return super.equals(obj); + } + com.google.cloud.secrets.v1beta1.GetSecretVersionRequest other = + (com.google.cloud.secrets.v1beta1.GetSecretVersionRequest) obj; + + if (!getName().equals(other.getName())) return false; + if (!unknownFields.equals(other.unknownFields)) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + NAME_FIELD_NUMBER; + hash = (53 * hash) + getName().hashCode(); + hash = (29 * hash) + unknownFields.hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secrets.v1beta1.GetSecretVersionRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretVersionRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretVersionRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretVersionRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretVersionRequest parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretVersionRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretVersionRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretVersionRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretVersionRequest parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretVersionRequest parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secrets.v1beta1.GetSecretVersionRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.GetSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.GetSecretVersion].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.GetSecretVersionRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.GetSecretVersionRequest) + com.google.cloud.secrets.v1beta1.GetSecretVersionRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_GetSecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_GetSecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.GetSecretVersionRequest.class, + com.google.cloud.secrets.v1beta1.GetSecretVersionRequest.Builder.class); + } + + // Construct using com.google.cloud.secrets.v1beta1.GetSecretVersionRequest.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) {} + } + + @java.lang.Override + public Builder clear() { + super.clear(); + name_ = ""; + + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_GetSecretVersionRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.GetSecretVersionRequest getDefaultInstanceForType() { + return com.google.cloud.secrets.v1beta1.GetSecretVersionRequest.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.GetSecretVersionRequest build() { + com.google.cloud.secrets.v1beta1.GetSecretVersionRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.GetSecretVersionRequest buildPartial() { + com.google.cloud.secrets.v1beta1.GetSecretVersionRequest result = + new com.google.cloud.secrets.v1beta1.GetSecretVersionRequest(this); + result.name_ = name_; + onBuilt(); + return result; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secrets.v1beta1.GetSecretVersionRequest) { + return mergeFrom((com.google.cloud.secrets.v1beta1.GetSecretVersionRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secrets.v1beta1.GetSecretVersionRequest other) { + if (other == com.google.cloud.secrets.v1beta1.GetSecretVersionRequest.getDefaultInstance()) + return this; + if (!other.getName().isEmpty()) { + name_ = other.name_; + onChanged(); + } + this.mergeUnknownFields(other.unknownFields); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + com.google.cloud.secrets.v1beta1.GetSecretVersionRequest parsedMessage = null; + try { + parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + parsedMessage = + (com.google.cloud.secrets.v1beta1.GetSecretVersionRequest) e.getUnfinishedMessage(); + throw e.unwrapIOException(); + } finally { + if (parsedMessage != null) { + mergeFrom(parsedMessage); + } + } + return this; + } + + private java.lang.Object name_ = ""; + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The name to set. + * @return This builder for chaining. + */ + public Builder setName(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + + name_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return This builder for chaining. + */ + public Builder clearName() { + + name_ = getDefaultInstance().getName(); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The bytes for name to set. + * @return This builder for chaining. + */ + public Builder setNameBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + + name_ = value; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.GetSecretVersionRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.GetSecretVersionRequest) + private static final com.google.cloud.secrets.v1beta1.GetSecretVersionRequest DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secrets.v1beta1.GetSecretVersionRequest(); + } + + public static com.google.cloud.secrets.v1beta1.GetSecretVersionRequest getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public GetSecretVersionRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return new GetSecretVersionRequest(input, extensionRegistry); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.GetSecretVersionRequest getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/GetSecretVersionRequestOrBuilder.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/GetSecretVersionRequestOrBuilder.java new file mode 100644 index 00000000..bbb6de6b --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/GetSecretVersionRequestOrBuilder.java @@ -0,0 +1,60 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +public interface GetSecretVersionRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.GetSecretVersionRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + java.lang.String getName(); + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + com.google.protobuf.ByteString getNameBytes(); +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretVersionsRequest.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretVersionsRequest.java new file mode 100644 index 00000000..1e6d8a9c --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretVersionsRequest.java @@ -0,0 +1,943 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.ListSecretVersionsRequest} + */ +public final class ListSecretVersionsRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.ListSecretVersionsRequest) + ListSecretVersionsRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use ListSecretVersionsRequest.newBuilder() to construct. + private ListSecretVersionsRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private ListSecretVersionsRequest() { + parent_ = ""; + pageToken_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new ListSecretVersionsRequest(); + } + + @java.lang.Override + public final com.google.protobuf.UnknownFieldSet getUnknownFields() { + return this.unknownFields; + } + + private ListSecretVersionsRequest( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + this(); + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + com.google.protobuf.UnknownFieldSet.Builder unknownFields = + com.google.protobuf.UnknownFieldSet.newBuilder(); + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + java.lang.String s = input.readStringRequireUtf8(); + + parent_ = s; + break; + } + case 16: + { + pageSize_ = input.readInt32(); + break; + } + case 26: + { + java.lang.String s = input.readStringRequireUtf8(); + + pageToken_ = s; + break; + } + default: + { + if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { + done = true; + } + break; + } + } + } + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(this); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); + } finally { + this.unknownFields = unknownFields.build(); + makeExtensionsImmutable(); + } + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest.class, + com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest.Builder.class); + } + + public static final int PARENT_FIELD_NUMBER = 1; + private volatile java.lang.Object parent_; + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the
+   * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format
+   * `projects/*/secrets/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + public java.lang.String getParent() { + java.lang.Object ref = parent_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + parent_ = s; + return s; + } + } + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the
+   * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format
+   * `projects/*/secrets/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + public com.google.protobuf.ByteString getParentBytes() { + java.lang.Object ref = parent_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + parent_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + public static final int PAGE_SIZE_FIELD_NUMBER = 2; + private int pageSize_; + /** + * + * + *
+   * Optional. The maximum number of results to be returned in a single page. If
+   * set to 0, the server decides the number of results to return. If the
+   * number is greater than 25000, it is capped at 25000.
+   * 
+ * + * int32 page_size = 2 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageSize. + */ + public int getPageSize() { + return pageSize_; + } + + public static final int PAGE_TOKEN_FIELD_NUMBER = 3; + private volatile java.lang.Object pageToken_; + /** + * + * + *
+   * Optional. Pagination token, returned earlier via
+   * ListSecretVersionsResponse.next_page_token][].
+   * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageToken. + */ + public java.lang.String getPageToken() { + java.lang.Object ref = pageToken_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + pageToken_ = s; + return s; + } + } + /** + * + * + *
+   * Optional. Pagination token, returned earlier via
+   * ListSecretVersionsResponse.next_page_token][].
+   * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The bytes for pageToken. + */ + public com.google.protobuf.ByteString getPageTokenBytes() { + java.lang.Object ref = pageToken_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + pageToken_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!getParentBytes().isEmpty()) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, parent_); + } + if (pageSize_ != 0) { + output.writeInt32(2, pageSize_); + } + if (!getPageTokenBytes().isEmpty()) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 3, pageToken_); + } + unknownFields.writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!getParentBytes().isEmpty()) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, parent_); + } + if (pageSize_ != 0) { + size += com.google.protobuf.CodedOutputStream.computeInt32Size(2, pageSize_); + } + if (!getPageTokenBytes().isEmpty()) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(3, pageToken_); + } + size += unknownFields.getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest)) { + return super.equals(obj); + } + com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest other = + (com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest) obj; + + if (!getParent().equals(other.getParent())) return false; + if (getPageSize() != other.getPageSize()) return false; + if (!getPageToken().equals(other.getPageToken())) return false; + if (!unknownFields.equals(other.unknownFields)) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + PARENT_FIELD_NUMBER; + hash = (53 * hash) + getParent().hashCode(); + hash = (37 * hash) + PAGE_SIZE_FIELD_NUMBER; + hash = (53 * hash) + getPageSize(); + hash = (37 * hash) + PAGE_TOKEN_FIELD_NUMBER; + hash = (53 * hash) + getPageToken().hashCode(); + hash = (29 * hash) + unknownFields.hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.ListSecretVersionsRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.ListSecretVersionsRequest) + com.google.cloud.secrets.v1beta1.ListSecretVersionsRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest.class, + com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest.Builder.class); + } + + // Construct using com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) {} + } + + @java.lang.Override + public Builder clear() { + super.clear(); + parent_ = ""; + + pageSize_ = 0; + + pageToken_ = ""; + + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest getDefaultInstanceForType() { + return com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest build() { + com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest buildPartial() { + com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest result = + new com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest(this); + result.parent_ = parent_; + result.pageSize_ = pageSize_; + result.pageToken_ = pageToken_; + onBuilt(); + return result; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest) { + return mergeFrom((com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest other) { + if (other == com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest.getDefaultInstance()) + return this; + if (!other.getParent().isEmpty()) { + parent_ = other.parent_; + onChanged(); + } + if (other.getPageSize() != 0) { + setPageSize(other.getPageSize()); + } + if (!other.getPageToken().isEmpty()) { + pageToken_ = other.pageToken_; + onChanged(); + } + this.mergeUnknownFields(other.unknownFields); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest parsedMessage = null; + try { + parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + parsedMessage = + (com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest) e.getUnfinishedMessage(); + throw e.unwrapIOException(); + } finally { + if (parsedMessage != null) { + mergeFrom(parsedMessage); + } + } + return this; + } + + private java.lang.Object parent_ = ""; + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the
+     * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format
+     * `projects/*/secrets/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + public java.lang.String getParent() { + java.lang.Object ref = parent_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + parent_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the
+     * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format
+     * `projects/*/secrets/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + public com.google.protobuf.ByteString getParentBytes() { + java.lang.Object ref = parent_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + parent_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the
+     * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format
+     * `projects/*/secrets/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The parent to set. + * @return This builder for chaining. + */ + public Builder setParent(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + + parent_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the
+     * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format
+     * `projects/*/secrets/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return This builder for chaining. + */ + public Builder clearParent() { + + parent_ = getDefaultInstance().getParent(); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the
+     * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format
+     * `projects/*/secrets/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The bytes for parent to set. + * @return This builder for chaining. + */ + public Builder setParentBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + + parent_ = value; + onChanged(); + return this; + } + + private int pageSize_; + /** + * + * + *
+     * Optional. The maximum number of results to be returned in a single page. If
+     * set to 0, the server decides the number of results to return. If the
+     * number is greater than 25000, it is capped at 25000.
+     * 
+ * + * int32 page_size = 2 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageSize. + */ + public int getPageSize() { + return pageSize_; + } + /** + * + * + *
+     * Optional. The maximum number of results to be returned in a single page. If
+     * set to 0, the server decides the number of results to return. If the
+     * number is greater than 25000, it is capped at 25000.
+     * 
+ * + * int32 page_size = 2 [(.google.api.field_behavior) = OPTIONAL]; + * + * @param value The pageSize to set. + * @return This builder for chaining. + */ + public Builder setPageSize(int value) { + + pageSize_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * Optional. The maximum number of results to be returned in a single page. If
+     * set to 0, the server decides the number of results to return. If the
+     * number is greater than 25000, it is capped at 25000.
+     * 
+ * + * int32 page_size = 2 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return This builder for chaining. + */ + public Builder clearPageSize() { + + pageSize_ = 0; + onChanged(); + return this; + } + + private java.lang.Object pageToken_ = ""; + /** + * + * + *
+     * Optional. Pagination token, returned earlier via
+     * ListSecretVersionsResponse.next_page_token][].
+     * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageToken. + */ + public java.lang.String getPageToken() { + java.lang.Object ref = pageToken_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + pageToken_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Optional. Pagination token, returned earlier via
+     * ListSecretVersionsResponse.next_page_token][].
+     * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The bytes for pageToken. + */ + public com.google.protobuf.ByteString getPageTokenBytes() { + java.lang.Object ref = pageToken_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + pageToken_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Optional. Pagination token, returned earlier via
+     * ListSecretVersionsResponse.next_page_token][].
+     * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @param value The pageToken to set. + * @return This builder for chaining. + */ + public Builder setPageToken(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + + pageToken_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * Optional. Pagination token, returned earlier via
+     * ListSecretVersionsResponse.next_page_token][].
+     * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return This builder for chaining. + */ + public Builder clearPageToken() { + + pageToken_ = getDefaultInstance().getPageToken(); + onChanged(); + return this; + } + /** + * + * + *
+     * Optional. Pagination token, returned earlier via
+     * ListSecretVersionsResponse.next_page_token][].
+     * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @param value The bytes for pageToken to set. + * @return This builder for chaining. + */ + public Builder setPageTokenBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + + pageToken_ = value; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.ListSecretVersionsRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.ListSecretVersionsRequest) + private static final com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest(); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public ListSecretVersionsRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return new ListSecretVersionsRequest(input, extensionRegistry); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.ListSecretVersionsRequest getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretVersionsRequestOrBuilder.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretVersionsRequestOrBuilder.java new file mode 100644 index 00000000..dffc5dea --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretVersionsRequestOrBuilder.java @@ -0,0 +1,100 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +public interface ListSecretVersionsRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.ListSecretVersionsRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the
+   * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format
+   * `projects/*/secrets/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + java.lang.String getParent(); + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the
+   * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format
+   * `projects/*/secrets/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + com.google.protobuf.ByteString getParentBytes(); + + /** + * + * + *
+   * Optional. The maximum number of results to be returned in a single page. If
+   * set to 0, the server decides the number of results to return. If the
+   * number is greater than 25000, it is capped at 25000.
+   * 
+ * + * int32 page_size = 2 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageSize. + */ + int getPageSize(); + + /** + * + * + *
+   * Optional. Pagination token, returned earlier via
+   * ListSecretVersionsResponse.next_page_token][].
+   * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageToken. + */ + java.lang.String getPageToken(); + /** + * + * + *
+   * Optional. Pagination token, returned earlier via
+   * ListSecretVersionsResponse.next_page_token][].
+   * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The bytes for pageToken. + */ + com.google.protobuf.ByteString getPageTokenBytes(); +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretVersionsResponse.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretVersionsResponse.java new file mode 100644 index 00000000..8d71975e --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretVersionsResponse.java @@ -0,0 +1,1243 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +/** + * + * + *
+ * Response message for [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.ListSecretVersionsResponse} + */ +public final class ListSecretVersionsResponse extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.ListSecretVersionsResponse) + ListSecretVersionsResponseOrBuilder { + private static final long serialVersionUID = 0L; + // Use ListSecretVersionsResponse.newBuilder() to construct. + private ListSecretVersionsResponse(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private ListSecretVersionsResponse() { + versions_ = java.util.Collections.emptyList(); + nextPageToken_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new ListSecretVersionsResponse(); + } + + @java.lang.Override + public final com.google.protobuf.UnknownFieldSet getUnknownFields() { + return this.unknownFields; + } + + private ListSecretVersionsResponse( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + this(); + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + int mutable_bitField0_ = 0; + com.google.protobuf.UnknownFieldSet.Builder unknownFields = + com.google.protobuf.UnknownFieldSet.newBuilder(); + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + if (!((mutable_bitField0_ & 0x00000001) != 0)) { + versions_ = + new java.util.ArrayList(); + mutable_bitField0_ |= 0x00000001; + } + versions_.add( + input.readMessage( + com.google.cloud.secrets.v1beta1.SecretVersion.parser(), extensionRegistry)); + break; + } + case 18: + { + java.lang.String s = input.readStringRequireUtf8(); + + nextPageToken_ = s; + break; + } + case 24: + { + totalSize_ = input.readInt32(); + break; + } + default: + { + if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { + done = true; + } + break; + } + } + } + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(this); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); + } finally { + if (((mutable_bitField0_ & 0x00000001) != 0)) { + versions_ = java.util.Collections.unmodifiableList(versions_); + } + this.unknownFields = unknownFields.build(); + makeExtensionsImmutable(); + } + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsResponse_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsResponse_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse.class, + com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse.Builder.class); + } + + public static final int VERSIONS_FIELD_NUMBER = 1; + private java.util.List versions_; + /** + * + * + *
+   * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+   * create_time (newest first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public java.util.List getVersionsList() { + return versions_; + } + /** + * + * + *
+   * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+   * create_time (newest first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public java.util.List + getVersionsOrBuilderList() { + return versions_; + } + /** + * + * + *
+   * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+   * create_time (newest first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public int getVersionsCount() { + return versions_.size(); + } + /** + * + * + *
+   * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+   * create_time (newest first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public com.google.cloud.secrets.v1beta1.SecretVersion getVersions(int index) { + return versions_.get(index); + } + /** + * + * + *
+   * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+   * create_time (newest first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public com.google.cloud.secrets.v1beta1.SecretVersionOrBuilder getVersionsOrBuilder(int index) { + return versions_.get(index); + } + + public static final int NEXT_PAGE_TOKEN_FIELD_NUMBER = 2; + private volatile java.lang.Object nextPageToken_; + /** + * + * + *
+   * A token to retrieve the next page of results. Pass this value in
+   * [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page.
+   * 
+ * + * string next_page_token = 2; + * + * @return The nextPageToken. + */ + public java.lang.String getNextPageToken() { + java.lang.Object ref = nextPageToken_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + nextPageToken_ = s; + return s; + } + } + /** + * + * + *
+   * A token to retrieve the next page of results. Pass this value in
+   * [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page.
+   * 
+ * + * string next_page_token = 2; + * + * @return The bytes for nextPageToken. + */ + public com.google.protobuf.ByteString getNextPageTokenBytes() { + java.lang.Object ref = nextPageToken_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + nextPageToken_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + public static final int TOTAL_SIZE_FIELD_NUMBER = 3; + private int totalSize_; + /** + * + * + *
+   * The total number of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * int32 total_size = 3; + * + * @return The totalSize. + */ + public int getTotalSize() { + return totalSize_; + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + for (int i = 0; i < versions_.size(); i++) { + output.writeMessage(1, versions_.get(i)); + } + if (!getNextPageTokenBytes().isEmpty()) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 2, nextPageToken_); + } + if (totalSize_ != 0) { + output.writeInt32(3, totalSize_); + } + unknownFields.writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + for (int i = 0; i < versions_.size(); i++) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(1, versions_.get(i)); + } + if (!getNextPageTokenBytes().isEmpty()) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(2, nextPageToken_); + } + if (totalSize_ != 0) { + size += com.google.protobuf.CodedOutputStream.computeInt32Size(3, totalSize_); + } + size += unknownFields.getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse)) { + return super.equals(obj); + } + com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse other = + (com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse) obj; + + if (!getVersionsList().equals(other.getVersionsList())) return false; + if (!getNextPageToken().equals(other.getNextPageToken())) return false; + if (getTotalSize() != other.getTotalSize()) return false; + if (!unknownFields.equals(other.unknownFields)) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + if (getVersionsCount() > 0) { + hash = (37 * hash) + VERSIONS_FIELD_NUMBER; + hash = (53 * hash) + getVersionsList().hashCode(); + } + hash = (37 * hash) + NEXT_PAGE_TOKEN_FIELD_NUMBER; + hash = (53 * hash) + getNextPageToken().hashCode(); + hash = (37 * hash) + TOTAL_SIZE_FIELD_NUMBER; + hash = (53 * hash) + getTotalSize(); + hash = (29 * hash) + unknownFields.hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Response message for [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.ListSecretVersionsResponse} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.ListSecretVersionsResponse) + com.google.cloud.secrets.v1beta1.ListSecretVersionsResponseOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsResponse_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsResponse_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse.class, + com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse.Builder.class); + } + + // Construct using com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) { + getVersionsFieldBuilder(); + } + } + + @java.lang.Override + public Builder clear() { + super.clear(); + if (versionsBuilder_ == null) { + versions_ = java.util.Collections.emptyList(); + bitField0_ = (bitField0_ & ~0x00000001); + } else { + versionsBuilder_.clear(); + } + nextPageToken_ = ""; + + totalSize_ = 0; + + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsResponse_descriptor; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse getDefaultInstanceForType() { + return com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse build() { + com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse buildPartial() { + com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse result = + new com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse(this); + int from_bitField0_ = bitField0_; + if (versionsBuilder_ == null) { + if (((bitField0_ & 0x00000001) != 0)) { + versions_ = java.util.Collections.unmodifiableList(versions_); + bitField0_ = (bitField0_ & ~0x00000001); + } + result.versions_ = versions_; + } else { + result.versions_ = versionsBuilder_.build(); + } + result.nextPageToken_ = nextPageToken_; + result.totalSize_ = totalSize_; + onBuilt(); + return result; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse) { + return mergeFrom((com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse other) { + if (other == com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse.getDefaultInstance()) + return this; + if (versionsBuilder_ == null) { + if (!other.versions_.isEmpty()) { + if (versions_.isEmpty()) { + versions_ = other.versions_; + bitField0_ = (bitField0_ & ~0x00000001); + } else { + ensureVersionsIsMutable(); + versions_.addAll(other.versions_); + } + onChanged(); + } + } else { + if (!other.versions_.isEmpty()) { + if (versionsBuilder_.isEmpty()) { + versionsBuilder_.dispose(); + versionsBuilder_ = null; + versions_ = other.versions_; + bitField0_ = (bitField0_ & ~0x00000001); + versionsBuilder_ = + com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders + ? getVersionsFieldBuilder() + : null; + } else { + versionsBuilder_.addAllMessages(other.versions_); + } + } + } + if (!other.getNextPageToken().isEmpty()) { + nextPageToken_ = other.nextPageToken_; + onChanged(); + } + if (other.getTotalSize() != 0) { + setTotalSize(other.getTotalSize()); + } + this.mergeUnknownFields(other.unknownFields); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse parsedMessage = null; + try { + parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + parsedMessage = + (com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse) e.getUnfinishedMessage(); + throw e.unwrapIOException(); + } finally { + if (parsedMessage != null) { + mergeFrom(parsedMessage); + } + } + return this; + } + + private int bitField0_; + + private java.util.List versions_ = + java.util.Collections.emptyList(); + + private void ensureVersionsIsMutable() { + if (!((bitField0_ & 0x00000001) != 0)) { + versions_ = + new java.util.ArrayList(versions_); + bitField0_ |= 0x00000001; + } + } + + private com.google.protobuf.RepeatedFieldBuilderV3< + com.google.cloud.secrets.v1beta1.SecretVersion, + com.google.cloud.secrets.v1beta1.SecretVersion.Builder, + com.google.cloud.secrets.v1beta1.SecretVersionOrBuilder> + versionsBuilder_; + + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public java.util.List getVersionsList() { + if (versionsBuilder_ == null) { + return java.util.Collections.unmodifiableList(versions_); + } else { + return versionsBuilder_.getMessageList(); + } + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public int getVersionsCount() { + if (versionsBuilder_ == null) { + return versions_.size(); + } else { + return versionsBuilder_.getCount(); + } + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public com.google.cloud.secrets.v1beta1.SecretVersion getVersions(int index) { + if (versionsBuilder_ == null) { + return versions_.get(index); + } else { + return versionsBuilder_.getMessage(index); + } + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public Builder setVersions(int index, com.google.cloud.secrets.v1beta1.SecretVersion value) { + if (versionsBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + ensureVersionsIsMutable(); + versions_.set(index, value); + onChanged(); + } else { + versionsBuilder_.setMessage(index, value); + } + return this; + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public Builder setVersions( + int index, com.google.cloud.secrets.v1beta1.SecretVersion.Builder builderForValue) { + if (versionsBuilder_ == null) { + ensureVersionsIsMutable(); + versions_.set(index, builderForValue.build()); + onChanged(); + } else { + versionsBuilder_.setMessage(index, builderForValue.build()); + } + return this; + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public Builder addVersions(com.google.cloud.secrets.v1beta1.SecretVersion value) { + if (versionsBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + ensureVersionsIsMutable(); + versions_.add(value); + onChanged(); + } else { + versionsBuilder_.addMessage(value); + } + return this; + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public Builder addVersions(int index, com.google.cloud.secrets.v1beta1.SecretVersion value) { + if (versionsBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + ensureVersionsIsMutable(); + versions_.add(index, value); + onChanged(); + } else { + versionsBuilder_.addMessage(index, value); + } + return this; + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public Builder addVersions( + com.google.cloud.secrets.v1beta1.SecretVersion.Builder builderForValue) { + if (versionsBuilder_ == null) { + ensureVersionsIsMutable(); + versions_.add(builderForValue.build()); + onChanged(); + } else { + versionsBuilder_.addMessage(builderForValue.build()); + } + return this; + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public Builder addVersions( + int index, com.google.cloud.secrets.v1beta1.SecretVersion.Builder builderForValue) { + if (versionsBuilder_ == null) { + ensureVersionsIsMutable(); + versions_.add(index, builderForValue.build()); + onChanged(); + } else { + versionsBuilder_.addMessage(index, builderForValue.build()); + } + return this; + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public Builder addAllVersions( + java.lang.Iterable values) { + if (versionsBuilder_ == null) { + ensureVersionsIsMutable(); + com.google.protobuf.AbstractMessageLite.Builder.addAll(values, versions_); + onChanged(); + } else { + versionsBuilder_.addAllMessages(values); + } + return this; + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public Builder clearVersions() { + if (versionsBuilder_ == null) { + versions_ = java.util.Collections.emptyList(); + bitField0_ = (bitField0_ & ~0x00000001); + onChanged(); + } else { + versionsBuilder_.clear(); + } + return this; + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public Builder removeVersions(int index) { + if (versionsBuilder_ == null) { + ensureVersionsIsMutable(); + versions_.remove(index); + onChanged(); + } else { + versionsBuilder_.remove(index); + } + return this; + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public com.google.cloud.secrets.v1beta1.SecretVersion.Builder getVersionsBuilder(int index) { + return getVersionsFieldBuilder().getBuilder(index); + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public com.google.cloud.secrets.v1beta1.SecretVersionOrBuilder getVersionsOrBuilder(int index) { + if (versionsBuilder_ == null) { + return versions_.get(index); + } else { + return versionsBuilder_.getMessageOrBuilder(index); + } + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public java.util.List + getVersionsOrBuilderList() { + if (versionsBuilder_ != null) { + return versionsBuilder_.getMessageOrBuilderList(); + } else { + return java.util.Collections.unmodifiableList(versions_); + } + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public com.google.cloud.secrets.v1beta1.SecretVersion.Builder addVersionsBuilder() { + return getVersionsFieldBuilder() + .addBuilder(com.google.cloud.secrets.v1beta1.SecretVersion.getDefaultInstance()); + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public com.google.cloud.secrets.v1beta1.SecretVersion.Builder addVersionsBuilder(int index) { + return getVersionsFieldBuilder() + .addBuilder(index, com.google.cloud.secrets.v1beta1.SecretVersion.getDefaultInstance()); + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public java.util.List + getVersionsBuilderList() { + return getVersionsFieldBuilder().getBuilderList(); + } + + private com.google.protobuf.RepeatedFieldBuilderV3< + com.google.cloud.secrets.v1beta1.SecretVersion, + com.google.cloud.secrets.v1beta1.SecretVersion.Builder, + com.google.cloud.secrets.v1beta1.SecretVersionOrBuilder> + getVersionsFieldBuilder() { + if (versionsBuilder_ == null) { + versionsBuilder_ = + new com.google.protobuf.RepeatedFieldBuilderV3< + com.google.cloud.secrets.v1beta1.SecretVersion, + com.google.cloud.secrets.v1beta1.SecretVersion.Builder, + com.google.cloud.secrets.v1beta1.SecretVersionOrBuilder>( + versions_, ((bitField0_ & 0x00000001) != 0), getParentForChildren(), isClean()); + versions_ = null; + } + return versionsBuilder_; + } + + private java.lang.Object nextPageToken_ = ""; + /** + * + * + *
+     * A token to retrieve the next page of results. Pass this value in
+     * [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page.
+     * 
+ * + * string next_page_token = 2; + * + * @return The nextPageToken. + */ + public java.lang.String getNextPageToken() { + java.lang.Object ref = nextPageToken_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + nextPageToken_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * A token to retrieve the next page of results. Pass this value in
+     * [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page.
+     * 
+ * + * string next_page_token = 2; + * + * @return The bytes for nextPageToken. + */ + public com.google.protobuf.ByteString getNextPageTokenBytes() { + java.lang.Object ref = nextPageToken_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + nextPageToken_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * A token to retrieve the next page of results. Pass this value in
+     * [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page.
+     * 
+ * + * string next_page_token = 2; + * + * @param value The nextPageToken to set. + * @return This builder for chaining. + */ + public Builder setNextPageToken(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + + nextPageToken_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * A token to retrieve the next page of results. Pass this value in
+     * [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page.
+     * 
+ * + * string next_page_token = 2; + * + * @return This builder for chaining. + */ + public Builder clearNextPageToken() { + + nextPageToken_ = getDefaultInstance().getNextPageToken(); + onChanged(); + return this; + } + /** + * + * + *
+     * A token to retrieve the next page of results. Pass this value in
+     * [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page.
+     * 
+ * + * string next_page_token = 2; + * + * @param value The bytes for nextPageToken to set. + * @return This builder for chaining. + */ + public Builder setNextPageTokenBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + + nextPageToken_ = value; + onChanged(); + return this; + } + + private int totalSize_; + /** + * + * + *
+     * The total number of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * int32 total_size = 3; + * + * @return The totalSize. + */ + public int getTotalSize() { + return totalSize_; + } + /** + * + * + *
+     * The total number of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * int32 total_size = 3; + * + * @param value The totalSize to set. + * @return This builder for chaining. + */ + public Builder setTotalSize(int value) { + + totalSize_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * The total number of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * int32 total_size = 3; + * + * @return This builder for chaining. + */ + public Builder clearTotalSize() { + + totalSize_ = 0; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.ListSecretVersionsResponse) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.ListSecretVersionsResponse) + private static final com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse(); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public ListSecretVersionsResponse parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return new ListSecretVersionsResponse(input, extensionRegistry); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.ListSecretVersionsResponse getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretVersionsResponseOrBuilder.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretVersionsResponseOrBuilder.java new file mode 100644 index 00000000..7d375354 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretVersionsResponseOrBuilder.java @@ -0,0 +1,122 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +public interface ListSecretVersionsResponseOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.ListSecretVersionsResponse) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+   * create_time (newest first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + java.util.List getVersionsList(); + /** + * + * + *
+   * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+   * create_time (newest first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + com.google.cloud.secrets.v1beta1.SecretVersion getVersions(int index); + /** + * + * + *
+   * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+   * create_time (newest first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + int getVersionsCount(); + /** + * + * + *
+   * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+   * create_time (newest first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + java.util.List + getVersionsOrBuilderList(); + /** + * + * + *
+   * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+   * create_time (newest first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + com.google.cloud.secrets.v1beta1.SecretVersionOrBuilder getVersionsOrBuilder(int index); + + /** + * + * + *
+   * A token to retrieve the next page of results. Pass this value in
+   * [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page.
+   * 
+ * + * string next_page_token = 2; + * + * @return The nextPageToken. + */ + java.lang.String getNextPageToken(); + /** + * + * + *
+   * A token to retrieve the next page of results. Pass this value in
+   * [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page.
+   * 
+ * + * string next_page_token = 2; + * + * @return The bytes for nextPageToken. + */ + com.google.protobuf.ByteString getNextPageTokenBytes(); + + /** + * + * + *
+   * The total number of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * int32 total_size = 3; + * + * @return The totalSize. + */ + int getTotalSize(); +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretsRequest.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretsRequest.java new file mode 100644 index 00000000..8a526bd1 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretsRequest.java @@ -0,0 +1,935 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.ListSecretsRequest} + */ +public final class ListSecretsRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.ListSecretsRequest) + ListSecretsRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use ListSecretsRequest.newBuilder() to construct. + private ListSecretsRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private ListSecretsRequest() { + parent_ = ""; + pageToken_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new ListSecretsRequest(); + } + + @java.lang.Override + public final com.google.protobuf.UnknownFieldSet getUnknownFields() { + return this.unknownFields; + } + + private ListSecretsRequest( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + this(); + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + com.google.protobuf.UnknownFieldSet.Builder unknownFields = + com.google.protobuf.UnknownFieldSet.newBuilder(); + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + java.lang.String s = input.readStringRequireUtf8(); + + parent_ = s; + break; + } + case 16: + { + pageSize_ = input.readInt32(); + break; + } + case 26: + { + java.lang.String s = input.readStringRequireUtf8(); + + pageToken_ = s; + break; + } + default: + { + if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { + done = true; + } + break; + } + } + } + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(this); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); + } finally { + this.unknownFields = unknownFields.build(); + makeExtensionsImmutable(); + } + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretsRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretsRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.ListSecretsRequest.class, + com.google.cloud.secrets.v1beta1.ListSecretsRequest.Builder.class); + } + + public static final int PARENT_FIELD_NUMBER = 1; + private volatile java.lang.Object parent_; + /** + * + * + *
+   * Required. The resource name of the project associated with the
+   * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + public java.lang.String getParent() { + java.lang.Object ref = parent_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + parent_ = s; + return s; + } + } + /** + * + * + *
+   * Required. The resource name of the project associated with the
+   * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + public com.google.protobuf.ByteString getParentBytes() { + java.lang.Object ref = parent_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + parent_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + public static final int PAGE_SIZE_FIELD_NUMBER = 2; + private int pageSize_; + /** + * + * + *
+   * Optional. The maximum number of results to be returned in a single page. If
+   * set to 0, the server decides the number of results to return. If the
+   * number is greater than 25000, it is capped at 25000.
+   * 
+ * + * int32 page_size = 2 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageSize. + */ + public int getPageSize() { + return pageSize_; + } + + public static final int PAGE_TOKEN_FIELD_NUMBER = 3; + private volatile java.lang.Object pageToken_; + /** + * + * + *
+   * Optional. Pagination token, returned earlier via
+   * [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token].
+   * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageToken. + */ + public java.lang.String getPageToken() { + java.lang.Object ref = pageToken_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + pageToken_ = s; + return s; + } + } + /** + * + * + *
+   * Optional. Pagination token, returned earlier via
+   * [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token].
+   * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The bytes for pageToken. + */ + public com.google.protobuf.ByteString getPageTokenBytes() { + java.lang.Object ref = pageToken_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + pageToken_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!getParentBytes().isEmpty()) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, parent_); + } + if (pageSize_ != 0) { + output.writeInt32(2, pageSize_); + } + if (!getPageTokenBytes().isEmpty()) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 3, pageToken_); + } + unknownFields.writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!getParentBytes().isEmpty()) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, parent_); + } + if (pageSize_ != 0) { + size += com.google.protobuf.CodedOutputStream.computeInt32Size(2, pageSize_); + } + if (!getPageTokenBytes().isEmpty()) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(3, pageToken_); + } + size += unknownFields.getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secrets.v1beta1.ListSecretsRequest)) { + return super.equals(obj); + } + com.google.cloud.secrets.v1beta1.ListSecretsRequest other = + (com.google.cloud.secrets.v1beta1.ListSecretsRequest) obj; + + if (!getParent().equals(other.getParent())) return false; + if (getPageSize() != other.getPageSize()) return false; + if (!getPageToken().equals(other.getPageToken())) return false; + if (!unknownFields.equals(other.unknownFields)) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + PARENT_FIELD_NUMBER; + hash = (53 * hash) + getParent().hashCode(); + hash = (37 * hash) + PAGE_SIZE_FIELD_NUMBER; + hash = (53 * hash) + getPageSize(); + hash = (37 * hash) + PAGE_TOKEN_FIELD_NUMBER; + hash = (53 * hash) + getPageToken().hashCode(); + hash = (29 * hash) + unknownFields.hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsRequest parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsRequest parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsRequest parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder(com.google.cloud.secrets.v1beta1.ListSecretsRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.ListSecretsRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.ListSecretsRequest) + com.google.cloud.secrets.v1beta1.ListSecretsRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretsRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretsRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.ListSecretsRequest.class, + com.google.cloud.secrets.v1beta1.ListSecretsRequest.Builder.class); + } + + // Construct using com.google.cloud.secrets.v1beta1.ListSecretsRequest.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) {} + } + + @java.lang.Override + public Builder clear() { + super.clear(); + parent_ = ""; + + pageSize_ = 0; + + pageToken_ = ""; + + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretsRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.ListSecretsRequest getDefaultInstanceForType() { + return com.google.cloud.secrets.v1beta1.ListSecretsRequest.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.ListSecretsRequest build() { + com.google.cloud.secrets.v1beta1.ListSecretsRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.ListSecretsRequest buildPartial() { + com.google.cloud.secrets.v1beta1.ListSecretsRequest result = + new com.google.cloud.secrets.v1beta1.ListSecretsRequest(this); + result.parent_ = parent_; + result.pageSize_ = pageSize_; + result.pageToken_ = pageToken_; + onBuilt(); + return result; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secrets.v1beta1.ListSecretsRequest) { + return mergeFrom((com.google.cloud.secrets.v1beta1.ListSecretsRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secrets.v1beta1.ListSecretsRequest other) { + if (other == com.google.cloud.secrets.v1beta1.ListSecretsRequest.getDefaultInstance()) + return this; + if (!other.getParent().isEmpty()) { + parent_ = other.parent_; + onChanged(); + } + if (other.getPageSize() != 0) { + setPageSize(other.getPageSize()); + } + if (!other.getPageToken().isEmpty()) { + pageToken_ = other.pageToken_; + onChanged(); + } + this.mergeUnknownFields(other.unknownFields); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + com.google.cloud.secrets.v1beta1.ListSecretsRequest parsedMessage = null; + try { + parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + parsedMessage = + (com.google.cloud.secrets.v1beta1.ListSecretsRequest) e.getUnfinishedMessage(); + throw e.unwrapIOException(); + } finally { + if (parsedMessage != null) { + mergeFrom(parsedMessage); + } + } + return this; + } + + private java.lang.Object parent_ = ""; + /** + * + * + *
+     * Required. The resource name of the project associated with the
+     * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + public java.lang.String getParent() { + java.lang.Object ref = parent_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + parent_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the project associated with the
+     * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + public com.google.protobuf.ByteString getParentBytes() { + java.lang.Object ref = parent_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + parent_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the project associated with the
+     * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The parent to set. + * @return This builder for chaining. + */ + public Builder setParent(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + + parent_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the project associated with the
+     * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return This builder for chaining. + */ + public Builder clearParent() { + + parent_ = getDefaultInstance().getParent(); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the project associated with the
+     * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The bytes for parent to set. + * @return This builder for chaining. + */ + public Builder setParentBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + + parent_ = value; + onChanged(); + return this; + } + + private int pageSize_; + /** + * + * + *
+     * Optional. The maximum number of results to be returned in a single page. If
+     * set to 0, the server decides the number of results to return. If the
+     * number is greater than 25000, it is capped at 25000.
+     * 
+ * + * int32 page_size = 2 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageSize. + */ + public int getPageSize() { + return pageSize_; + } + /** + * + * + *
+     * Optional. The maximum number of results to be returned in a single page. If
+     * set to 0, the server decides the number of results to return. If the
+     * number is greater than 25000, it is capped at 25000.
+     * 
+ * + * int32 page_size = 2 [(.google.api.field_behavior) = OPTIONAL]; + * + * @param value The pageSize to set. + * @return This builder for chaining. + */ + public Builder setPageSize(int value) { + + pageSize_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * Optional. The maximum number of results to be returned in a single page. If
+     * set to 0, the server decides the number of results to return. If the
+     * number is greater than 25000, it is capped at 25000.
+     * 
+ * + * int32 page_size = 2 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return This builder for chaining. + */ + public Builder clearPageSize() { + + pageSize_ = 0; + onChanged(); + return this; + } + + private java.lang.Object pageToken_ = ""; + /** + * + * + *
+     * Optional. Pagination token, returned earlier via
+     * [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token].
+     * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageToken. + */ + public java.lang.String getPageToken() { + java.lang.Object ref = pageToken_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + pageToken_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Optional. Pagination token, returned earlier via
+     * [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token].
+     * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The bytes for pageToken. + */ + public com.google.protobuf.ByteString getPageTokenBytes() { + java.lang.Object ref = pageToken_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + pageToken_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Optional. Pagination token, returned earlier via
+     * [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token].
+     * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @param value The pageToken to set. + * @return This builder for chaining. + */ + public Builder setPageToken(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + + pageToken_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * Optional. Pagination token, returned earlier via
+     * [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token].
+     * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return This builder for chaining. + */ + public Builder clearPageToken() { + + pageToken_ = getDefaultInstance().getPageToken(); + onChanged(); + return this; + } + /** + * + * + *
+     * Optional. Pagination token, returned earlier via
+     * [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token].
+     * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @param value The bytes for pageToken to set. + * @return This builder for chaining. + */ + public Builder setPageTokenBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + + pageToken_ = value; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.ListSecretsRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.ListSecretsRequest) + private static final com.google.cloud.secrets.v1beta1.ListSecretsRequest DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secrets.v1beta1.ListSecretsRequest(); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsRequest getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public ListSecretsRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return new ListSecretsRequest(input, extensionRegistry); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.ListSecretsRequest getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretsRequestOrBuilder.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretsRequestOrBuilder.java new file mode 100644 index 00000000..7123443b --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretsRequestOrBuilder.java @@ -0,0 +1,98 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +public interface ListSecretsRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.ListSecretsRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. The resource name of the project associated with the
+   * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + java.lang.String getParent(); + /** + * + * + *
+   * Required. The resource name of the project associated with the
+   * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + com.google.protobuf.ByteString getParentBytes(); + + /** + * + * + *
+   * Optional. The maximum number of results to be returned in a single page. If
+   * set to 0, the server decides the number of results to return. If the
+   * number is greater than 25000, it is capped at 25000.
+   * 
+ * + * int32 page_size = 2 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageSize. + */ + int getPageSize(); + + /** + * + * + *
+   * Optional. Pagination token, returned earlier via
+   * [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token].
+   * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageToken. + */ + java.lang.String getPageToken(); + /** + * + * + *
+   * Optional. Pagination token, returned earlier via
+   * [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token].
+   * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The bytes for pageToken. + */ + com.google.protobuf.ByteString getPageTokenBytes(); +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretsResponse.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretsResponse.java new file mode 100644 index 00000000..e36fcfea --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretsResponse.java @@ -0,0 +1,1238 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +/** + * + * + *
+ * Response message for [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.ListSecretsResponse} + */ +public final class ListSecretsResponse extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.ListSecretsResponse) + ListSecretsResponseOrBuilder { + private static final long serialVersionUID = 0L; + // Use ListSecretsResponse.newBuilder() to construct. + private ListSecretsResponse(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private ListSecretsResponse() { + secrets_ = java.util.Collections.emptyList(); + nextPageToken_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new ListSecretsResponse(); + } + + @java.lang.Override + public final com.google.protobuf.UnknownFieldSet getUnknownFields() { + return this.unknownFields; + } + + private ListSecretsResponse( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + this(); + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + int mutable_bitField0_ = 0; + com.google.protobuf.UnknownFieldSet.Builder unknownFields = + com.google.protobuf.UnknownFieldSet.newBuilder(); + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + if (!((mutable_bitField0_ & 0x00000001) != 0)) { + secrets_ = new java.util.ArrayList(); + mutable_bitField0_ |= 0x00000001; + } + secrets_.add( + input.readMessage( + com.google.cloud.secrets.v1beta1.Secret.parser(), extensionRegistry)); + break; + } + case 18: + { + java.lang.String s = input.readStringRequireUtf8(); + + nextPageToken_ = s; + break; + } + case 24: + { + totalSize_ = input.readInt32(); + break; + } + default: + { + if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { + done = true; + } + break; + } + } + } + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(this); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); + } finally { + if (((mutable_bitField0_ & 0x00000001) != 0)) { + secrets_ = java.util.Collections.unmodifiableList(secrets_); + } + this.unknownFields = unknownFields.build(); + makeExtensionsImmutable(); + } + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretsResponse_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretsResponse_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.ListSecretsResponse.class, + com.google.cloud.secrets.v1beta1.ListSecretsResponse.Builder.class); + } + + public static final int SECRETS_FIELD_NUMBER = 1; + private java.util.List secrets_; + /** + * + * + *
+   * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+   * first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public java.util.List getSecretsList() { + return secrets_; + } + /** + * + * + *
+   * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+   * first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public java.util.List + getSecretsOrBuilderList() { + return secrets_; + } + /** + * + * + *
+   * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+   * first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public int getSecretsCount() { + return secrets_.size(); + } + /** + * + * + *
+   * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+   * first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public com.google.cloud.secrets.v1beta1.Secret getSecrets(int index) { + return secrets_.get(index); + } + /** + * + * + *
+   * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+   * first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public com.google.cloud.secrets.v1beta1.SecretOrBuilder getSecretsOrBuilder(int index) { + return secrets_.get(index); + } + + public static final int NEXT_PAGE_TOKEN_FIELD_NUMBER = 2; + private volatile java.lang.Object nextPageToken_; + /** + * + * + *
+   * A token to retrieve the next page of results. Pass this value in
+   * [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page.
+   * 
+ * + * string next_page_token = 2; + * + * @return The nextPageToken. + */ + public java.lang.String getNextPageToken() { + java.lang.Object ref = nextPageToken_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + nextPageToken_ = s; + return s; + } + } + /** + * + * + *
+   * A token to retrieve the next page of results. Pass this value in
+   * [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page.
+   * 
+ * + * string next_page_token = 2; + * + * @return The bytes for nextPageToken. + */ + public com.google.protobuf.ByteString getNextPageTokenBytes() { + java.lang.Object ref = nextPageToken_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + nextPageToken_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + public static final int TOTAL_SIZE_FIELD_NUMBER = 3; + private int totalSize_; + /** + * + * + *
+   * The total number of [Secrets][google.cloud.secrets.v1beta1.Secret].
+   * 
+ * + * int32 total_size = 3; + * + * @return The totalSize. + */ + public int getTotalSize() { + return totalSize_; + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + for (int i = 0; i < secrets_.size(); i++) { + output.writeMessage(1, secrets_.get(i)); + } + if (!getNextPageTokenBytes().isEmpty()) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 2, nextPageToken_); + } + if (totalSize_ != 0) { + output.writeInt32(3, totalSize_); + } + unknownFields.writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + for (int i = 0; i < secrets_.size(); i++) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(1, secrets_.get(i)); + } + if (!getNextPageTokenBytes().isEmpty()) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(2, nextPageToken_); + } + if (totalSize_ != 0) { + size += com.google.protobuf.CodedOutputStream.computeInt32Size(3, totalSize_); + } + size += unknownFields.getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secrets.v1beta1.ListSecretsResponse)) { + return super.equals(obj); + } + com.google.cloud.secrets.v1beta1.ListSecretsResponse other = + (com.google.cloud.secrets.v1beta1.ListSecretsResponse) obj; + + if (!getSecretsList().equals(other.getSecretsList())) return false; + if (!getNextPageToken().equals(other.getNextPageToken())) return false; + if (getTotalSize() != other.getTotalSize()) return false; + if (!unknownFields.equals(other.unknownFields)) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + if (getSecretsCount() > 0) { + hash = (37 * hash) + SECRETS_FIELD_NUMBER; + hash = (53 * hash) + getSecretsList().hashCode(); + } + hash = (37 * hash) + NEXT_PAGE_TOKEN_FIELD_NUMBER; + hash = (53 * hash) + getNextPageToken().hashCode(); + hash = (37 * hash) + TOTAL_SIZE_FIELD_NUMBER; + hash = (53 * hash) + getTotalSize(); + hash = (29 * hash) + unknownFields.hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsResponse parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsResponse parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsResponse parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsResponse parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsResponse parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsResponse parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsResponse parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsResponse parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsResponse parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsResponse parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsResponse parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsResponse parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder(com.google.cloud.secrets.v1beta1.ListSecretsResponse prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Response message for [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.ListSecretsResponse} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.ListSecretsResponse) + com.google.cloud.secrets.v1beta1.ListSecretsResponseOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretsResponse_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretsResponse_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.ListSecretsResponse.class, + com.google.cloud.secrets.v1beta1.ListSecretsResponse.Builder.class); + } + + // Construct using com.google.cloud.secrets.v1beta1.ListSecretsResponse.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) { + getSecretsFieldBuilder(); + } + } + + @java.lang.Override + public Builder clear() { + super.clear(); + if (secretsBuilder_ == null) { + secrets_ = java.util.Collections.emptyList(); + bitField0_ = (bitField0_ & ~0x00000001); + } else { + secretsBuilder_.clear(); + } + nextPageToken_ = ""; + + totalSize_ = 0; + + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretsResponse_descriptor; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.ListSecretsResponse getDefaultInstanceForType() { + return com.google.cloud.secrets.v1beta1.ListSecretsResponse.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.ListSecretsResponse build() { + com.google.cloud.secrets.v1beta1.ListSecretsResponse result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.ListSecretsResponse buildPartial() { + com.google.cloud.secrets.v1beta1.ListSecretsResponse result = + new com.google.cloud.secrets.v1beta1.ListSecretsResponse(this); + int from_bitField0_ = bitField0_; + if (secretsBuilder_ == null) { + if (((bitField0_ & 0x00000001) != 0)) { + secrets_ = java.util.Collections.unmodifiableList(secrets_); + bitField0_ = (bitField0_ & ~0x00000001); + } + result.secrets_ = secrets_; + } else { + result.secrets_ = secretsBuilder_.build(); + } + result.nextPageToken_ = nextPageToken_; + result.totalSize_ = totalSize_; + onBuilt(); + return result; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secrets.v1beta1.ListSecretsResponse) { + return mergeFrom((com.google.cloud.secrets.v1beta1.ListSecretsResponse) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secrets.v1beta1.ListSecretsResponse other) { + if (other == com.google.cloud.secrets.v1beta1.ListSecretsResponse.getDefaultInstance()) + return this; + if (secretsBuilder_ == null) { + if (!other.secrets_.isEmpty()) { + if (secrets_.isEmpty()) { + secrets_ = other.secrets_; + bitField0_ = (bitField0_ & ~0x00000001); + } else { + ensureSecretsIsMutable(); + secrets_.addAll(other.secrets_); + } + onChanged(); + } + } else { + if (!other.secrets_.isEmpty()) { + if (secretsBuilder_.isEmpty()) { + secretsBuilder_.dispose(); + secretsBuilder_ = null; + secrets_ = other.secrets_; + bitField0_ = (bitField0_ & ~0x00000001); + secretsBuilder_ = + com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders + ? getSecretsFieldBuilder() + : null; + } else { + secretsBuilder_.addAllMessages(other.secrets_); + } + } + } + if (!other.getNextPageToken().isEmpty()) { + nextPageToken_ = other.nextPageToken_; + onChanged(); + } + if (other.getTotalSize() != 0) { + setTotalSize(other.getTotalSize()); + } + this.mergeUnknownFields(other.unknownFields); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + com.google.cloud.secrets.v1beta1.ListSecretsResponse parsedMessage = null; + try { + parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + parsedMessage = + (com.google.cloud.secrets.v1beta1.ListSecretsResponse) e.getUnfinishedMessage(); + throw e.unwrapIOException(); + } finally { + if (parsedMessage != null) { + mergeFrom(parsedMessage); + } + } + return this; + } + + private int bitField0_; + + private java.util.List secrets_ = + java.util.Collections.emptyList(); + + private void ensureSecretsIsMutable() { + if (!((bitField0_ & 0x00000001) != 0)) { + secrets_ = new java.util.ArrayList(secrets_); + bitField0_ |= 0x00000001; + } + } + + private com.google.protobuf.RepeatedFieldBuilderV3< + com.google.cloud.secrets.v1beta1.Secret, + com.google.cloud.secrets.v1beta1.Secret.Builder, + com.google.cloud.secrets.v1beta1.SecretOrBuilder> + secretsBuilder_; + + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public java.util.List getSecretsList() { + if (secretsBuilder_ == null) { + return java.util.Collections.unmodifiableList(secrets_); + } else { + return secretsBuilder_.getMessageList(); + } + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public int getSecretsCount() { + if (secretsBuilder_ == null) { + return secrets_.size(); + } else { + return secretsBuilder_.getCount(); + } + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public com.google.cloud.secrets.v1beta1.Secret getSecrets(int index) { + if (secretsBuilder_ == null) { + return secrets_.get(index); + } else { + return secretsBuilder_.getMessage(index); + } + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public Builder setSecrets(int index, com.google.cloud.secrets.v1beta1.Secret value) { + if (secretsBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + ensureSecretsIsMutable(); + secrets_.set(index, value); + onChanged(); + } else { + secretsBuilder_.setMessage(index, value); + } + return this; + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public Builder setSecrets( + int index, com.google.cloud.secrets.v1beta1.Secret.Builder builderForValue) { + if (secretsBuilder_ == null) { + ensureSecretsIsMutable(); + secrets_.set(index, builderForValue.build()); + onChanged(); + } else { + secretsBuilder_.setMessage(index, builderForValue.build()); + } + return this; + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public Builder addSecrets(com.google.cloud.secrets.v1beta1.Secret value) { + if (secretsBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + ensureSecretsIsMutable(); + secrets_.add(value); + onChanged(); + } else { + secretsBuilder_.addMessage(value); + } + return this; + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public Builder addSecrets(int index, com.google.cloud.secrets.v1beta1.Secret value) { + if (secretsBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + ensureSecretsIsMutable(); + secrets_.add(index, value); + onChanged(); + } else { + secretsBuilder_.addMessage(index, value); + } + return this; + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public Builder addSecrets(com.google.cloud.secrets.v1beta1.Secret.Builder builderForValue) { + if (secretsBuilder_ == null) { + ensureSecretsIsMutable(); + secrets_.add(builderForValue.build()); + onChanged(); + } else { + secretsBuilder_.addMessage(builderForValue.build()); + } + return this; + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public Builder addSecrets( + int index, com.google.cloud.secrets.v1beta1.Secret.Builder builderForValue) { + if (secretsBuilder_ == null) { + ensureSecretsIsMutable(); + secrets_.add(index, builderForValue.build()); + onChanged(); + } else { + secretsBuilder_.addMessage(index, builderForValue.build()); + } + return this; + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public Builder addAllSecrets( + java.lang.Iterable values) { + if (secretsBuilder_ == null) { + ensureSecretsIsMutable(); + com.google.protobuf.AbstractMessageLite.Builder.addAll(values, secrets_); + onChanged(); + } else { + secretsBuilder_.addAllMessages(values); + } + return this; + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public Builder clearSecrets() { + if (secretsBuilder_ == null) { + secrets_ = java.util.Collections.emptyList(); + bitField0_ = (bitField0_ & ~0x00000001); + onChanged(); + } else { + secretsBuilder_.clear(); + } + return this; + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public Builder removeSecrets(int index) { + if (secretsBuilder_ == null) { + ensureSecretsIsMutable(); + secrets_.remove(index); + onChanged(); + } else { + secretsBuilder_.remove(index); + } + return this; + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public com.google.cloud.secrets.v1beta1.Secret.Builder getSecretsBuilder(int index) { + return getSecretsFieldBuilder().getBuilder(index); + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public com.google.cloud.secrets.v1beta1.SecretOrBuilder getSecretsOrBuilder(int index) { + if (secretsBuilder_ == null) { + return secrets_.get(index); + } else { + return secretsBuilder_.getMessageOrBuilder(index); + } + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public java.util.List + getSecretsOrBuilderList() { + if (secretsBuilder_ != null) { + return secretsBuilder_.getMessageOrBuilderList(); + } else { + return java.util.Collections.unmodifiableList(secrets_); + } + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public com.google.cloud.secrets.v1beta1.Secret.Builder addSecretsBuilder() { + return getSecretsFieldBuilder() + .addBuilder(com.google.cloud.secrets.v1beta1.Secret.getDefaultInstance()); + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public com.google.cloud.secrets.v1beta1.Secret.Builder addSecretsBuilder(int index) { + return getSecretsFieldBuilder() + .addBuilder(index, com.google.cloud.secrets.v1beta1.Secret.getDefaultInstance()); + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public java.util.List getSecretsBuilderList() { + return getSecretsFieldBuilder().getBuilderList(); + } + + private com.google.protobuf.RepeatedFieldBuilderV3< + com.google.cloud.secrets.v1beta1.Secret, + com.google.cloud.secrets.v1beta1.Secret.Builder, + com.google.cloud.secrets.v1beta1.SecretOrBuilder> + getSecretsFieldBuilder() { + if (secretsBuilder_ == null) { + secretsBuilder_ = + new com.google.protobuf.RepeatedFieldBuilderV3< + com.google.cloud.secrets.v1beta1.Secret, + com.google.cloud.secrets.v1beta1.Secret.Builder, + com.google.cloud.secrets.v1beta1.SecretOrBuilder>( + secrets_, ((bitField0_ & 0x00000001) != 0), getParentForChildren(), isClean()); + secrets_ = null; + } + return secretsBuilder_; + } + + private java.lang.Object nextPageToken_ = ""; + /** + * + * + *
+     * A token to retrieve the next page of results. Pass this value in
+     * [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page.
+     * 
+ * + * string next_page_token = 2; + * + * @return The nextPageToken. + */ + public java.lang.String getNextPageToken() { + java.lang.Object ref = nextPageToken_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + nextPageToken_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * A token to retrieve the next page of results. Pass this value in
+     * [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page.
+     * 
+ * + * string next_page_token = 2; + * + * @return The bytes for nextPageToken. + */ + public com.google.protobuf.ByteString getNextPageTokenBytes() { + java.lang.Object ref = nextPageToken_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + nextPageToken_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * A token to retrieve the next page of results. Pass this value in
+     * [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page.
+     * 
+ * + * string next_page_token = 2; + * + * @param value The nextPageToken to set. + * @return This builder for chaining. + */ + public Builder setNextPageToken(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + + nextPageToken_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * A token to retrieve the next page of results. Pass this value in
+     * [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page.
+     * 
+ * + * string next_page_token = 2; + * + * @return This builder for chaining. + */ + public Builder clearNextPageToken() { + + nextPageToken_ = getDefaultInstance().getNextPageToken(); + onChanged(); + return this; + } + /** + * + * + *
+     * A token to retrieve the next page of results. Pass this value in
+     * [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page.
+     * 
+ * + * string next_page_token = 2; + * + * @param value The bytes for nextPageToken to set. + * @return This builder for chaining. + */ + public Builder setNextPageTokenBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + + nextPageToken_ = value; + onChanged(); + return this; + } + + private int totalSize_; + /** + * + * + *
+     * The total number of [Secrets][google.cloud.secrets.v1beta1.Secret].
+     * 
+ * + * int32 total_size = 3; + * + * @return The totalSize. + */ + public int getTotalSize() { + return totalSize_; + } + /** + * + * + *
+     * The total number of [Secrets][google.cloud.secrets.v1beta1.Secret].
+     * 
+ * + * int32 total_size = 3; + * + * @param value The totalSize to set. + * @return This builder for chaining. + */ + public Builder setTotalSize(int value) { + + totalSize_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * The total number of [Secrets][google.cloud.secrets.v1beta1.Secret].
+     * 
+ * + * int32 total_size = 3; + * + * @return This builder for chaining. + */ + public Builder clearTotalSize() { + + totalSize_ = 0; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.ListSecretsResponse) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.ListSecretsResponse) + private static final com.google.cloud.secrets.v1beta1.ListSecretsResponse DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secrets.v1beta1.ListSecretsResponse(); + } + + public static com.google.cloud.secrets.v1beta1.ListSecretsResponse getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public ListSecretsResponse parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return new ListSecretsResponse(input, extensionRegistry); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.ListSecretsResponse getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretsResponseOrBuilder.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretsResponseOrBuilder.java new file mode 100644 index 00000000..d1d09087 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ListSecretsResponseOrBuilder.java @@ -0,0 +1,122 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +public interface ListSecretsResponseOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.ListSecretsResponse) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+   * first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + java.util.List getSecretsList(); + /** + * + * + *
+   * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+   * first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + com.google.cloud.secrets.v1beta1.Secret getSecrets(int index); + /** + * + * + *
+   * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+   * first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + int getSecretsCount(); + /** + * + * + *
+   * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+   * first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + java.util.List + getSecretsOrBuilderList(); + /** + * + * + *
+   * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+   * first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + com.google.cloud.secrets.v1beta1.SecretOrBuilder getSecretsOrBuilder(int index); + + /** + * + * + *
+   * A token to retrieve the next page of results. Pass this value in
+   * [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page.
+   * 
+ * + * string next_page_token = 2; + * + * @return The nextPageToken. + */ + java.lang.String getNextPageToken(); + /** + * + * + *
+   * A token to retrieve the next page of results. Pass this value in
+   * [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page.
+   * 
+ * + * string next_page_token = 2; + * + * @return The bytes for nextPageToken. + */ + com.google.protobuf.ByteString getNextPageTokenBytes(); + + /** + * + * + *
+   * The total number of [Secrets][google.cloud.secrets.v1beta1.Secret].
+   * 
+ * + * int32 total_size = 3; + * + * @return The totalSize. + */ + int getTotalSize(); +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ProjectName.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ProjectName.java new file mode 100644 index 00000000..5f4b28fd --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ProjectName.java @@ -0,0 +1,162 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secrets.v1beta1; + +import com.google.api.pathtemplate.PathTemplate; +import com.google.api.resourcenames.ResourceName; +import com.google.common.base.Preconditions; +import com.google.common.collect.ImmutableMap; +import java.util.ArrayList; +import java.util.List; +import java.util.Map; + +// AUTO-GENERATED DOCUMENTATION AND CLASS +@javax.annotation.Generated("by GAPIC protoc plugin") +public class ProjectName implements ResourceName { + + private static final PathTemplate PATH_TEMPLATE = + PathTemplate.createWithoutUrlEncoding("projects/{project}"); + + private volatile Map fieldValuesMap; + + private final String project; + + public String getProject() { + return project; + } + + public static Builder newBuilder() { + return new Builder(); + } + + public Builder toBuilder() { + return new Builder(this); + } + + private ProjectName(Builder builder) { + project = Preconditions.checkNotNull(builder.getProject()); + } + + public static ProjectName of(String project) { + return newBuilder().setProject(project).build(); + } + + public static String format(String project) { + return newBuilder().setProject(project).build().toString(); + } + + public static ProjectName parse(String formattedString) { + if (formattedString.isEmpty()) { + return null; + } + Map matchMap = + PATH_TEMPLATE.validatedMatch( + formattedString, "ProjectName.parse: formattedString not in valid format"); + return of(matchMap.get("project")); + } + + public static List parseList(List formattedStrings) { + List list = new ArrayList<>(formattedStrings.size()); + for (String formattedString : formattedStrings) { + list.add(parse(formattedString)); + } + return list; + } + + public static List toStringList(List values) { + List list = new ArrayList(values.size()); + for (ProjectName value : values) { + if (value == null) { + list.add(""); + } else { + list.add(value.toString()); + } + } + return list; + } + + public static boolean isParsableFrom(String formattedString) { + return PATH_TEMPLATE.matches(formattedString); + } + + public Map getFieldValuesMap() { + if (fieldValuesMap == null) { + synchronized (this) { + if (fieldValuesMap == null) { + ImmutableMap.Builder fieldMapBuilder = ImmutableMap.builder(); + fieldMapBuilder.put("project", project); + fieldValuesMap = fieldMapBuilder.build(); + } + } + } + return fieldValuesMap; + } + + public String getFieldValue(String fieldName) { + return getFieldValuesMap().get(fieldName); + } + + @Override + public String toString() { + return PATH_TEMPLATE.instantiate("project", project); + } + + /** Builder for ProjectName. */ + public static class Builder { + + private String project; + + public String getProject() { + return project; + } + + public Builder setProject(String project) { + this.project = project; + return this; + } + + private Builder() {} + + private Builder(ProjectName projectName) { + project = projectName.project; + } + + public ProjectName build() { + return new ProjectName(this); + } + } + + @Override + public boolean equals(Object o) { + if (o == this) { + return true; + } + if (o instanceof ProjectName) { + ProjectName that = (ProjectName) o; + return (this.project.equals(that.project)); + } + return false; + } + + @Override + public int hashCode() { + int h = 1; + h *= 1000003; + h ^= project.hashCode(); + return h; + } +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/Replication.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/Replication.java new file mode 100644 index 00000000..6ddadf8b --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/Replication.java @@ -0,0 +1,3373 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/resources.proto + +package com.google.cloud.secrets.v1beta1; + +/** + * + * + *
+ * A policy that defines the replication configuration of data.
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.Replication} + */ +public final class Replication extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.Replication) + ReplicationOrBuilder { + private static final long serialVersionUID = 0L; + // Use Replication.newBuilder() to construct. + private Replication(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private Replication() {} + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new Replication(); + } + + @java.lang.Override + public final com.google.protobuf.UnknownFieldSet getUnknownFields() { + return this.unknownFields; + } + + private Replication( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + this(); + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + com.google.protobuf.UnknownFieldSet.Builder unknownFields = + com.google.protobuf.UnknownFieldSet.newBuilder(); + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + com.google.cloud.secrets.v1beta1.Replication.Automatic.Builder subBuilder = null; + if (replicationCase_ == 1) { + subBuilder = + ((com.google.cloud.secrets.v1beta1.Replication.Automatic) replication_) + .toBuilder(); + } + replication_ = + input.readMessage( + com.google.cloud.secrets.v1beta1.Replication.Automatic.parser(), + extensionRegistry); + if (subBuilder != null) { + subBuilder.mergeFrom( + (com.google.cloud.secrets.v1beta1.Replication.Automatic) replication_); + replication_ = subBuilder.buildPartial(); + } + replicationCase_ = 1; + break; + } + case 18: + { + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Builder subBuilder = null; + if (replicationCase_ == 2) { + subBuilder = + ((com.google.cloud.secrets.v1beta1.Replication.UserManaged) replication_) + .toBuilder(); + } + replication_ = + input.readMessage( + com.google.cloud.secrets.v1beta1.Replication.UserManaged.parser(), + extensionRegistry); + if (subBuilder != null) { + subBuilder.mergeFrom( + (com.google.cloud.secrets.v1beta1.Replication.UserManaged) replication_); + replication_ = subBuilder.buildPartial(); + } + replicationCase_ = 2; + break; + } + default: + { + if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { + done = true; + } + break; + } + } + } + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(this); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); + } finally { + this.unknownFields = unknownFields.build(); + makeExtensionsImmutable(); + } + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.Replication.class, + com.google.cloud.secrets.v1beta1.Replication.Builder.class); + } + + public interface AutomaticOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.Replication.Automatic) + com.google.protobuf.MessageOrBuilder {} + /** + * + * + *
+   * A replication policy that replicates the [Secret][google.cloud.secrets.v1beta1.Secret] payload without any
+   * restrictions.
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.Replication.Automatic} + */ + public static final class Automatic extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.Replication.Automatic) + AutomaticOrBuilder { + private static final long serialVersionUID = 0L; + // Use Automatic.newBuilder() to construct. + private Automatic(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private Automatic() {} + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new Automatic(); + } + + @java.lang.Override + public final com.google.protobuf.UnknownFieldSet getUnknownFields() { + return this.unknownFields; + } + + private Automatic( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + this(); + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + com.google.protobuf.UnknownFieldSet.Builder unknownFields = + com.google.protobuf.UnknownFieldSet.newBuilder(); + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + default: + { + if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { + done = true; + } + break; + } + } + } + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(this); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); + } finally { + this.unknownFields = unknownFields.build(); + makeExtensionsImmutable(); + } + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_Automatic_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_Automatic_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.Replication.Automatic.class, + com.google.cloud.secrets.v1beta1.Replication.Automatic.Builder.class); + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + unknownFields.writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + size += unknownFields.getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secrets.v1beta1.Replication.Automatic)) { + return super.equals(obj); + } + com.google.cloud.secrets.v1beta1.Replication.Automatic other = + (com.google.cloud.secrets.v1beta1.Replication.Automatic) obj; + + if (!unknownFields.equals(other.unknownFields)) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (29 * hash) + unknownFields.hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secrets.v1beta1.Replication.Automatic parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.Replication.Automatic parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Replication.Automatic parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.Replication.Automatic parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Replication.Automatic parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.Replication.Automatic parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Replication.Automatic parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.Replication.Automatic parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Replication.Automatic parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.Replication.Automatic parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Replication.Automatic parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.Replication.Automatic parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secrets.v1beta1.Replication.Automatic prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType( + com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+     * A replication policy that replicates the [Secret][google.cloud.secrets.v1beta1.Secret] payload without any
+     * restrictions.
+     * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.Replication.Automatic} + */ + public static final class Builder + extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.Replication.Automatic) + com.google.cloud.secrets.v1beta1.Replication.AutomaticOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_Automatic_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_Automatic_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.Replication.Automatic.class, + com.google.cloud.secrets.v1beta1.Replication.Automatic.Builder.class); + } + + // Construct using com.google.cloud.secrets.v1beta1.Replication.Automatic.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) {} + } + + @java.lang.Override + public Builder clear() { + super.clear(); + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_Automatic_descriptor; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.Replication.Automatic getDefaultInstanceForType() { + return com.google.cloud.secrets.v1beta1.Replication.Automatic.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.Replication.Automatic build() { + com.google.cloud.secrets.v1beta1.Replication.Automatic result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.Replication.Automatic buildPartial() { + com.google.cloud.secrets.v1beta1.Replication.Automatic result = + new com.google.cloud.secrets.v1beta1.Replication.Automatic(this); + onBuilt(); + return result; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, + int index, + java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secrets.v1beta1.Replication.Automatic) { + return mergeFrom((com.google.cloud.secrets.v1beta1.Replication.Automatic) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secrets.v1beta1.Replication.Automatic other) { + if (other == com.google.cloud.secrets.v1beta1.Replication.Automatic.getDefaultInstance()) + return this; + this.mergeUnknownFields(other.unknownFields); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + com.google.cloud.secrets.v1beta1.Replication.Automatic parsedMessage = null; + try { + parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + parsedMessage = + (com.google.cloud.secrets.v1beta1.Replication.Automatic) e.getUnfinishedMessage(); + throw e.unwrapIOException(); + } finally { + if (parsedMessage != null) { + mergeFrom(parsedMessage); + } + } + return this; + } + + @java.lang.Override + public final Builder setUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.Replication.Automatic) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.Replication.Automatic) + private static final com.google.cloud.secrets.v1beta1.Replication.Automatic DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secrets.v1beta1.Replication.Automatic(); + } + + public static com.google.cloud.secrets.v1beta1.Replication.Automatic getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public Automatic parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return new Automatic(input, extensionRegistry); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.Replication.Automatic getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } + } + + public interface UserManagedOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.Replication.UserManaged) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+     * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+     * Cannot be empty.
+     * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + java.util.List + getReplicasList(); + /** + * + * + *
+     * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+     * Cannot be empty.
+     * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica getReplicas(int index); + /** + * + * + *
+     * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+     * Cannot be empty.
+     * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + int getReplicasCount(); + /** + * + * + *
+     * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+     * Cannot be empty.
+     * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + java.util.List< + ? extends com.google.cloud.secrets.v1beta1.Replication.UserManaged.ReplicaOrBuilder> + getReplicasOrBuilderList(); + /** + * + * + *
+     * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+     * Cannot be empty.
+     * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + com.google.cloud.secrets.v1beta1.Replication.UserManaged.ReplicaOrBuilder getReplicasOrBuilder( + int index); + } + /** + * + * + *
+   * A replication policy that replicates the [Secret][google.cloud.secrets.v1beta1.Secret] payload into the
+   * locations specified in [Secret.replication.user_managed.replicas][]
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.Replication.UserManaged} + */ + public static final class UserManaged extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.Replication.UserManaged) + UserManagedOrBuilder { + private static final long serialVersionUID = 0L; + // Use UserManaged.newBuilder() to construct. + private UserManaged(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private UserManaged() { + replicas_ = java.util.Collections.emptyList(); + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new UserManaged(); + } + + @java.lang.Override + public final com.google.protobuf.UnknownFieldSet getUnknownFields() { + return this.unknownFields; + } + + private UserManaged( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + this(); + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + int mutable_bitField0_ = 0; + com.google.protobuf.UnknownFieldSet.Builder unknownFields = + com.google.protobuf.UnknownFieldSet.newBuilder(); + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + if (!((mutable_bitField0_ & 0x00000001) != 0)) { + replicas_ = + new java.util.ArrayList< + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica>(); + mutable_bitField0_ |= 0x00000001; + } + replicas_.add( + input.readMessage( + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica.parser(), + extensionRegistry)); + break; + } + default: + { + if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { + done = true; + } + break; + } + } + } + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(this); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); + } finally { + if (((mutable_bitField0_ & 0x00000001) != 0)) { + replicas_ = java.util.Collections.unmodifiableList(replicas_); + } + this.unknownFields = unknownFields.build(); + makeExtensionsImmutable(); + } + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.Replication.UserManaged.class, + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Builder.class); + } + + public interface ReplicaOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.Replication.UserManaged.Replica) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+       * The canonical IDs of the location to replicate data.
+       * For example: `"us-east1"`.
+       * 
+ * + * string location = 1; + * + * @return The location. + */ + java.lang.String getLocation(); + /** + * + * + *
+       * The canonical IDs of the location to replicate data.
+       * For example: `"us-east1"`.
+       * 
+ * + * string location = 1; + * + * @return The bytes for location. + */ + com.google.protobuf.ByteString getLocationBytes(); + } + /** + * + * + *
+     * Represents a Replica for this [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.Replication.UserManaged.Replica} + */ + public static final class Replica extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.Replication.UserManaged.Replica) + ReplicaOrBuilder { + private static final long serialVersionUID = 0L; + // Use Replica.newBuilder() to construct. + private Replica(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private Replica() { + location_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new Replica(); + } + + @java.lang.Override + public final com.google.protobuf.UnknownFieldSet getUnknownFields() { + return this.unknownFields; + } + + private Replica( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + this(); + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + com.google.protobuf.UnknownFieldSet.Builder unknownFields = + com.google.protobuf.UnknownFieldSet.newBuilder(); + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + java.lang.String s = input.readStringRequireUtf8(); + + location_ = s; + break; + } + default: + { + if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { + done = true; + } + break; + } + } + } + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(this); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e) + .setUnfinishedMessage(this); + } finally { + this.unknownFields = unknownFields.build(); + makeExtensionsImmutable(); + } + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_Replica_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_Replica_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica.class, + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica.Builder.class); + } + + public static final int LOCATION_FIELD_NUMBER = 1; + private volatile java.lang.Object location_; + /** + * + * + *
+       * The canonical IDs of the location to replicate data.
+       * For example: `"us-east1"`.
+       * 
+ * + * string location = 1; + * + * @return The location. + */ + public java.lang.String getLocation() { + java.lang.Object ref = location_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + location_ = s; + return s; + } + } + /** + * + * + *
+       * The canonical IDs of the location to replicate data.
+       * For example: `"us-east1"`.
+       * 
+ * + * string location = 1; + * + * @return The bytes for location. + */ + public com.google.protobuf.ByteString getLocationBytes() { + java.lang.Object ref = location_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + location_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!getLocationBytes().isEmpty()) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, location_); + } + unknownFields.writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!getLocationBytes().isEmpty()) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, location_); + } + size += unknownFields.getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica)) { + return super.equals(obj); + } + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica other = + (com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica) obj; + + if (!getLocation().equals(other.getLocation())) return false; + if (!unknownFields.equals(other.unknownFields)) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + LOCATION_FIELD_NUMBER; + hash = (53 * hash) + getLocation().hashCode(); + hash = (29 * hash) + unknownFields.hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica parseFrom( + byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica + parseDelimitedFrom(java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica + parseDelimitedFrom( + java.io.InputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType( + com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+       * Represents a Replica for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.Replication.UserManaged.Replica} + */ + public static final class Builder + extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.Replication.UserManaged.Replica) + com.google.cloud.secrets.v1beta1.Replication.UserManaged.ReplicaOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_Replica_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_Replica_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica.class, + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica.Builder.class); + } + + // Construct using + // com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) {} + } + + @java.lang.Override + public Builder clear() { + super.clear(); + location_ = ""; + + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_Replica_descriptor; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica + getDefaultInstanceForType() { + return com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica + .getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica build() { + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica buildPartial() { + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica result = + new com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica(this); + result.location_ = location_; + onBuilt(); + return result; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, + int index, + java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica) { + return mergeFrom( + (com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom( + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica other) { + if (other + == com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica + .getDefaultInstance()) return this; + if (!other.getLocation().isEmpty()) { + location_ = other.location_; + onChanged(); + } + this.mergeUnknownFields(other.unknownFields); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica parsedMessage = null; + try { + parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + parsedMessage = + (com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica) + e.getUnfinishedMessage(); + throw e.unwrapIOException(); + } finally { + if (parsedMessage != null) { + mergeFrom(parsedMessage); + } + } + return this; + } + + private java.lang.Object location_ = ""; + /** + * + * + *
+         * The canonical IDs of the location to replicate data.
+         * For example: `"us-east1"`.
+         * 
+ * + * string location = 1; + * + * @return The location. + */ + public java.lang.String getLocation() { + java.lang.Object ref = location_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + location_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+         * The canonical IDs of the location to replicate data.
+         * For example: `"us-east1"`.
+         * 
+ * + * string location = 1; + * + * @return The bytes for location. + */ + public com.google.protobuf.ByteString getLocationBytes() { + java.lang.Object ref = location_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + location_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+         * The canonical IDs of the location to replicate data.
+         * For example: `"us-east1"`.
+         * 
+ * + * string location = 1; + * + * @param value The location to set. + * @return This builder for chaining. + */ + public Builder setLocation(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + + location_ = value; + onChanged(); + return this; + } + /** + * + * + *
+         * The canonical IDs of the location to replicate data.
+         * For example: `"us-east1"`.
+         * 
+ * + * string location = 1; + * + * @return This builder for chaining. + */ + public Builder clearLocation() { + + location_ = getDefaultInstance().getLocation(); + onChanged(); + return this; + } + /** + * + * + *
+         * The canonical IDs of the location to replicate data.
+         * For example: `"us-east1"`.
+         * 
+ * + * string location = 1; + * + * @param value The bytes for location to set. + * @return This builder for chaining. + */ + public Builder setLocationBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + + location_ = value; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.Replication.UserManaged.Replica) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.Replication.UserManaged.Replica) + private static final com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica + DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica(); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica + getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public Replica parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return new Replica(input, extensionRegistry); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica + getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } + } + + public static final int REPLICAS_FIELD_NUMBER = 1; + private java.util.List + replicas_; + /** + * + * + *
+     * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+     * Cannot be empty.
+     * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public java.util.List + getReplicasList() { + return replicas_; + } + /** + * + * + *
+     * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+     * Cannot be empty.
+     * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public java.util.List< + ? extends com.google.cloud.secrets.v1beta1.Replication.UserManaged.ReplicaOrBuilder> + getReplicasOrBuilderList() { + return replicas_; + } + /** + * + * + *
+     * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+     * Cannot be empty.
+     * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public int getReplicasCount() { + return replicas_.size(); + } + /** + * + * + *
+     * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+     * Cannot be empty.
+     * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica getReplicas(int index) { + return replicas_.get(index); + } + /** + * + * + *
+     * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+     * Cannot be empty.
+     * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secrets.v1beta1.Replication.UserManaged.ReplicaOrBuilder + getReplicasOrBuilder(int index) { + return replicas_.get(index); + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + for (int i = 0; i < replicas_.size(); i++) { + output.writeMessage(1, replicas_.get(i)); + } + unknownFields.writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + for (int i = 0; i < replicas_.size(); i++) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(1, replicas_.get(i)); + } + size += unknownFields.getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secrets.v1beta1.Replication.UserManaged)) { + return super.equals(obj); + } + com.google.cloud.secrets.v1beta1.Replication.UserManaged other = + (com.google.cloud.secrets.v1beta1.Replication.UserManaged) obj; + + if (!getReplicasList().equals(other.getReplicasList())) return false; + if (!unknownFields.equals(other.unknownFields)) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + if (getReplicasCount() > 0) { + hash = (37 * hash) + REPLICAS_FIELD_NUMBER; + hash = (53 * hash) + getReplicasList().hashCode(); + } + hash = (29 * hash) + unknownFields.hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secrets.v1beta1.Replication.UserManaged prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType( + com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+     * A replication policy that replicates the [Secret][google.cloud.secrets.v1beta1.Secret] payload into the
+     * locations specified in [Secret.replication.user_managed.replicas][]
+     * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.Replication.UserManaged} + */ + public static final class Builder + extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.Replication.UserManaged) + com.google.cloud.secrets.v1beta1.Replication.UserManagedOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.Replication.UserManaged.class, + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Builder.class); + } + + // Construct using com.google.cloud.secrets.v1beta1.Replication.UserManaged.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) { + getReplicasFieldBuilder(); + } + } + + @java.lang.Override + public Builder clear() { + super.clear(); + if (replicasBuilder_ == null) { + replicas_ = java.util.Collections.emptyList(); + bitField0_ = (bitField0_ & ~0x00000001); + } else { + replicasBuilder_.clear(); + } + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_descriptor; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.Replication.UserManaged getDefaultInstanceForType() { + return com.google.cloud.secrets.v1beta1.Replication.UserManaged.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.Replication.UserManaged build() { + com.google.cloud.secrets.v1beta1.Replication.UserManaged result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.Replication.UserManaged buildPartial() { + com.google.cloud.secrets.v1beta1.Replication.UserManaged result = + new com.google.cloud.secrets.v1beta1.Replication.UserManaged(this); + int from_bitField0_ = bitField0_; + if (replicasBuilder_ == null) { + if (((bitField0_ & 0x00000001) != 0)) { + replicas_ = java.util.Collections.unmodifiableList(replicas_); + bitField0_ = (bitField0_ & ~0x00000001); + } + result.replicas_ = replicas_; + } else { + result.replicas_ = replicasBuilder_.build(); + } + onBuilt(); + return result; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, + int index, + java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secrets.v1beta1.Replication.UserManaged) { + return mergeFrom((com.google.cloud.secrets.v1beta1.Replication.UserManaged) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secrets.v1beta1.Replication.UserManaged other) { + if (other == com.google.cloud.secrets.v1beta1.Replication.UserManaged.getDefaultInstance()) + return this; + if (replicasBuilder_ == null) { + if (!other.replicas_.isEmpty()) { + if (replicas_.isEmpty()) { + replicas_ = other.replicas_; + bitField0_ = (bitField0_ & ~0x00000001); + } else { + ensureReplicasIsMutable(); + replicas_.addAll(other.replicas_); + } + onChanged(); + } + } else { + if (!other.replicas_.isEmpty()) { + if (replicasBuilder_.isEmpty()) { + replicasBuilder_.dispose(); + replicasBuilder_ = null; + replicas_ = other.replicas_; + bitField0_ = (bitField0_ & ~0x00000001); + replicasBuilder_ = + com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders + ? getReplicasFieldBuilder() + : null; + } else { + replicasBuilder_.addAllMessages(other.replicas_); + } + } + } + this.mergeUnknownFields(other.unknownFields); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + com.google.cloud.secrets.v1beta1.Replication.UserManaged parsedMessage = null; + try { + parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + parsedMessage = + (com.google.cloud.secrets.v1beta1.Replication.UserManaged) e.getUnfinishedMessage(); + throw e.unwrapIOException(); + } finally { + if (parsedMessage != null) { + mergeFrom(parsedMessage); + } + } + return this; + } + + private int bitField0_; + + private java.util.List + replicas_ = java.util.Collections.emptyList(); + + private void ensureReplicasIsMutable() { + if (!((bitField0_ & 0x00000001) != 0)) { + replicas_ = + new java.util.ArrayList< + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica>(replicas_); + bitField0_ |= 0x00000001; + } + } + + private com.google.protobuf.RepeatedFieldBuilderV3< + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica, + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica.Builder, + com.google.cloud.secrets.v1beta1.Replication.UserManaged.ReplicaOrBuilder> + replicasBuilder_; + + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public java.util.List + getReplicasList() { + if (replicasBuilder_ == null) { + return java.util.Collections.unmodifiableList(replicas_); + } else { + return replicasBuilder_.getMessageList(); + } + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public int getReplicasCount() { + if (replicasBuilder_ == null) { + return replicas_.size(); + } else { + return replicasBuilder_.getCount(); + } + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica getReplicas( + int index) { + if (replicasBuilder_ == null) { + return replicas_.get(index); + } else { + return replicasBuilder_.getMessage(index); + } + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder setReplicas( + int index, com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica value) { + if (replicasBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + ensureReplicasIsMutable(); + replicas_.set(index, value); + onChanged(); + } else { + replicasBuilder_.setMessage(index, value); + } + return this; + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder setReplicas( + int index, + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica.Builder + builderForValue) { + if (replicasBuilder_ == null) { + ensureReplicasIsMutable(); + replicas_.set(index, builderForValue.build()); + onChanged(); + } else { + replicasBuilder_.setMessage(index, builderForValue.build()); + } + return this; + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder addReplicas( + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica value) { + if (replicasBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + ensureReplicasIsMutable(); + replicas_.add(value); + onChanged(); + } else { + replicasBuilder_.addMessage(value); + } + return this; + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder addReplicas( + int index, com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica value) { + if (replicasBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + ensureReplicasIsMutable(); + replicas_.add(index, value); + onChanged(); + } else { + replicasBuilder_.addMessage(index, value); + } + return this; + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder addReplicas( + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica.Builder + builderForValue) { + if (replicasBuilder_ == null) { + ensureReplicasIsMutable(); + replicas_.add(builderForValue.build()); + onChanged(); + } else { + replicasBuilder_.addMessage(builderForValue.build()); + } + return this; + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder addReplicas( + int index, + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica.Builder + builderForValue) { + if (replicasBuilder_ == null) { + ensureReplicasIsMutable(); + replicas_.add(index, builderForValue.build()); + onChanged(); + } else { + replicasBuilder_.addMessage(index, builderForValue.build()); + } + return this; + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder addAllReplicas( + java.lang.Iterable< + ? extends com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica> + values) { + if (replicasBuilder_ == null) { + ensureReplicasIsMutable(); + com.google.protobuf.AbstractMessageLite.Builder.addAll(values, replicas_); + onChanged(); + } else { + replicasBuilder_.addAllMessages(values); + } + return this; + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder clearReplicas() { + if (replicasBuilder_ == null) { + replicas_ = java.util.Collections.emptyList(); + bitField0_ = (bitField0_ & ~0x00000001); + onChanged(); + } else { + replicasBuilder_.clear(); + } + return this; + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder removeReplicas(int index) { + if (replicasBuilder_ == null) { + ensureReplicasIsMutable(); + replicas_.remove(index); + onChanged(); + } else { + replicasBuilder_.remove(index); + } + return this; + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica.Builder + getReplicasBuilder(int index) { + return getReplicasFieldBuilder().getBuilder(index); + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secrets.v1beta1.Replication.UserManaged.ReplicaOrBuilder + getReplicasOrBuilder(int index) { + if (replicasBuilder_ == null) { + return replicas_.get(index); + } else { + return replicasBuilder_.getMessageOrBuilder(index); + } + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public java.util.List< + ? extends com.google.cloud.secrets.v1beta1.Replication.UserManaged.ReplicaOrBuilder> + getReplicasOrBuilderList() { + if (replicasBuilder_ != null) { + return replicasBuilder_.getMessageOrBuilderList(); + } else { + return java.util.Collections.unmodifiableList(replicas_); + } + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica.Builder + addReplicasBuilder() { + return getReplicasFieldBuilder() + .addBuilder( + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica + .getDefaultInstance()); + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica.Builder + addReplicasBuilder(int index) { + return getReplicasFieldBuilder() + .addBuilder( + index, + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica + .getDefaultInstance()); + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public java.util.List< + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica.Builder> + getReplicasBuilderList() { + return getReplicasFieldBuilder().getBuilderList(); + } + + private com.google.protobuf.RepeatedFieldBuilderV3< + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica, + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica.Builder, + com.google.cloud.secrets.v1beta1.Replication.UserManaged.ReplicaOrBuilder> + getReplicasFieldBuilder() { + if (replicasBuilder_ == null) { + replicasBuilder_ = + new com.google.protobuf.RepeatedFieldBuilderV3< + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica, + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Replica.Builder, + com.google.cloud.secrets.v1beta1.Replication.UserManaged.ReplicaOrBuilder>( + replicas_, ((bitField0_ & 0x00000001) != 0), getParentForChildren(), isClean()); + replicas_ = null; + } + return replicasBuilder_; + } + + @java.lang.Override + public final Builder setUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.Replication.UserManaged) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.Replication.UserManaged) + private static final com.google.cloud.secrets.v1beta1.Replication.UserManaged DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secrets.v1beta1.Replication.UserManaged(); + } + + public static com.google.cloud.secrets.v1beta1.Replication.UserManaged getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public UserManaged parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return new UserManaged(input, extensionRegistry); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.Replication.UserManaged getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } + } + + private int replicationCase_ = 0; + private java.lang.Object replication_; + + public enum ReplicationCase implements com.google.protobuf.Internal.EnumLite { + AUTOMATIC(1), + USER_MANAGED(2), + REPLICATION_NOT_SET(0); + private final int value; + + private ReplicationCase(int value) { + this.value = value; + } + /** + * @param value The number of the enum to look for. + * @return The enum associated with the given number. + * @deprecated Use {@link #forNumber(int)} instead. + */ + @java.lang.Deprecated + public static ReplicationCase valueOf(int value) { + return forNumber(value); + } + + public static ReplicationCase forNumber(int value) { + switch (value) { + case 1: + return AUTOMATIC; + case 2: + return USER_MANAGED; + case 0: + return REPLICATION_NOT_SET; + default: + return null; + } + } + + public int getNumber() { + return this.value; + } + }; + + public ReplicationCase getReplicationCase() { + return ReplicationCase.forNumber(replicationCase_); + } + + public static final int AUTOMATIC_FIELD_NUMBER = 1; + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + * + * @return Whether the automatic field is set. + */ + public boolean hasAutomatic() { + return replicationCase_ == 1; + } + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + * + * @return The automatic. + */ + public com.google.cloud.secrets.v1beta1.Replication.Automatic getAutomatic() { + if (replicationCase_ == 1) { + return (com.google.cloud.secrets.v1beta1.Replication.Automatic) replication_; + } + return com.google.cloud.secrets.v1beta1.Replication.Automatic.getDefaultInstance(); + } + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + */ + public com.google.cloud.secrets.v1beta1.Replication.AutomaticOrBuilder getAutomaticOrBuilder() { + if (replicationCase_ == 1) { + return (com.google.cloud.secrets.v1beta1.Replication.Automatic) replication_; + } + return com.google.cloud.secrets.v1beta1.Replication.Automatic.getDefaultInstance(); + } + + public static final int USER_MANAGED_FIELD_NUMBER = 2; + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + * + * @return Whether the userManaged field is set. + */ + public boolean hasUserManaged() { + return replicationCase_ == 2; + } + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + * + * @return The userManaged. + */ + public com.google.cloud.secrets.v1beta1.Replication.UserManaged getUserManaged() { + if (replicationCase_ == 2) { + return (com.google.cloud.secrets.v1beta1.Replication.UserManaged) replication_; + } + return com.google.cloud.secrets.v1beta1.Replication.UserManaged.getDefaultInstance(); + } + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + */ + public com.google.cloud.secrets.v1beta1.Replication.UserManagedOrBuilder + getUserManagedOrBuilder() { + if (replicationCase_ == 2) { + return (com.google.cloud.secrets.v1beta1.Replication.UserManaged) replication_; + } + return com.google.cloud.secrets.v1beta1.Replication.UserManaged.getDefaultInstance(); + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (replicationCase_ == 1) { + output.writeMessage(1, (com.google.cloud.secrets.v1beta1.Replication.Automatic) replication_); + } + if (replicationCase_ == 2) { + output.writeMessage( + 2, (com.google.cloud.secrets.v1beta1.Replication.UserManaged) replication_); + } + unknownFields.writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (replicationCase_ == 1) { + size += + com.google.protobuf.CodedOutputStream.computeMessageSize( + 1, (com.google.cloud.secrets.v1beta1.Replication.Automatic) replication_); + } + if (replicationCase_ == 2) { + size += + com.google.protobuf.CodedOutputStream.computeMessageSize( + 2, (com.google.cloud.secrets.v1beta1.Replication.UserManaged) replication_); + } + size += unknownFields.getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secrets.v1beta1.Replication)) { + return super.equals(obj); + } + com.google.cloud.secrets.v1beta1.Replication other = + (com.google.cloud.secrets.v1beta1.Replication) obj; + + if (!getReplicationCase().equals(other.getReplicationCase())) return false; + switch (replicationCase_) { + case 1: + if (!getAutomatic().equals(other.getAutomatic())) return false; + break; + case 2: + if (!getUserManaged().equals(other.getUserManaged())) return false; + break; + case 0: + default: + } + if (!unknownFields.equals(other.unknownFields)) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + switch (replicationCase_) { + case 1: + hash = (37 * hash) + AUTOMATIC_FIELD_NUMBER; + hash = (53 * hash) + getAutomatic().hashCode(); + break; + case 2: + hash = (37 * hash) + USER_MANAGED_FIELD_NUMBER; + hash = (53 * hash) + getUserManaged().hashCode(); + break; + case 0: + default: + } + hash = (29 * hash) + unknownFields.hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secrets.v1beta1.Replication parseFrom(java.nio.ByteBuffer data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.Replication parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Replication parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.Replication parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Replication parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.Replication parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Replication parseFrom(java.io.InputStream input) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.Replication parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Replication parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.Replication parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Replication parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.Replication parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder(com.google.cloud.secrets.v1beta1.Replication prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * A policy that defines the replication configuration of data.
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.Replication} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.Replication) + com.google.cloud.secrets.v1beta1.ReplicationOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.Replication.class, + com.google.cloud.secrets.v1beta1.Replication.Builder.class); + } + + // Construct using com.google.cloud.secrets.v1beta1.Replication.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) {} + } + + @java.lang.Override + public Builder clear() { + super.clear(); + replicationCase_ = 0; + replication_ = null; + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_descriptor; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.Replication getDefaultInstanceForType() { + return com.google.cloud.secrets.v1beta1.Replication.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.Replication build() { + com.google.cloud.secrets.v1beta1.Replication result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.Replication buildPartial() { + com.google.cloud.secrets.v1beta1.Replication result = + new com.google.cloud.secrets.v1beta1.Replication(this); + if (replicationCase_ == 1) { + if (automaticBuilder_ == null) { + result.replication_ = replication_; + } else { + result.replication_ = automaticBuilder_.build(); + } + } + if (replicationCase_ == 2) { + if (userManagedBuilder_ == null) { + result.replication_ = replication_; + } else { + result.replication_ = userManagedBuilder_.build(); + } + } + result.replicationCase_ = replicationCase_; + onBuilt(); + return result; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secrets.v1beta1.Replication) { + return mergeFrom((com.google.cloud.secrets.v1beta1.Replication) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secrets.v1beta1.Replication other) { + if (other == com.google.cloud.secrets.v1beta1.Replication.getDefaultInstance()) return this; + switch (other.getReplicationCase()) { + case AUTOMATIC: + { + mergeAutomatic(other.getAutomatic()); + break; + } + case USER_MANAGED: + { + mergeUserManaged(other.getUserManaged()); + break; + } + case REPLICATION_NOT_SET: + { + break; + } + } + this.mergeUnknownFields(other.unknownFields); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + com.google.cloud.secrets.v1beta1.Replication parsedMessage = null; + try { + parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + parsedMessage = (com.google.cloud.secrets.v1beta1.Replication) e.getUnfinishedMessage(); + throw e.unwrapIOException(); + } finally { + if (parsedMessage != null) { + mergeFrom(parsedMessage); + } + } + return this; + } + + private int replicationCase_ = 0; + private java.lang.Object replication_; + + public ReplicationCase getReplicationCase() { + return ReplicationCase.forNumber(replicationCase_); + } + + public Builder clearReplication() { + replicationCase_ = 0; + replication_ = null; + onChanged(); + return this; + } + + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secrets.v1beta1.Replication.Automatic, + com.google.cloud.secrets.v1beta1.Replication.Automatic.Builder, + com.google.cloud.secrets.v1beta1.Replication.AutomaticOrBuilder> + automaticBuilder_; + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + * + * @return Whether the automatic field is set. + */ + public boolean hasAutomatic() { + return replicationCase_ == 1; + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + * + * @return The automatic. + */ + public com.google.cloud.secrets.v1beta1.Replication.Automatic getAutomatic() { + if (automaticBuilder_ == null) { + if (replicationCase_ == 1) { + return (com.google.cloud.secrets.v1beta1.Replication.Automatic) replication_; + } + return com.google.cloud.secrets.v1beta1.Replication.Automatic.getDefaultInstance(); + } else { + if (replicationCase_ == 1) { + return automaticBuilder_.getMessage(); + } + return com.google.cloud.secrets.v1beta1.Replication.Automatic.getDefaultInstance(); + } + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + */ + public Builder setAutomatic(com.google.cloud.secrets.v1beta1.Replication.Automatic value) { + if (automaticBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + replication_ = value; + onChanged(); + } else { + automaticBuilder_.setMessage(value); + } + replicationCase_ = 1; + return this; + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + */ + public Builder setAutomatic( + com.google.cloud.secrets.v1beta1.Replication.Automatic.Builder builderForValue) { + if (automaticBuilder_ == null) { + replication_ = builderForValue.build(); + onChanged(); + } else { + automaticBuilder_.setMessage(builderForValue.build()); + } + replicationCase_ = 1; + return this; + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + */ + public Builder mergeAutomatic(com.google.cloud.secrets.v1beta1.Replication.Automatic value) { + if (automaticBuilder_ == null) { + if (replicationCase_ == 1 + && replication_ + != com.google.cloud.secrets.v1beta1.Replication.Automatic.getDefaultInstance()) { + replication_ = + com.google.cloud.secrets.v1beta1.Replication.Automatic.newBuilder( + (com.google.cloud.secrets.v1beta1.Replication.Automatic) replication_) + .mergeFrom(value) + .buildPartial(); + } else { + replication_ = value; + } + onChanged(); + } else { + if (replicationCase_ == 1) { + automaticBuilder_.mergeFrom(value); + } + automaticBuilder_.setMessage(value); + } + replicationCase_ = 1; + return this; + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + */ + public Builder clearAutomatic() { + if (automaticBuilder_ == null) { + if (replicationCase_ == 1) { + replicationCase_ = 0; + replication_ = null; + onChanged(); + } + } else { + if (replicationCase_ == 1) { + replicationCase_ = 0; + replication_ = null; + } + automaticBuilder_.clear(); + } + return this; + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + */ + public com.google.cloud.secrets.v1beta1.Replication.Automatic.Builder getAutomaticBuilder() { + return getAutomaticFieldBuilder().getBuilder(); + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + */ + public com.google.cloud.secrets.v1beta1.Replication.AutomaticOrBuilder getAutomaticOrBuilder() { + if ((replicationCase_ == 1) && (automaticBuilder_ != null)) { + return automaticBuilder_.getMessageOrBuilder(); + } else { + if (replicationCase_ == 1) { + return (com.google.cloud.secrets.v1beta1.Replication.Automatic) replication_; + } + return com.google.cloud.secrets.v1beta1.Replication.Automatic.getDefaultInstance(); + } + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + */ + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secrets.v1beta1.Replication.Automatic, + com.google.cloud.secrets.v1beta1.Replication.Automatic.Builder, + com.google.cloud.secrets.v1beta1.Replication.AutomaticOrBuilder> + getAutomaticFieldBuilder() { + if (automaticBuilder_ == null) { + if (!(replicationCase_ == 1)) { + replication_ = + com.google.cloud.secrets.v1beta1.Replication.Automatic.getDefaultInstance(); + } + automaticBuilder_ = + new com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secrets.v1beta1.Replication.Automatic, + com.google.cloud.secrets.v1beta1.Replication.Automatic.Builder, + com.google.cloud.secrets.v1beta1.Replication.AutomaticOrBuilder>( + (com.google.cloud.secrets.v1beta1.Replication.Automatic) replication_, + getParentForChildren(), + isClean()); + replication_ = null; + } + replicationCase_ = 1; + onChanged(); + ; + return automaticBuilder_; + } + + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secrets.v1beta1.Replication.UserManaged, + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Builder, + com.google.cloud.secrets.v1beta1.Replication.UserManagedOrBuilder> + userManagedBuilder_; + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + * + * @return Whether the userManaged field is set. + */ + public boolean hasUserManaged() { + return replicationCase_ == 2; + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + * + * @return The userManaged. + */ + public com.google.cloud.secrets.v1beta1.Replication.UserManaged getUserManaged() { + if (userManagedBuilder_ == null) { + if (replicationCase_ == 2) { + return (com.google.cloud.secrets.v1beta1.Replication.UserManaged) replication_; + } + return com.google.cloud.secrets.v1beta1.Replication.UserManaged.getDefaultInstance(); + } else { + if (replicationCase_ == 2) { + return userManagedBuilder_.getMessage(); + } + return com.google.cloud.secrets.v1beta1.Replication.UserManaged.getDefaultInstance(); + } + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + */ + public Builder setUserManaged(com.google.cloud.secrets.v1beta1.Replication.UserManaged value) { + if (userManagedBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + replication_ = value; + onChanged(); + } else { + userManagedBuilder_.setMessage(value); + } + replicationCase_ = 2; + return this; + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + */ + public Builder setUserManaged( + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Builder builderForValue) { + if (userManagedBuilder_ == null) { + replication_ = builderForValue.build(); + onChanged(); + } else { + userManagedBuilder_.setMessage(builderForValue.build()); + } + replicationCase_ = 2; + return this; + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + */ + public Builder mergeUserManaged( + com.google.cloud.secrets.v1beta1.Replication.UserManaged value) { + if (userManagedBuilder_ == null) { + if (replicationCase_ == 2 + && replication_ + != com.google.cloud.secrets.v1beta1.Replication.UserManaged.getDefaultInstance()) { + replication_ = + com.google.cloud.secrets.v1beta1.Replication.UserManaged.newBuilder( + (com.google.cloud.secrets.v1beta1.Replication.UserManaged) replication_) + .mergeFrom(value) + .buildPartial(); + } else { + replication_ = value; + } + onChanged(); + } else { + if (replicationCase_ == 2) { + userManagedBuilder_.mergeFrom(value); + } + userManagedBuilder_.setMessage(value); + } + replicationCase_ = 2; + return this; + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + */ + public Builder clearUserManaged() { + if (userManagedBuilder_ == null) { + if (replicationCase_ == 2) { + replicationCase_ = 0; + replication_ = null; + onChanged(); + } + } else { + if (replicationCase_ == 2) { + replicationCase_ = 0; + replication_ = null; + } + userManagedBuilder_.clear(); + } + return this; + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + */ + public com.google.cloud.secrets.v1beta1.Replication.UserManaged.Builder + getUserManagedBuilder() { + return getUserManagedFieldBuilder().getBuilder(); + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + */ + public com.google.cloud.secrets.v1beta1.Replication.UserManagedOrBuilder + getUserManagedOrBuilder() { + if ((replicationCase_ == 2) && (userManagedBuilder_ != null)) { + return userManagedBuilder_.getMessageOrBuilder(); + } else { + if (replicationCase_ == 2) { + return (com.google.cloud.secrets.v1beta1.Replication.UserManaged) replication_; + } + return com.google.cloud.secrets.v1beta1.Replication.UserManaged.getDefaultInstance(); + } + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + */ + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secrets.v1beta1.Replication.UserManaged, + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Builder, + com.google.cloud.secrets.v1beta1.Replication.UserManagedOrBuilder> + getUserManagedFieldBuilder() { + if (userManagedBuilder_ == null) { + if (!(replicationCase_ == 2)) { + replication_ = + com.google.cloud.secrets.v1beta1.Replication.UserManaged.getDefaultInstance(); + } + userManagedBuilder_ = + new com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secrets.v1beta1.Replication.UserManaged, + com.google.cloud.secrets.v1beta1.Replication.UserManaged.Builder, + com.google.cloud.secrets.v1beta1.Replication.UserManagedOrBuilder>( + (com.google.cloud.secrets.v1beta1.Replication.UserManaged) replication_, + getParentForChildren(), + isClean()); + replication_ = null; + } + replicationCase_ = 2; + onChanged(); + ; + return userManagedBuilder_; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.Replication) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.Replication) + private static final com.google.cloud.secrets.v1beta1.Replication DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secrets.v1beta1.Replication(); + } + + public static com.google.cloud.secrets.v1beta1.Replication getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public Replication parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return new Replication(input, extensionRegistry); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.Replication getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ReplicationOrBuilder.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ReplicationOrBuilder.java new file mode 100644 index 00000000..1848eff5 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ReplicationOrBuilder.java @@ -0,0 +1,97 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/resources.proto + +package com.google.cloud.secrets.v1beta1; + +public interface ReplicationOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.Replication) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + * + * @return Whether the automatic field is set. + */ + boolean hasAutomatic(); + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + * + * @return The automatic. + */ + com.google.cloud.secrets.v1beta1.Replication.Automatic getAutomatic(); + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + */ + com.google.cloud.secrets.v1beta1.Replication.AutomaticOrBuilder getAutomaticOrBuilder(); + + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + * + * @return Whether the userManaged field is set. + */ + boolean hasUserManaged(); + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + * + * @return The userManaged. + */ + com.google.cloud.secrets.v1beta1.Replication.UserManaged getUserManaged(); + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + */ + com.google.cloud.secrets.v1beta1.Replication.UserManagedOrBuilder getUserManagedOrBuilder(); + + public com.google.cloud.secrets.v1beta1.Replication.ReplicationCase getReplicationCase(); +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ResourcesProto.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ResourcesProto.java new file mode 100644 index 00000000..814383a6 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/ResourcesProto.java @@ -0,0 +1,196 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/resources.proto + +package com.google.cloud.secrets.v1beta1; + +public final class ResourcesProto { + private ResourcesProto() {} + + public static void registerAllExtensions(com.google.protobuf.ExtensionRegistryLite registry) {} + + public static void registerAllExtensions(com.google.protobuf.ExtensionRegistry registry) { + registerAllExtensions((com.google.protobuf.ExtensionRegistryLite) registry); + } + + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_Secret_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_Secret_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_Secret_LabelsEntry_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_Secret_LabelsEntry_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_SecretVersion_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_SecretVersion_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_Replication_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_Replication_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_Replication_Automatic_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_Replication_Automatic_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_Replica_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_Replica_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_SecretPayload_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_SecretPayload_fieldAccessorTable; + + public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() { + return descriptor; + } + + private static com.google.protobuf.Descriptors.FileDescriptor descriptor; + + static { + java.lang.String[] descriptorData = { + "\n,google/cloud/secrets/v1beta1/resources" + + ".proto\022\034google.cloud.secrets.v1beta1\032\037go" + + "ogle/api/field_behavior.proto\032\031google/ap" + + "i/resource.proto\032\037google/protobuf/timest" + + "amp.proto\032\034google/api/annotations.proto\"" + + "\331\002\n\006Secret\022\021\n\004name\030\001 \001(\tB\003\340A\003\022F\n\013replica" + + "tion\030\002 \001(\0132).google.cloud.secrets.v1beta" + + "1.ReplicationB\006\340A\005\340A\002\0224\n\013create_time\030\003 \001" + + "(\0132\032.google.protobuf.TimestampB\003\340A\003\022@\n\006l" + + "abels\030\004 \003(\01320.google.cloud.secrets.v1bet" + + "a1.Secret.LabelsEntry\032-\n\013LabelsEntry\022\013\n\003" + + "key\030\001 \001(\t\022\r\n\005value\030\002 \001(\t:\0028\001:M\352AJ\n#secre" + + "tmanager.googleapis.com/Secret\022#projects" + + "/{project}/secrets/{secret}\"\220\003\n\rSecretVe" + + "rsion\022\021\n\004name\030\001 \001(\tB\003\340A\003\0224\n\013create_time\030" + + "\002 \001(\0132\032.google.protobuf.TimestampB\003\340A\003\0225" + + "\n\014destroy_time\030\003 \001(\0132\032.google.protobuf.T" + + "imestampB\003\340A\003\022E\n\005state\030\004 \001(\01621.google.cl" + + "oud.secrets.v1beta1.SecretVersion.StateB" + + "\003\340A\003\"H\n\005State\022\025\n\021STATE_UNSPECIFIED\020\000\022\013\n\007" + + "ENABLED\020\001\022\014\n\010DISABLED\020\002\022\r\n\tDESTROYED\020\003:n" + + "\352Ak\n*secretmanager.googleapis.com/Secret" + + "Version\022=projects/{project}/secrets/{sec" + + "ret}/versions/{secret_version}\"\305\002\n\013Repli" + + "cation\022H\n\tautomatic\030\001 \001(\01323.google.cloud" + + ".secrets.v1beta1.Replication.AutomaticH\000" + + "\022M\n\014user_managed\030\002 \001(\01325.google.cloud.se" + + "crets.v1beta1.Replication.UserManagedH\000\032" + + "\013\n\tAutomatic\032\200\001\n\013UserManaged\022T\n\010replicas" + + "\030\001 \003(\0132=.google.cloud.secrets.v1beta1.Re" + + "plication.UserManaged.ReplicaB\003\340A\002\032\033\n\007Re" + + "plica\022\020\n\010location\030\001 \001(\tB\r\n\013replication\"\035" + + "\n\rSecretPayload\022\014\n\004data\030\001 \001(\014B\300\001\n com.go" + + "ogle.cloud.secrets.v1beta1B\016ResourcesPro" + + "toP\001ZCgoogle.golang.org/genproto/googlea" + + "pis/cloud/secrets/v1beta1;secrets\370\001\001\242\002\003G" + + "SM\252\002\034Google.Cloud.Secrets.V1Beta1\312\002\034Goog" + + "le\\Cloud\\Secrets\\V1beta1b\006proto3" + }; + descriptor = + com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom( + descriptorData, + new com.google.protobuf.Descriptors.FileDescriptor[] { + com.google.api.FieldBehaviorProto.getDescriptor(), + com.google.api.ResourceProto.getDescriptor(), + com.google.protobuf.TimestampProto.getDescriptor(), + com.google.api.AnnotationsProto.getDescriptor(), + }); + internal_static_google_cloud_secrets_v1beta1_Secret_descriptor = + getDescriptor().getMessageTypes().get(0); + internal_static_google_cloud_secrets_v1beta1_Secret_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_Secret_descriptor, + new java.lang.String[] { + "Name", "Replication", "CreateTime", "Labels", + }); + internal_static_google_cloud_secrets_v1beta1_Secret_LabelsEntry_descriptor = + internal_static_google_cloud_secrets_v1beta1_Secret_descriptor.getNestedTypes().get(0); + internal_static_google_cloud_secrets_v1beta1_Secret_LabelsEntry_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_Secret_LabelsEntry_descriptor, + new java.lang.String[] { + "Key", "Value", + }); + internal_static_google_cloud_secrets_v1beta1_SecretVersion_descriptor = + getDescriptor().getMessageTypes().get(1); + internal_static_google_cloud_secrets_v1beta1_SecretVersion_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_SecretVersion_descriptor, + new java.lang.String[] { + "Name", "CreateTime", "DestroyTime", "State", + }); + internal_static_google_cloud_secrets_v1beta1_Replication_descriptor = + getDescriptor().getMessageTypes().get(2); + internal_static_google_cloud_secrets_v1beta1_Replication_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_Replication_descriptor, + new java.lang.String[] { + "Automatic", "UserManaged", "Replication", + }); + internal_static_google_cloud_secrets_v1beta1_Replication_Automatic_descriptor = + internal_static_google_cloud_secrets_v1beta1_Replication_descriptor.getNestedTypes().get(0); + internal_static_google_cloud_secrets_v1beta1_Replication_Automatic_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_Replication_Automatic_descriptor, + new java.lang.String[] {}); + internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_descriptor = + internal_static_google_cloud_secrets_v1beta1_Replication_descriptor.getNestedTypes().get(1); + internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_descriptor, + new java.lang.String[] { + "Replicas", + }); + internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_Replica_descriptor = + internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_descriptor + .getNestedTypes() + .get(0); + internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_Replica_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_Replica_descriptor, + new java.lang.String[] { + "Location", + }); + internal_static_google_cloud_secrets_v1beta1_SecretPayload_descriptor = + getDescriptor().getMessageTypes().get(3); + internal_static_google_cloud_secrets_v1beta1_SecretPayload_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_SecretPayload_descriptor, + new java.lang.String[] { + "Data", + }); + com.google.protobuf.ExtensionRegistry registry = + com.google.protobuf.ExtensionRegistry.newInstance(); + registry.add(com.google.api.FieldBehaviorProto.fieldBehavior); + registry.add(com.google.api.ResourceProto.resource); + com.google.protobuf.Descriptors.FileDescriptor.internalUpdateFileDescriptor( + descriptor, registry); + com.google.api.FieldBehaviorProto.getDescriptor(); + com.google.api.ResourceProto.getDescriptor(); + com.google.protobuf.TimestampProto.getDescriptor(); + com.google.api.AnnotationsProto.getDescriptor(); + } + + // @@protoc_insertion_point(outer_class_scope) +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/Secret.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/Secret.java new file mode 100644 index 00000000..47052c39 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/Secret.java @@ -0,0 +1,1629 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/resources.proto + +package com.google.cloud.secrets.v1beta1; + +/** + * + * + *
+ * A [Secret][google.cloud.secrets.v1beta1.Secret] is a logical secret whose value and versions can
+ * be accessed.
+ * A [Secret][google.cloud.secrets.v1beta1.Secret] is made up of zero or more [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] that
+ * represent the secret data.
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.Secret} + */ +public final class Secret extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.Secret) + SecretOrBuilder { + private static final long serialVersionUID = 0L; + // Use Secret.newBuilder() to construct. + private Secret(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private Secret() { + name_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new Secret(); + } + + @java.lang.Override + public final com.google.protobuf.UnknownFieldSet getUnknownFields() { + return this.unknownFields; + } + + private Secret( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + this(); + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + int mutable_bitField0_ = 0; + com.google.protobuf.UnknownFieldSet.Builder unknownFields = + com.google.protobuf.UnknownFieldSet.newBuilder(); + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + java.lang.String s = input.readStringRequireUtf8(); + + name_ = s; + break; + } + case 18: + { + com.google.cloud.secrets.v1beta1.Replication.Builder subBuilder = null; + if (replication_ != null) { + subBuilder = replication_.toBuilder(); + } + replication_ = + input.readMessage( + com.google.cloud.secrets.v1beta1.Replication.parser(), extensionRegistry); + if (subBuilder != null) { + subBuilder.mergeFrom(replication_); + replication_ = subBuilder.buildPartial(); + } + + break; + } + case 26: + { + com.google.protobuf.Timestamp.Builder subBuilder = null; + if (createTime_ != null) { + subBuilder = createTime_.toBuilder(); + } + createTime_ = + input.readMessage(com.google.protobuf.Timestamp.parser(), extensionRegistry); + if (subBuilder != null) { + subBuilder.mergeFrom(createTime_); + createTime_ = subBuilder.buildPartial(); + } + + break; + } + case 34: + { + if (!((mutable_bitField0_ & 0x00000001) != 0)) { + labels_ = + com.google.protobuf.MapField.newMapField(LabelsDefaultEntryHolder.defaultEntry); + mutable_bitField0_ |= 0x00000001; + } + com.google.protobuf.MapEntry labels__ = + input.readMessage( + LabelsDefaultEntryHolder.defaultEntry.getParserForType(), extensionRegistry); + labels_.getMutableMap().put(labels__.getKey(), labels__.getValue()); + break; + } + default: + { + if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { + done = true; + } + break; + } + } + } + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(this); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); + } finally { + this.unknownFields = unknownFields.build(); + makeExtensionsImmutable(); + } + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Secret_descriptor; + } + + @SuppressWarnings({"rawtypes"}) + @java.lang.Override + protected com.google.protobuf.MapField internalGetMapField(int number) { + switch (number) { + case 4: + return internalGetLabels(); + default: + throw new RuntimeException("Invalid map field number: " + number); + } + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Secret_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.Secret.class, + com.google.cloud.secrets.v1beta1.Secret.Builder.class); + } + + public static final int NAME_FIELD_NUMBER = 1; + private volatile java.lang.Object name_; + /** + * + * + *
+   * Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the format `projects/*/secrets/*`.
+   * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } + } + /** + * + * + *
+   * Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the format `projects/*/secrets/*`.
+   * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + public static final int REPLICATION_FIELD_NUMBER = 2; + private com.google.cloud.secrets.v1beta1.Replication replication_; + /** + * + * + *
+   * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+   * The replication policy cannot be changed after the Secret has been created.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the replication field is set. + */ + public boolean hasReplication() { + return replication_ != null; + } + /** + * + * + *
+   * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+   * The replication policy cannot be changed after the Secret has been created.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + * + * @return The replication. + */ + public com.google.cloud.secrets.v1beta1.Replication getReplication() { + return replication_ == null + ? com.google.cloud.secrets.v1beta1.Replication.getDefaultInstance() + : replication_; + } + /** + * + * + *
+   * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+   * The replication policy cannot be changed after the Secret has been created.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secrets.v1beta1.ReplicationOrBuilder getReplicationOrBuilder() { + return getReplication(); + } + + public static final int CREATE_TIME_FIELD_NUMBER = 3; + private com.google.protobuf.Timestamp createTime_; + /** + * + * + *
+   * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return Whether the createTime field is set. + */ + public boolean hasCreateTime() { + return createTime_ != null; + } + /** + * + * + *
+   * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The createTime. + */ + public com.google.protobuf.Timestamp getCreateTime() { + return createTime_ == null ? com.google.protobuf.Timestamp.getDefaultInstance() : createTime_; + } + /** + * + * + *
+   * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public com.google.protobuf.TimestampOrBuilder getCreateTimeOrBuilder() { + return getCreateTime(); + } + + public static final int LABELS_FIELD_NUMBER = 4; + + private static final class LabelsDefaultEntryHolder { + static final com.google.protobuf.MapEntry defaultEntry = + com.google.protobuf.MapEntry.newDefaultInstance( + com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Secret_LabelsEntry_descriptor, + com.google.protobuf.WireFormat.FieldType.STRING, + "", + com.google.protobuf.WireFormat.FieldType.STRING, + ""); + } + + private com.google.protobuf.MapField labels_; + + private com.google.protobuf.MapField internalGetLabels() { + if (labels_ == null) { + return com.google.protobuf.MapField.emptyMapField(LabelsDefaultEntryHolder.defaultEntry); + } + return labels_; + } + + public int getLabelsCount() { + return internalGetLabels().getMap().size(); + } + /** + * + * + *
+   * The labels assigned to this Secret.
+   * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+   * of maximum 128 bytes, and must conform to the following PCRE regular
+   * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+   * Label values must be between 0 and 63 characters long, have a UTF-8
+   * encoding of maximum 128 bytes, and must conform to the following PCRE
+   * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+   * No more than 64 labels can be assigned to a given resource.
+   * 
+ * + * map<string, string> labels = 4; + */ + public boolean containsLabels(java.lang.String key) { + if (key == null) { + throw new java.lang.NullPointerException(); + } + return internalGetLabels().getMap().containsKey(key); + } + /** Use {@link #getLabelsMap()} instead. */ + @java.lang.Deprecated + public java.util.Map getLabels() { + return getLabelsMap(); + } + /** + * + * + *
+   * The labels assigned to this Secret.
+   * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+   * of maximum 128 bytes, and must conform to the following PCRE regular
+   * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+   * Label values must be between 0 and 63 characters long, have a UTF-8
+   * encoding of maximum 128 bytes, and must conform to the following PCRE
+   * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+   * No more than 64 labels can be assigned to a given resource.
+   * 
+ * + * map<string, string> labels = 4; + */ + public java.util.Map getLabelsMap() { + return internalGetLabels().getMap(); + } + /** + * + * + *
+   * The labels assigned to this Secret.
+   * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+   * of maximum 128 bytes, and must conform to the following PCRE regular
+   * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+   * Label values must be between 0 and 63 characters long, have a UTF-8
+   * encoding of maximum 128 bytes, and must conform to the following PCRE
+   * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+   * No more than 64 labels can be assigned to a given resource.
+   * 
+ * + * map<string, string> labels = 4; + */ + public java.lang.String getLabelsOrDefault(java.lang.String key, java.lang.String defaultValue) { + if (key == null) { + throw new java.lang.NullPointerException(); + } + java.util.Map map = internalGetLabels().getMap(); + return map.containsKey(key) ? map.get(key) : defaultValue; + } + /** + * + * + *
+   * The labels assigned to this Secret.
+   * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+   * of maximum 128 bytes, and must conform to the following PCRE regular
+   * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+   * Label values must be between 0 and 63 characters long, have a UTF-8
+   * encoding of maximum 128 bytes, and must conform to the following PCRE
+   * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+   * No more than 64 labels can be assigned to a given resource.
+   * 
+ * + * map<string, string> labels = 4; + */ + public java.lang.String getLabelsOrThrow(java.lang.String key) { + if (key == null) { + throw new java.lang.NullPointerException(); + } + java.util.Map map = internalGetLabels().getMap(); + if (!map.containsKey(key)) { + throw new java.lang.IllegalArgumentException(); + } + return map.get(key); + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!getNameBytes().isEmpty()) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); + } + if (replication_ != null) { + output.writeMessage(2, getReplication()); + } + if (createTime_ != null) { + output.writeMessage(3, getCreateTime()); + } + com.google.protobuf.GeneratedMessageV3.serializeStringMapTo( + output, internalGetLabels(), LabelsDefaultEntryHolder.defaultEntry, 4); + unknownFields.writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!getNameBytes().isEmpty()) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); + } + if (replication_ != null) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(2, getReplication()); + } + if (createTime_ != null) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(3, getCreateTime()); + } + for (java.util.Map.Entry entry : + internalGetLabels().getMap().entrySet()) { + com.google.protobuf.MapEntry labels__ = + LabelsDefaultEntryHolder.defaultEntry + .newBuilderForType() + .setKey(entry.getKey()) + .setValue(entry.getValue()) + .build(); + size += com.google.protobuf.CodedOutputStream.computeMessageSize(4, labels__); + } + size += unknownFields.getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secrets.v1beta1.Secret)) { + return super.equals(obj); + } + com.google.cloud.secrets.v1beta1.Secret other = (com.google.cloud.secrets.v1beta1.Secret) obj; + + if (!getName().equals(other.getName())) return false; + if (hasReplication() != other.hasReplication()) return false; + if (hasReplication()) { + if (!getReplication().equals(other.getReplication())) return false; + } + if (hasCreateTime() != other.hasCreateTime()) return false; + if (hasCreateTime()) { + if (!getCreateTime().equals(other.getCreateTime())) return false; + } + if (!internalGetLabels().equals(other.internalGetLabels())) return false; + if (!unknownFields.equals(other.unknownFields)) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + NAME_FIELD_NUMBER; + hash = (53 * hash) + getName().hashCode(); + if (hasReplication()) { + hash = (37 * hash) + REPLICATION_FIELD_NUMBER; + hash = (53 * hash) + getReplication().hashCode(); + } + if (hasCreateTime()) { + hash = (37 * hash) + CREATE_TIME_FIELD_NUMBER; + hash = (53 * hash) + getCreateTime().hashCode(); + } + if (!internalGetLabels().getMap().isEmpty()) { + hash = (37 * hash) + LABELS_FIELD_NUMBER; + hash = (53 * hash) + internalGetLabels().hashCode(); + } + hash = (29 * hash) + unknownFields.hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secrets.v1beta1.Secret parseFrom(java.nio.ByteBuffer data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.Secret parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Secret parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.Secret parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Secret parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.Secret parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Secret parseFrom(java.io.InputStream input) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.Secret parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Secret parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.Secret parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.Secret parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.Secret parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder(com.google.cloud.secrets.v1beta1.Secret prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * A [Secret][google.cloud.secrets.v1beta1.Secret] is a logical secret whose value and versions can
+   * be accessed.
+   * A [Secret][google.cloud.secrets.v1beta1.Secret] is made up of zero or more [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] that
+   * represent the secret data.
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.Secret} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.Secret) + com.google.cloud.secrets.v1beta1.SecretOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Secret_descriptor; + } + + @SuppressWarnings({"rawtypes"}) + protected com.google.protobuf.MapField internalGetMapField(int number) { + switch (number) { + case 4: + return internalGetLabels(); + default: + throw new RuntimeException("Invalid map field number: " + number); + } + } + + @SuppressWarnings({"rawtypes"}) + protected com.google.protobuf.MapField internalGetMutableMapField(int number) { + switch (number) { + case 4: + return internalGetMutableLabels(); + default: + throw new RuntimeException("Invalid map field number: " + number); + } + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Secret_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.Secret.class, + com.google.cloud.secrets.v1beta1.Secret.Builder.class); + } + + // Construct using com.google.cloud.secrets.v1beta1.Secret.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) {} + } + + @java.lang.Override + public Builder clear() { + super.clear(); + name_ = ""; + + if (replicationBuilder_ == null) { + replication_ = null; + } else { + replication_ = null; + replicationBuilder_ = null; + } + if (createTimeBuilder_ == null) { + createTime_ = null; + } else { + createTime_ = null; + createTimeBuilder_ = null; + } + internalGetMutableLabels().clear(); + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Secret_descriptor; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.Secret getDefaultInstanceForType() { + return com.google.cloud.secrets.v1beta1.Secret.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.Secret build() { + com.google.cloud.secrets.v1beta1.Secret result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.Secret buildPartial() { + com.google.cloud.secrets.v1beta1.Secret result = + new com.google.cloud.secrets.v1beta1.Secret(this); + int from_bitField0_ = bitField0_; + result.name_ = name_; + if (replicationBuilder_ == null) { + result.replication_ = replication_; + } else { + result.replication_ = replicationBuilder_.build(); + } + if (createTimeBuilder_ == null) { + result.createTime_ = createTime_; + } else { + result.createTime_ = createTimeBuilder_.build(); + } + result.labels_ = internalGetLabels(); + result.labels_.makeImmutable(); + onBuilt(); + return result; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secrets.v1beta1.Secret) { + return mergeFrom((com.google.cloud.secrets.v1beta1.Secret) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secrets.v1beta1.Secret other) { + if (other == com.google.cloud.secrets.v1beta1.Secret.getDefaultInstance()) return this; + if (!other.getName().isEmpty()) { + name_ = other.name_; + onChanged(); + } + if (other.hasReplication()) { + mergeReplication(other.getReplication()); + } + if (other.hasCreateTime()) { + mergeCreateTime(other.getCreateTime()); + } + internalGetMutableLabels().mergeFrom(other.internalGetLabels()); + this.mergeUnknownFields(other.unknownFields); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + com.google.cloud.secrets.v1beta1.Secret parsedMessage = null; + try { + parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + parsedMessage = (com.google.cloud.secrets.v1beta1.Secret) e.getUnfinishedMessage(); + throw e.unwrapIOException(); + } finally { + if (parsedMessage != null) { + mergeFrom(parsedMessage); + } + } + return this; + } + + private int bitField0_; + + private java.lang.Object name_ = ""; + /** + * + * + *
+     * Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the format `projects/*/secrets/*`.
+     * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the format `projects/*/secrets/*`.
+     * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the format `projects/*/secrets/*`.
+     * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @param value The name to set. + * @return This builder for chaining. + */ + public Builder setName(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + + name_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the format `projects/*/secrets/*`.
+     * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return This builder for chaining. + */ + public Builder clearName() { + + name_ = getDefaultInstance().getName(); + onChanged(); + return this; + } + /** + * + * + *
+     * Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the format `projects/*/secrets/*`.
+     * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @param value The bytes for name to set. + * @return This builder for chaining. + */ + public Builder setNameBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + + name_ = value; + onChanged(); + return this; + } + + private com.google.cloud.secrets.v1beta1.Replication replication_; + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secrets.v1beta1.Replication, + com.google.cloud.secrets.v1beta1.Replication.Builder, + com.google.cloud.secrets.v1beta1.ReplicationOrBuilder> + replicationBuilder_; + /** + * + * + *
+     * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+     * The replication policy cannot be changed after the Secret has been created.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the replication field is set. + */ + public boolean hasReplication() { + return replicationBuilder_ != null || replication_ != null; + } + /** + * + * + *
+     * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+     * The replication policy cannot be changed after the Secret has been created.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + * + * @return The replication. + */ + public com.google.cloud.secrets.v1beta1.Replication getReplication() { + if (replicationBuilder_ == null) { + return replication_ == null + ? com.google.cloud.secrets.v1beta1.Replication.getDefaultInstance() + : replication_; + } else { + return replicationBuilder_.getMessage(); + } + } + /** + * + * + *
+     * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+     * The replication policy cannot be changed after the Secret has been created.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder setReplication(com.google.cloud.secrets.v1beta1.Replication value) { + if (replicationBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + replication_ = value; + onChanged(); + } else { + replicationBuilder_.setMessage(value); + } + + return this; + } + /** + * + * + *
+     * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+     * The replication policy cannot be changed after the Secret has been created.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder setReplication( + com.google.cloud.secrets.v1beta1.Replication.Builder builderForValue) { + if (replicationBuilder_ == null) { + replication_ = builderForValue.build(); + onChanged(); + } else { + replicationBuilder_.setMessage(builderForValue.build()); + } + + return this; + } + /** + * + * + *
+     * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+     * The replication policy cannot be changed after the Secret has been created.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder mergeReplication(com.google.cloud.secrets.v1beta1.Replication value) { + if (replicationBuilder_ == null) { + if (replication_ != null) { + replication_ = + com.google.cloud.secrets.v1beta1.Replication.newBuilder(replication_) + .mergeFrom(value) + .buildPartial(); + } else { + replication_ = value; + } + onChanged(); + } else { + replicationBuilder_.mergeFrom(value); + } + + return this; + } + /** + * + * + *
+     * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+     * The replication policy cannot be changed after the Secret has been created.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder clearReplication() { + if (replicationBuilder_ == null) { + replication_ = null; + onChanged(); + } else { + replication_ = null; + replicationBuilder_ = null; + } + + return this; + } + /** + * + * + *
+     * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+     * The replication policy cannot be changed after the Secret has been created.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secrets.v1beta1.Replication.Builder getReplicationBuilder() { + + onChanged(); + return getReplicationFieldBuilder().getBuilder(); + } + /** + * + * + *
+     * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+     * The replication policy cannot be changed after the Secret has been created.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secrets.v1beta1.ReplicationOrBuilder getReplicationOrBuilder() { + if (replicationBuilder_ != null) { + return replicationBuilder_.getMessageOrBuilder(); + } else { + return replication_ == null + ? com.google.cloud.secrets.v1beta1.Replication.getDefaultInstance() + : replication_; + } + } + /** + * + * + *
+     * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+     * The replication policy cannot be changed after the Secret has been created.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + */ + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secrets.v1beta1.Replication, + com.google.cloud.secrets.v1beta1.Replication.Builder, + com.google.cloud.secrets.v1beta1.ReplicationOrBuilder> + getReplicationFieldBuilder() { + if (replicationBuilder_ == null) { + replicationBuilder_ = + new com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secrets.v1beta1.Replication, + com.google.cloud.secrets.v1beta1.Replication.Builder, + com.google.cloud.secrets.v1beta1.ReplicationOrBuilder>( + getReplication(), getParentForChildren(), isClean()); + replication_ = null; + } + return replicationBuilder_; + } + + private com.google.protobuf.Timestamp createTime_; + private com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.Timestamp, + com.google.protobuf.Timestamp.Builder, + com.google.protobuf.TimestampOrBuilder> + createTimeBuilder_; + /** + * + * + *
+     * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return Whether the createTime field is set. + */ + public boolean hasCreateTime() { + return createTimeBuilder_ != null || createTime_ != null; + } + /** + * + * + *
+     * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The createTime. + */ + public com.google.protobuf.Timestamp getCreateTime() { + if (createTimeBuilder_ == null) { + return createTime_ == null + ? com.google.protobuf.Timestamp.getDefaultInstance() + : createTime_; + } else { + return createTimeBuilder_.getMessage(); + } + } + /** + * + * + *
+     * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder setCreateTime(com.google.protobuf.Timestamp value) { + if (createTimeBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + createTime_ = value; + onChanged(); + } else { + createTimeBuilder_.setMessage(value); + } + + return this; + } + /** + * + * + *
+     * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder setCreateTime(com.google.protobuf.Timestamp.Builder builderForValue) { + if (createTimeBuilder_ == null) { + createTime_ = builderForValue.build(); + onChanged(); + } else { + createTimeBuilder_.setMessage(builderForValue.build()); + } + + return this; + } + /** + * + * + *
+     * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder mergeCreateTime(com.google.protobuf.Timestamp value) { + if (createTimeBuilder_ == null) { + if (createTime_ != null) { + createTime_ = + com.google.protobuf.Timestamp.newBuilder(createTime_).mergeFrom(value).buildPartial(); + } else { + createTime_ = value; + } + onChanged(); + } else { + createTimeBuilder_.mergeFrom(value); + } + + return this; + } + /** + * + * + *
+     * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder clearCreateTime() { + if (createTimeBuilder_ == null) { + createTime_ = null; + onChanged(); + } else { + createTime_ = null; + createTimeBuilder_ = null; + } + + return this; + } + /** + * + * + *
+     * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public com.google.protobuf.Timestamp.Builder getCreateTimeBuilder() { + + onChanged(); + return getCreateTimeFieldBuilder().getBuilder(); + } + /** + * + * + *
+     * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public com.google.protobuf.TimestampOrBuilder getCreateTimeOrBuilder() { + if (createTimeBuilder_ != null) { + return createTimeBuilder_.getMessageOrBuilder(); + } else { + return createTime_ == null + ? com.google.protobuf.Timestamp.getDefaultInstance() + : createTime_; + } + } + /** + * + * + *
+     * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + private com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.Timestamp, + com.google.protobuf.Timestamp.Builder, + com.google.protobuf.TimestampOrBuilder> + getCreateTimeFieldBuilder() { + if (createTimeBuilder_ == null) { + createTimeBuilder_ = + new com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.Timestamp, + com.google.protobuf.Timestamp.Builder, + com.google.protobuf.TimestampOrBuilder>( + getCreateTime(), getParentForChildren(), isClean()); + createTime_ = null; + } + return createTimeBuilder_; + } + + private com.google.protobuf.MapField labels_; + + private com.google.protobuf.MapField internalGetLabels() { + if (labels_ == null) { + return com.google.protobuf.MapField.emptyMapField(LabelsDefaultEntryHolder.defaultEntry); + } + return labels_; + } + + private com.google.protobuf.MapField + internalGetMutableLabels() { + onChanged(); + ; + if (labels_ == null) { + labels_ = com.google.protobuf.MapField.newMapField(LabelsDefaultEntryHolder.defaultEntry); + } + if (!labels_.isMutable()) { + labels_ = labels_.copy(); + } + return labels_; + } + + public int getLabelsCount() { + return internalGetLabels().getMap().size(); + } + /** + * + * + *
+     * The labels assigned to this Secret.
+     * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+     * of maximum 128 bytes, and must conform to the following PCRE regular
+     * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+     * Label values must be between 0 and 63 characters long, have a UTF-8
+     * encoding of maximum 128 bytes, and must conform to the following PCRE
+     * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+     * No more than 64 labels can be assigned to a given resource.
+     * 
+ * + * map<string, string> labels = 4; + */ + public boolean containsLabels(java.lang.String key) { + if (key == null) { + throw new java.lang.NullPointerException(); + } + return internalGetLabels().getMap().containsKey(key); + } + /** Use {@link #getLabelsMap()} instead. */ + @java.lang.Deprecated + public java.util.Map getLabels() { + return getLabelsMap(); + } + /** + * + * + *
+     * The labels assigned to this Secret.
+     * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+     * of maximum 128 bytes, and must conform to the following PCRE regular
+     * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+     * Label values must be between 0 and 63 characters long, have a UTF-8
+     * encoding of maximum 128 bytes, and must conform to the following PCRE
+     * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+     * No more than 64 labels can be assigned to a given resource.
+     * 
+ * + * map<string, string> labels = 4; + */ + public java.util.Map getLabelsMap() { + return internalGetLabels().getMap(); + } + /** + * + * + *
+     * The labels assigned to this Secret.
+     * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+     * of maximum 128 bytes, and must conform to the following PCRE regular
+     * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+     * Label values must be between 0 and 63 characters long, have a UTF-8
+     * encoding of maximum 128 bytes, and must conform to the following PCRE
+     * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+     * No more than 64 labels can be assigned to a given resource.
+     * 
+ * + * map<string, string> labels = 4; + */ + public java.lang.String getLabelsOrDefault( + java.lang.String key, java.lang.String defaultValue) { + if (key == null) { + throw new java.lang.NullPointerException(); + } + java.util.Map map = internalGetLabels().getMap(); + return map.containsKey(key) ? map.get(key) : defaultValue; + } + /** + * + * + *
+     * The labels assigned to this Secret.
+     * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+     * of maximum 128 bytes, and must conform to the following PCRE regular
+     * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+     * Label values must be between 0 and 63 characters long, have a UTF-8
+     * encoding of maximum 128 bytes, and must conform to the following PCRE
+     * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+     * No more than 64 labels can be assigned to a given resource.
+     * 
+ * + * map<string, string> labels = 4; + */ + public java.lang.String getLabelsOrThrow(java.lang.String key) { + if (key == null) { + throw new java.lang.NullPointerException(); + } + java.util.Map map = internalGetLabels().getMap(); + if (!map.containsKey(key)) { + throw new java.lang.IllegalArgumentException(); + } + return map.get(key); + } + + public Builder clearLabels() { + internalGetMutableLabels().getMutableMap().clear(); + return this; + } + /** + * + * + *
+     * The labels assigned to this Secret.
+     * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+     * of maximum 128 bytes, and must conform to the following PCRE regular
+     * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+     * Label values must be between 0 and 63 characters long, have a UTF-8
+     * encoding of maximum 128 bytes, and must conform to the following PCRE
+     * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+     * No more than 64 labels can be assigned to a given resource.
+     * 
+ * + * map<string, string> labels = 4; + */ + public Builder removeLabels(java.lang.String key) { + if (key == null) { + throw new java.lang.NullPointerException(); + } + internalGetMutableLabels().getMutableMap().remove(key); + return this; + } + /** Use alternate mutation accessors instead. */ + @java.lang.Deprecated + public java.util.Map getMutableLabels() { + return internalGetMutableLabels().getMutableMap(); + } + /** + * + * + *
+     * The labels assigned to this Secret.
+     * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+     * of maximum 128 bytes, and must conform to the following PCRE regular
+     * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+     * Label values must be between 0 and 63 characters long, have a UTF-8
+     * encoding of maximum 128 bytes, and must conform to the following PCRE
+     * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+     * No more than 64 labels can be assigned to a given resource.
+     * 
+ * + * map<string, string> labels = 4; + */ + public Builder putLabels(java.lang.String key, java.lang.String value) { + if (key == null) { + throw new java.lang.NullPointerException(); + } + if (value == null) { + throw new java.lang.NullPointerException(); + } + internalGetMutableLabels().getMutableMap().put(key, value); + return this; + } + /** + * + * + *
+     * The labels assigned to this Secret.
+     * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+     * of maximum 128 bytes, and must conform to the following PCRE regular
+     * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+     * Label values must be between 0 and 63 characters long, have a UTF-8
+     * encoding of maximum 128 bytes, and must conform to the following PCRE
+     * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+     * No more than 64 labels can be assigned to a given resource.
+     * 
+ * + * map<string, string> labels = 4; + */ + public Builder putAllLabels(java.util.Map values) { + internalGetMutableLabels().getMutableMap().putAll(values); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.Secret) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.Secret) + private static final com.google.cloud.secrets.v1beta1.Secret DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secrets.v1beta1.Secret(); + } + + public static com.google.cloud.secrets.v1beta1.Secret getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public Secret parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return new Secret(input, extensionRegistry); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.Secret getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretName.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretName.java new file mode 100644 index 00000000..eb1a2b87 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretName.java @@ -0,0 +1,182 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secrets.v1beta1; + +import com.google.api.pathtemplate.PathTemplate; +import com.google.api.resourcenames.ResourceName; +import com.google.common.base.Preconditions; +import com.google.common.collect.ImmutableMap; +import java.util.ArrayList; +import java.util.List; +import java.util.Map; + +// AUTO-GENERATED DOCUMENTATION AND CLASS +@javax.annotation.Generated("by GAPIC protoc plugin") +public class SecretName implements ResourceName { + + private static final PathTemplate PATH_TEMPLATE = + PathTemplate.createWithoutUrlEncoding("projects/{project}/secrets/{secret}"); + + private volatile Map fieldValuesMap; + + private final String project; + private final String secret; + + public String getProject() { + return project; + } + + public String getSecret() { + return secret; + } + + public static Builder newBuilder() { + return new Builder(); + } + + public Builder toBuilder() { + return new Builder(this); + } + + private SecretName(Builder builder) { + project = Preconditions.checkNotNull(builder.getProject()); + secret = Preconditions.checkNotNull(builder.getSecret()); + } + + public static SecretName of(String project, String secret) { + return newBuilder().setProject(project).setSecret(secret).build(); + } + + public static String format(String project, String secret) { + return newBuilder().setProject(project).setSecret(secret).build().toString(); + } + + public static SecretName parse(String formattedString) { + if (formattedString.isEmpty()) { + return null; + } + Map matchMap = + PATH_TEMPLATE.validatedMatch( + formattedString, "SecretName.parse: formattedString not in valid format"); + return of(matchMap.get("project"), matchMap.get("secret")); + } + + public static List parseList(List formattedStrings) { + List list = new ArrayList<>(formattedStrings.size()); + for (String formattedString : formattedStrings) { + list.add(parse(formattedString)); + } + return list; + } + + public static List toStringList(List values) { + List list = new ArrayList(values.size()); + for (SecretName value : values) { + if (value == null) { + list.add(""); + } else { + list.add(value.toString()); + } + } + return list; + } + + public static boolean isParsableFrom(String formattedString) { + return PATH_TEMPLATE.matches(formattedString); + } + + public Map getFieldValuesMap() { + if (fieldValuesMap == null) { + synchronized (this) { + if (fieldValuesMap == null) { + ImmutableMap.Builder fieldMapBuilder = ImmutableMap.builder(); + fieldMapBuilder.put("project", project); + fieldMapBuilder.put("secret", secret); + fieldValuesMap = fieldMapBuilder.build(); + } + } + } + return fieldValuesMap; + } + + public String getFieldValue(String fieldName) { + return getFieldValuesMap().get(fieldName); + } + + @Override + public String toString() { + return PATH_TEMPLATE.instantiate("project", project, "secret", secret); + } + + /** Builder for SecretName. */ + public static class Builder { + + private String project; + private String secret; + + public String getProject() { + return project; + } + + public String getSecret() { + return secret; + } + + public Builder setProject(String project) { + this.project = project; + return this; + } + + public Builder setSecret(String secret) { + this.secret = secret; + return this; + } + + private Builder() {} + + private Builder(SecretName secretName) { + project = secretName.project; + secret = secretName.secret; + } + + public SecretName build() { + return new SecretName(this); + } + } + + @Override + public boolean equals(Object o) { + if (o == this) { + return true; + } + if (o instanceof SecretName) { + SecretName that = (SecretName) o; + return (this.project.equals(that.project)) && (this.secret.equals(that.secret)); + } + return false; + } + + @Override + public int hashCode() { + int h = 1; + h *= 1000003; + h ^= project.hashCode(); + h *= 1000003; + h ^= secret.hashCode(); + return h; + } +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretOrBuilder.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretOrBuilder.java new file mode 100644 index 00000000..515a3634 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretOrBuilder.java @@ -0,0 +1,221 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/resources.proto + +package com.google.cloud.secrets.v1beta1; + +public interface SecretOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.Secret) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the format `projects/*/secrets/*`.
+   * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The name. + */ + java.lang.String getName(); + /** + * + * + *
+   * Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the format `projects/*/secrets/*`.
+   * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The bytes for name. + */ + com.google.protobuf.ByteString getNameBytes(); + + /** + * + * + *
+   * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+   * The replication policy cannot be changed after the Secret has been created.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the replication field is set. + */ + boolean hasReplication(); + /** + * + * + *
+   * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+   * The replication policy cannot be changed after the Secret has been created.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + * + * @return The replication. + */ + com.google.cloud.secrets.v1beta1.Replication getReplication(); + /** + * + * + *
+   * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+   * The replication policy cannot be changed after the Secret has been created.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + */ + com.google.cloud.secrets.v1beta1.ReplicationOrBuilder getReplicationOrBuilder(); + + /** + * + * + *
+   * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return Whether the createTime field is set. + */ + boolean hasCreateTime(); + /** + * + * + *
+   * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The createTime. + */ + com.google.protobuf.Timestamp getCreateTime(); + /** + * + * + *
+   * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + com.google.protobuf.TimestampOrBuilder getCreateTimeOrBuilder(); + + /** + * + * + *
+   * The labels assigned to this Secret.
+   * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+   * of maximum 128 bytes, and must conform to the following PCRE regular
+   * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+   * Label values must be between 0 and 63 characters long, have a UTF-8
+   * encoding of maximum 128 bytes, and must conform to the following PCRE
+   * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+   * No more than 64 labels can be assigned to a given resource.
+   * 
+ * + * map<string, string> labels = 4; + */ + int getLabelsCount(); + /** + * + * + *
+   * The labels assigned to this Secret.
+   * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+   * of maximum 128 bytes, and must conform to the following PCRE regular
+   * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+   * Label values must be between 0 and 63 characters long, have a UTF-8
+   * encoding of maximum 128 bytes, and must conform to the following PCRE
+   * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+   * No more than 64 labels can be assigned to a given resource.
+   * 
+ * + * map<string, string> labels = 4; + */ + boolean containsLabels(java.lang.String key); + /** Use {@link #getLabelsMap()} instead. */ + @java.lang.Deprecated + java.util.Map getLabels(); + /** + * + * + *
+   * The labels assigned to this Secret.
+   * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+   * of maximum 128 bytes, and must conform to the following PCRE regular
+   * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+   * Label values must be between 0 and 63 characters long, have a UTF-8
+   * encoding of maximum 128 bytes, and must conform to the following PCRE
+   * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+   * No more than 64 labels can be assigned to a given resource.
+   * 
+ * + * map<string, string> labels = 4; + */ + java.util.Map getLabelsMap(); + /** + * + * + *
+   * The labels assigned to this Secret.
+   * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+   * of maximum 128 bytes, and must conform to the following PCRE regular
+   * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+   * Label values must be between 0 and 63 characters long, have a UTF-8
+   * encoding of maximum 128 bytes, and must conform to the following PCRE
+   * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+   * No more than 64 labels can be assigned to a given resource.
+   * 
+ * + * map<string, string> labels = 4; + */ + java.lang.String getLabelsOrDefault(java.lang.String key, java.lang.String defaultValue); + /** + * + * + *
+   * The labels assigned to this Secret.
+   * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+   * of maximum 128 bytes, and must conform to the following PCRE regular
+   * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+   * Label values must be between 0 and 63 characters long, have a UTF-8
+   * encoding of maximum 128 bytes, and must conform to the following PCRE
+   * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+   * No more than 64 labels can be assigned to a given resource.
+   * 
+ * + * map<string, string> labels = 4; + */ + java.lang.String getLabelsOrThrow(java.lang.String key); +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretPayload.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretPayload.java new file mode 100644 index 00000000..526157fb --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretPayload.java @@ -0,0 +1,549 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/resources.proto + +package com.google.cloud.secrets.v1beta1; + +/** + * + * + *
+ * A secret payload resource in the Secret Manager API. This contains the
+ * sensitive secret data that is associated with a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.SecretPayload} + */ +public final class SecretPayload extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.SecretPayload) + SecretPayloadOrBuilder { + private static final long serialVersionUID = 0L; + // Use SecretPayload.newBuilder() to construct. + private SecretPayload(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private SecretPayload() { + data_ = com.google.protobuf.ByteString.EMPTY; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new SecretPayload(); + } + + @java.lang.Override + public final com.google.protobuf.UnknownFieldSet getUnknownFields() { + return this.unknownFields; + } + + private SecretPayload( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + this(); + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + com.google.protobuf.UnknownFieldSet.Builder unknownFields = + com.google.protobuf.UnknownFieldSet.newBuilder(); + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + data_ = input.readBytes(); + break; + } + default: + { + if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { + done = true; + } + break; + } + } + } + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(this); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); + } finally { + this.unknownFields = unknownFields.build(); + makeExtensionsImmutable(); + } + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_SecretPayload_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_SecretPayload_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.SecretPayload.class, + com.google.cloud.secrets.v1beta1.SecretPayload.Builder.class); + } + + public static final int DATA_FIELD_NUMBER = 1; + private com.google.protobuf.ByteString data_; + /** + * + * + *
+   * The secret data. Must be no larger than 64KiB.
+   * 
+ * + * bytes data = 1; + * + * @return The data. + */ + public com.google.protobuf.ByteString getData() { + return data_; + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!data_.isEmpty()) { + output.writeBytes(1, data_); + } + unknownFields.writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!data_.isEmpty()) { + size += com.google.protobuf.CodedOutputStream.computeBytesSize(1, data_); + } + size += unknownFields.getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secrets.v1beta1.SecretPayload)) { + return super.equals(obj); + } + com.google.cloud.secrets.v1beta1.SecretPayload other = + (com.google.cloud.secrets.v1beta1.SecretPayload) obj; + + if (!getData().equals(other.getData())) return false; + if (!unknownFields.equals(other.unknownFields)) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + DATA_FIELD_NUMBER; + hash = (53 * hash) + getData().hashCode(); + hash = (29 * hash) + unknownFields.hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secrets.v1beta1.SecretPayload parseFrom(java.nio.ByteBuffer data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.SecretPayload parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.SecretPayload parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.SecretPayload parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.SecretPayload parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.SecretPayload parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.SecretPayload parseFrom(java.io.InputStream input) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.SecretPayload parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.SecretPayload parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.SecretPayload parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.SecretPayload parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.SecretPayload parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder(com.google.cloud.secrets.v1beta1.SecretPayload prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * A secret payload resource in the Secret Manager API. This contains the
+   * sensitive secret data that is associated with a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.SecretPayload} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.SecretPayload) + com.google.cloud.secrets.v1beta1.SecretPayloadOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_SecretPayload_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_SecretPayload_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.SecretPayload.class, + com.google.cloud.secrets.v1beta1.SecretPayload.Builder.class); + } + + // Construct using com.google.cloud.secrets.v1beta1.SecretPayload.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) {} + } + + @java.lang.Override + public Builder clear() { + super.clear(); + data_ = com.google.protobuf.ByteString.EMPTY; + + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_SecretPayload_descriptor; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.SecretPayload getDefaultInstanceForType() { + return com.google.cloud.secrets.v1beta1.SecretPayload.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.SecretPayload build() { + com.google.cloud.secrets.v1beta1.SecretPayload result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.SecretPayload buildPartial() { + com.google.cloud.secrets.v1beta1.SecretPayload result = + new com.google.cloud.secrets.v1beta1.SecretPayload(this); + result.data_ = data_; + onBuilt(); + return result; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secrets.v1beta1.SecretPayload) { + return mergeFrom((com.google.cloud.secrets.v1beta1.SecretPayload) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secrets.v1beta1.SecretPayload other) { + if (other == com.google.cloud.secrets.v1beta1.SecretPayload.getDefaultInstance()) return this; + if (other.getData() != com.google.protobuf.ByteString.EMPTY) { + setData(other.getData()); + } + this.mergeUnknownFields(other.unknownFields); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + com.google.cloud.secrets.v1beta1.SecretPayload parsedMessage = null; + try { + parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + parsedMessage = (com.google.cloud.secrets.v1beta1.SecretPayload) e.getUnfinishedMessage(); + throw e.unwrapIOException(); + } finally { + if (parsedMessage != null) { + mergeFrom(parsedMessage); + } + } + return this; + } + + private com.google.protobuf.ByteString data_ = com.google.protobuf.ByteString.EMPTY; + /** + * + * + *
+     * The secret data. Must be no larger than 64KiB.
+     * 
+ * + * bytes data = 1; + * + * @return The data. + */ + public com.google.protobuf.ByteString getData() { + return data_; + } + /** + * + * + *
+     * The secret data. Must be no larger than 64KiB.
+     * 
+ * + * bytes data = 1; + * + * @param value The data to set. + * @return This builder for chaining. + */ + public Builder setData(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + + data_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * The secret data. Must be no larger than 64KiB.
+     * 
+ * + * bytes data = 1; + * + * @return This builder for chaining. + */ + public Builder clearData() { + + data_ = getDefaultInstance().getData(); + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.SecretPayload) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.SecretPayload) + private static final com.google.cloud.secrets.v1beta1.SecretPayload DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secrets.v1beta1.SecretPayload(); + } + + public static com.google.cloud.secrets.v1beta1.SecretPayload getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public SecretPayload parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return new SecretPayload(input, extensionRegistry); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.SecretPayload getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretPayloadOrBuilder.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretPayloadOrBuilder.java new file mode 100644 index 00000000..9efdcc2c --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretPayloadOrBuilder.java @@ -0,0 +1,38 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/resources.proto + +package com.google.cloud.secrets.v1beta1; + +public interface SecretPayloadOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.SecretPayload) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * The secret data. Must be no larger than 64KiB.
+   * 
+ * + * bytes data = 1; + * + * @return The data. + */ + com.google.protobuf.ByteString getData(); +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretVersion.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretVersion.java new file mode 100644 index 00000000..4d10f840 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretVersion.java @@ -0,0 +1,1605 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/resources.proto + +package com.google.cloud.secrets.v1beta1; + +/** + * + * + *
+ * A secret version resource in the Secret Manager API.
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.SecretVersion} + */ +public final class SecretVersion extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.SecretVersion) + SecretVersionOrBuilder { + private static final long serialVersionUID = 0L; + // Use SecretVersion.newBuilder() to construct. + private SecretVersion(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private SecretVersion() { + name_ = ""; + state_ = 0; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new SecretVersion(); + } + + @java.lang.Override + public final com.google.protobuf.UnknownFieldSet getUnknownFields() { + return this.unknownFields; + } + + private SecretVersion( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + this(); + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + com.google.protobuf.UnknownFieldSet.Builder unknownFields = + com.google.protobuf.UnknownFieldSet.newBuilder(); + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + java.lang.String s = input.readStringRequireUtf8(); + + name_ = s; + break; + } + case 18: + { + com.google.protobuf.Timestamp.Builder subBuilder = null; + if (createTime_ != null) { + subBuilder = createTime_.toBuilder(); + } + createTime_ = + input.readMessage(com.google.protobuf.Timestamp.parser(), extensionRegistry); + if (subBuilder != null) { + subBuilder.mergeFrom(createTime_); + createTime_ = subBuilder.buildPartial(); + } + + break; + } + case 26: + { + com.google.protobuf.Timestamp.Builder subBuilder = null; + if (destroyTime_ != null) { + subBuilder = destroyTime_.toBuilder(); + } + destroyTime_ = + input.readMessage(com.google.protobuf.Timestamp.parser(), extensionRegistry); + if (subBuilder != null) { + subBuilder.mergeFrom(destroyTime_); + destroyTime_ = subBuilder.buildPartial(); + } + + break; + } + case 32: + { + int rawValue = input.readEnum(); + + state_ = rawValue; + break; + } + default: + { + if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { + done = true; + } + break; + } + } + } + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(this); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); + } finally { + this.unknownFields = unknownFields.build(); + makeExtensionsImmutable(); + } + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_SecretVersion_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_SecretVersion_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.SecretVersion.class, + com.google.cloud.secrets.v1beta1.SecretVersion.Builder.class); + } + + /** + * + * + *
+   * The state of a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion], indicating if it can be accessed.
+   * 
+ * + * Protobuf enum {@code google.cloud.secrets.v1beta1.SecretVersion.State} + */ + public enum State implements com.google.protobuf.ProtocolMessageEnum { + /** + * + * + *
+     * Not specified. This value is unused and invalid.
+     * 
+ * + * STATE_UNSPECIFIED = 0; + */ + STATE_UNSPECIFIED(0), + /** + * + * + *
+     * The [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] may be accessed.
+     * 
+ * + * ENABLED = 1; + */ + ENABLED(1), + /** + * + * + *
+     * The [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] may not be accessed, but the secret data
+     * is still available and can be placed back into the [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED]
+     * state.
+     * 
+ * + * DISABLED = 2; + */ + DISABLED(2), + /** + * + * + *
+     * The [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] is destroyed and the secret data is no longer
+     * stored. A version may not leave this state once entered.
+     * 
+ * + * DESTROYED = 3; + */ + DESTROYED(3), + UNRECOGNIZED(-1), + ; + + /** + * + * + *
+     * Not specified. This value is unused and invalid.
+     * 
+ * + * STATE_UNSPECIFIED = 0; + */ + public static final int STATE_UNSPECIFIED_VALUE = 0; + /** + * + * + *
+     * The [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] may be accessed.
+     * 
+ * + * ENABLED = 1; + */ + public static final int ENABLED_VALUE = 1; + /** + * + * + *
+     * The [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] may not be accessed, but the secret data
+     * is still available and can be placed back into the [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED]
+     * state.
+     * 
+ * + * DISABLED = 2; + */ + public static final int DISABLED_VALUE = 2; + /** + * + * + *
+     * The [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] is destroyed and the secret data is no longer
+     * stored. A version may not leave this state once entered.
+     * 
+ * + * DESTROYED = 3; + */ + public static final int DESTROYED_VALUE = 3; + + public final int getNumber() { + if (this == UNRECOGNIZED) { + throw new java.lang.IllegalArgumentException( + "Can't get the number of an unknown enum value."); + } + return value; + } + + /** + * @param value The numeric wire value of the corresponding enum entry. + * @return The enum associated with the given numeric wire value. + * @deprecated Use {@link #forNumber(int)} instead. + */ + @java.lang.Deprecated + public static State valueOf(int value) { + return forNumber(value); + } + + /** + * @param value The numeric wire value of the corresponding enum entry. + * @return The enum associated with the given numeric wire value. + */ + public static State forNumber(int value) { + switch (value) { + case 0: + return STATE_UNSPECIFIED; + case 1: + return ENABLED; + case 2: + return DISABLED; + case 3: + return DESTROYED; + default: + return null; + } + } + + public static com.google.protobuf.Internal.EnumLiteMap internalGetValueMap() { + return internalValueMap; + } + + private static final com.google.protobuf.Internal.EnumLiteMap internalValueMap = + new com.google.protobuf.Internal.EnumLiteMap() { + public State findValueByNumber(int number) { + return State.forNumber(number); + } + }; + + public final com.google.protobuf.Descriptors.EnumValueDescriptor getValueDescriptor() { + return getDescriptor().getValues().get(ordinal()); + } + + public final com.google.protobuf.Descriptors.EnumDescriptor getDescriptorForType() { + return getDescriptor(); + } + + public static final com.google.protobuf.Descriptors.EnumDescriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretVersion.getDescriptor().getEnumTypes().get(0); + } + + private static final State[] VALUES = values(); + + public static State valueOf(com.google.protobuf.Descriptors.EnumValueDescriptor desc) { + if (desc.getType() != getDescriptor()) { + throw new java.lang.IllegalArgumentException("EnumValueDescriptor is not for this type."); + } + if (desc.getIndex() == -1) { + return UNRECOGNIZED; + } + return VALUES[desc.getIndex()]; + } + + private final int value; + + private State(int value) { + this.value = value; + } + + // @@protoc_insertion_point(enum_scope:google.cloud.secrets.v1beta1.SecretVersion.State) + } + + public static final int NAME_FIELD_NUMBER = 1; + private volatile java.lang.Object name_; + /** + * + * + *
+   * Output only. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the
+   * format `projects/*/secrets/*/versions/*`.
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] IDs in a [Secret][google.cloud.secrets.v1beta1.Secret] start at 1 and
+   * are incremented for each subsequent version of the secret.
+   * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } + } + /** + * + * + *
+   * Output only. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the
+   * format `projects/*/secrets/*/versions/*`.
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] IDs in a [Secret][google.cloud.secrets.v1beta1.Secret] start at 1 and
+   * are incremented for each subsequent version of the secret.
+   * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + public static final int CREATE_TIME_FIELD_NUMBER = 2; + private com.google.protobuf.Timestamp createTime_; + /** + * + * + *
+   * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return Whether the createTime field is set. + */ + public boolean hasCreateTime() { + return createTime_ != null; + } + /** + * + * + *
+   * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The createTime. + */ + public com.google.protobuf.Timestamp getCreateTime() { + return createTime_ == null ? com.google.protobuf.Timestamp.getDefaultInstance() : createTime_; + } + /** + * + * + *
+   * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public com.google.protobuf.TimestampOrBuilder getCreateTimeOrBuilder() { + return getCreateTime(); + } + + public static final int DESTROY_TIME_FIELD_NUMBER = 3; + private com.google.protobuf.Timestamp destroyTime_; + /** + * + * + *
+   * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+   * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+   * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+   * 
+ * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return Whether the destroyTime field is set. + */ + public boolean hasDestroyTime() { + return destroyTime_ != null; + } + /** + * + * + *
+   * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+   * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+   * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+   * 
+ * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The destroyTime. + */ + public com.google.protobuf.Timestamp getDestroyTime() { + return destroyTime_ == null ? com.google.protobuf.Timestamp.getDefaultInstance() : destroyTime_; + } + /** + * + * + *
+   * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+   * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+   * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+   * 
+ * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public com.google.protobuf.TimestampOrBuilder getDestroyTimeOrBuilder() { + return getDestroyTime(); + } + + public static final int STATE_FIELD_NUMBER = 4; + private int state_; + /** + * + * + *
+   * Output only. The current state of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretVersion.State state = 4 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The enum numeric value on the wire for state. + */ + public int getStateValue() { + return state_; + } + /** + * + * + *
+   * Output only. The current state of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretVersion.State state = 4 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The state. + */ + public com.google.cloud.secrets.v1beta1.SecretVersion.State getState() { + @SuppressWarnings("deprecation") + com.google.cloud.secrets.v1beta1.SecretVersion.State result = + com.google.cloud.secrets.v1beta1.SecretVersion.State.valueOf(state_); + return result == null + ? com.google.cloud.secrets.v1beta1.SecretVersion.State.UNRECOGNIZED + : result; + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!getNameBytes().isEmpty()) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); + } + if (createTime_ != null) { + output.writeMessage(2, getCreateTime()); + } + if (destroyTime_ != null) { + output.writeMessage(3, getDestroyTime()); + } + if (state_ + != com.google.cloud.secrets.v1beta1.SecretVersion.State.STATE_UNSPECIFIED.getNumber()) { + output.writeEnum(4, state_); + } + unknownFields.writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!getNameBytes().isEmpty()) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); + } + if (createTime_ != null) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(2, getCreateTime()); + } + if (destroyTime_ != null) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(3, getDestroyTime()); + } + if (state_ + != com.google.cloud.secrets.v1beta1.SecretVersion.State.STATE_UNSPECIFIED.getNumber()) { + size += com.google.protobuf.CodedOutputStream.computeEnumSize(4, state_); + } + size += unknownFields.getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secrets.v1beta1.SecretVersion)) { + return super.equals(obj); + } + com.google.cloud.secrets.v1beta1.SecretVersion other = + (com.google.cloud.secrets.v1beta1.SecretVersion) obj; + + if (!getName().equals(other.getName())) return false; + if (hasCreateTime() != other.hasCreateTime()) return false; + if (hasCreateTime()) { + if (!getCreateTime().equals(other.getCreateTime())) return false; + } + if (hasDestroyTime() != other.hasDestroyTime()) return false; + if (hasDestroyTime()) { + if (!getDestroyTime().equals(other.getDestroyTime())) return false; + } + if (state_ != other.state_) return false; + if (!unknownFields.equals(other.unknownFields)) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + NAME_FIELD_NUMBER; + hash = (53 * hash) + getName().hashCode(); + if (hasCreateTime()) { + hash = (37 * hash) + CREATE_TIME_FIELD_NUMBER; + hash = (53 * hash) + getCreateTime().hashCode(); + } + if (hasDestroyTime()) { + hash = (37 * hash) + DESTROY_TIME_FIELD_NUMBER; + hash = (53 * hash) + getDestroyTime().hashCode(); + } + hash = (37 * hash) + STATE_FIELD_NUMBER; + hash = (53 * hash) + state_; + hash = (29 * hash) + unknownFields.hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secrets.v1beta1.SecretVersion parseFrom(java.nio.ByteBuffer data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.SecretVersion parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.SecretVersion parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.SecretVersion parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.SecretVersion parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.SecretVersion parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.SecretVersion parseFrom(java.io.InputStream input) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.SecretVersion parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.SecretVersion parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.SecretVersion parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.SecretVersion parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.SecretVersion parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder(com.google.cloud.secrets.v1beta1.SecretVersion prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * A secret version resource in the Secret Manager API.
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.SecretVersion} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.SecretVersion) + com.google.cloud.secrets.v1beta1.SecretVersionOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_SecretVersion_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_SecretVersion_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.SecretVersion.class, + com.google.cloud.secrets.v1beta1.SecretVersion.Builder.class); + } + + // Construct using com.google.cloud.secrets.v1beta1.SecretVersion.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) {} + } + + @java.lang.Override + public Builder clear() { + super.clear(); + name_ = ""; + + if (createTimeBuilder_ == null) { + createTime_ = null; + } else { + createTime_ = null; + createTimeBuilder_ = null; + } + if (destroyTimeBuilder_ == null) { + destroyTime_ = null; + } else { + destroyTime_ = null; + destroyTimeBuilder_ = null; + } + state_ = 0; + + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secrets.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_SecretVersion_descriptor; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.SecretVersion getDefaultInstanceForType() { + return com.google.cloud.secrets.v1beta1.SecretVersion.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.SecretVersion build() { + com.google.cloud.secrets.v1beta1.SecretVersion result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.SecretVersion buildPartial() { + com.google.cloud.secrets.v1beta1.SecretVersion result = + new com.google.cloud.secrets.v1beta1.SecretVersion(this); + result.name_ = name_; + if (createTimeBuilder_ == null) { + result.createTime_ = createTime_; + } else { + result.createTime_ = createTimeBuilder_.build(); + } + if (destroyTimeBuilder_ == null) { + result.destroyTime_ = destroyTime_; + } else { + result.destroyTime_ = destroyTimeBuilder_.build(); + } + result.state_ = state_; + onBuilt(); + return result; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secrets.v1beta1.SecretVersion) { + return mergeFrom((com.google.cloud.secrets.v1beta1.SecretVersion) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secrets.v1beta1.SecretVersion other) { + if (other == com.google.cloud.secrets.v1beta1.SecretVersion.getDefaultInstance()) return this; + if (!other.getName().isEmpty()) { + name_ = other.name_; + onChanged(); + } + if (other.hasCreateTime()) { + mergeCreateTime(other.getCreateTime()); + } + if (other.hasDestroyTime()) { + mergeDestroyTime(other.getDestroyTime()); + } + if (other.state_ != 0) { + setStateValue(other.getStateValue()); + } + this.mergeUnknownFields(other.unknownFields); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + com.google.cloud.secrets.v1beta1.SecretVersion parsedMessage = null; + try { + parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + parsedMessage = (com.google.cloud.secrets.v1beta1.SecretVersion) e.getUnfinishedMessage(); + throw e.unwrapIOException(); + } finally { + if (parsedMessage != null) { + mergeFrom(parsedMessage); + } + } + return this; + } + + private java.lang.Object name_ = ""; + /** + * + * + *
+     * Output only. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the
+     * format `projects/*/secrets/*/versions/*`.
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] IDs in a [Secret][google.cloud.secrets.v1beta1.Secret] start at 1 and
+     * are incremented for each subsequent version of the secret.
+     * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Output only. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the
+     * format `projects/*/secrets/*/versions/*`.
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] IDs in a [Secret][google.cloud.secrets.v1beta1.Secret] start at 1 and
+     * are incremented for each subsequent version of the secret.
+     * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Output only. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the
+     * format `projects/*/secrets/*/versions/*`.
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] IDs in a [Secret][google.cloud.secrets.v1beta1.Secret] start at 1 and
+     * are incremented for each subsequent version of the secret.
+     * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @param value The name to set. + * @return This builder for chaining. + */ + public Builder setName(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + + name_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * Output only. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the
+     * format `projects/*/secrets/*/versions/*`.
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] IDs in a [Secret][google.cloud.secrets.v1beta1.Secret] start at 1 and
+     * are incremented for each subsequent version of the secret.
+     * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return This builder for chaining. + */ + public Builder clearName() { + + name_ = getDefaultInstance().getName(); + onChanged(); + return this; + } + /** + * + * + *
+     * Output only. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the
+     * format `projects/*/secrets/*/versions/*`.
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] IDs in a [Secret][google.cloud.secrets.v1beta1.Secret] start at 1 and
+     * are incremented for each subsequent version of the secret.
+     * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @param value The bytes for name to set. + * @return This builder for chaining. + */ + public Builder setNameBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + + name_ = value; + onChanged(); + return this; + } + + private com.google.protobuf.Timestamp createTime_; + private com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.Timestamp, + com.google.protobuf.Timestamp.Builder, + com.google.protobuf.TimestampOrBuilder> + createTimeBuilder_; + /** + * + * + *
+     * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return Whether the createTime field is set. + */ + public boolean hasCreateTime() { + return createTimeBuilder_ != null || createTime_ != null; + } + /** + * + * + *
+     * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The createTime. + */ + public com.google.protobuf.Timestamp getCreateTime() { + if (createTimeBuilder_ == null) { + return createTime_ == null + ? com.google.protobuf.Timestamp.getDefaultInstance() + : createTime_; + } else { + return createTimeBuilder_.getMessage(); + } + } + /** + * + * + *
+     * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder setCreateTime(com.google.protobuf.Timestamp value) { + if (createTimeBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + createTime_ = value; + onChanged(); + } else { + createTimeBuilder_.setMessage(value); + } + + return this; + } + /** + * + * + *
+     * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder setCreateTime(com.google.protobuf.Timestamp.Builder builderForValue) { + if (createTimeBuilder_ == null) { + createTime_ = builderForValue.build(); + onChanged(); + } else { + createTimeBuilder_.setMessage(builderForValue.build()); + } + + return this; + } + /** + * + * + *
+     * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder mergeCreateTime(com.google.protobuf.Timestamp value) { + if (createTimeBuilder_ == null) { + if (createTime_ != null) { + createTime_ = + com.google.protobuf.Timestamp.newBuilder(createTime_).mergeFrom(value).buildPartial(); + } else { + createTime_ = value; + } + onChanged(); + } else { + createTimeBuilder_.mergeFrom(value); + } + + return this; + } + /** + * + * + *
+     * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder clearCreateTime() { + if (createTimeBuilder_ == null) { + createTime_ = null; + onChanged(); + } else { + createTime_ = null; + createTimeBuilder_ = null; + } + + return this; + } + /** + * + * + *
+     * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public com.google.protobuf.Timestamp.Builder getCreateTimeBuilder() { + + onChanged(); + return getCreateTimeFieldBuilder().getBuilder(); + } + /** + * + * + *
+     * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public com.google.protobuf.TimestampOrBuilder getCreateTimeOrBuilder() { + if (createTimeBuilder_ != null) { + return createTimeBuilder_.getMessageOrBuilder(); + } else { + return createTime_ == null + ? com.google.protobuf.Timestamp.getDefaultInstance() + : createTime_; + } + } + /** + * + * + *
+     * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + private com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.Timestamp, + com.google.protobuf.Timestamp.Builder, + com.google.protobuf.TimestampOrBuilder> + getCreateTimeFieldBuilder() { + if (createTimeBuilder_ == null) { + createTimeBuilder_ = + new com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.Timestamp, + com.google.protobuf.Timestamp.Builder, + com.google.protobuf.TimestampOrBuilder>( + getCreateTime(), getParentForChildren(), isClean()); + createTime_ = null; + } + return createTimeBuilder_; + } + + private com.google.protobuf.Timestamp destroyTime_; + private com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.Timestamp, + com.google.protobuf.Timestamp.Builder, + com.google.protobuf.TimestampOrBuilder> + destroyTimeBuilder_; + /** + * + * + *
+     * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+     * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+     * 
+ * + * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return Whether the destroyTime field is set. + */ + public boolean hasDestroyTime() { + return destroyTimeBuilder_ != null || destroyTime_ != null; + } + /** + * + * + *
+     * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+     * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+     * 
+ * + * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The destroyTime. + */ + public com.google.protobuf.Timestamp getDestroyTime() { + if (destroyTimeBuilder_ == null) { + return destroyTime_ == null + ? com.google.protobuf.Timestamp.getDefaultInstance() + : destroyTime_; + } else { + return destroyTimeBuilder_.getMessage(); + } + } + /** + * + * + *
+     * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+     * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+     * 
+ * + * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder setDestroyTime(com.google.protobuf.Timestamp value) { + if (destroyTimeBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + destroyTime_ = value; + onChanged(); + } else { + destroyTimeBuilder_.setMessage(value); + } + + return this; + } + /** + * + * + *
+     * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+     * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+     * 
+ * + * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder setDestroyTime(com.google.protobuf.Timestamp.Builder builderForValue) { + if (destroyTimeBuilder_ == null) { + destroyTime_ = builderForValue.build(); + onChanged(); + } else { + destroyTimeBuilder_.setMessage(builderForValue.build()); + } + + return this; + } + /** + * + * + *
+     * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+     * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+     * 
+ * + * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder mergeDestroyTime(com.google.protobuf.Timestamp value) { + if (destroyTimeBuilder_ == null) { + if (destroyTime_ != null) { + destroyTime_ = + com.google.protobuf.Timestamp.newBuilder(destroyTime_) + .mergeFrom(value) + .buildPartial(); + } else { + destroyTime_ = value; + } + onChanged(); + } else { + destroyTimeBuilder_.mergeFrom(value); + } + + return this; + } + /** + * + * + *
+     * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+     * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+     * 
+ * + * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder clearDestroyTime() { + if (destroyTimeBuilder_ == null) { + destroyTime_ = null; + onChanged(); + } else { + destroyTime_ = null; + destroyTimeBuilder_ = null; + } + + return this; + } + /** + * + * + *
+     * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+     * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+     * 
+ * + * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public com.google.protobuf.Timestamp.Builder getDestroyTimeBuilder() { + + onChanged(); + return getDestroyTimeFieldBuilder().getBuilder(); + } + /** + * + * + *
+     * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+     * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+     * 
+ * + * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public com.google.protobuf.TimestampOrBuilder getDestroyTimeOrBuilder() { + if (destroyTimeBuilder_ != null) { + return destroyTimeBuilder_.getMessageOrBuilder(); + } else { + return destroyTime_ == null + ? com.google.protobuf.Timestamp.getDefaultInstance() + : destroyTime_; + } + } + /** + * + * + *
+     * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+     * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+     * 
+ * + * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + private com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.Timestamp, + com.google.protobuf.Timestamp.Builder, + com.google.protobuf.TimestampOrBuilder> + getDestroyTimeFieldBuilder() { + if (destroyTimeBuilder_ == null) { + destroyTimeBuilder_ = + new com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.Timestamp, + com.google.protobuf.Timestamp.Builder, + com.google.protobuf.TimestampOrBuilder>( + getDestroyTime(), getParentForChildren(), isClean()); + destroyTime_ = null; + } + return destroyTimeBuilder_; + } + + private int state_ = 0; + /** + * + * + *
+     * Output only. The current state of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretVersion.State state = 4 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The enum numeric value on the wire for state. + */ + public int getStateValue() { + return state_; + } + /** + * + * + *
+     * Output only. The current state of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretVersion.State state = 4 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @param value The enum numeric value on the wire for state to set. + * @return This builder for chaining. + */ + public Builder setStateValue(int value) { + state_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * Output only. The current state of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretVersion.State state = 4 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The state. + */ + public com.google.cloud.secrets.v1beta1.SecretVersion.State getState() { + @SuppressWarnings("deprecation") + com.google.cloud.secrets.v1beta1.SecretVersion.State result = + com.google.cloud.secrets.v1beta1.SecretVersion.State.valueOf(state_); + return result == null + ? com.google.cloud.secrets.v1beta1.SecretVersion.State.UNRECOGNIZED + : result; + } + /** + * + * + *
+     * Output only. The current state of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretVersion.State state = 4 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @param value The state to set. + * @return This builder for chaining. + */ + public Builder setState(com.google.cloud.secrets.v1beta1.SecretVersion.State value) { + if (value == null) { + throw new NullPointerException(); + } + + state_ = value.getNumber(); + onChanged(); + return this; + } + /** + * + * + *
+     * Output only. The current state of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretVersion.State state = 4 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return This builder for chaining. + */ + public Builder clearState() { + + state_ = 0; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.SecretVersion) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.SecretVersion) + private static final com.google.cloud.secrets.v1beta1.SecretVersion DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secrets.v1beta1.SecretVersion(); + } + + public static com.google.cloud.secrets.v1beta1.SecretVersion getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public SecretVersion parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return new SecretVersion(input, extensionRegistry); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.SecretVersion getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretVersionName.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretVersionName.java new file mode 100644 index 00000000..bd07254a --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretVersionName.java @@ -0,0 +1,215 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secrets.v1beta1; + +import com.google.api.pathtemplate.PathTemplate; +import com.google.api.resourcenames.ResourceName; +import com.google.common.base.Preconditions; +import com.google.common.collect.ImmutableMap; +import java.util.ArrayList; +import java.util.List; +import java.util.Map; + +// AUTO-GENERATED DOCUMENTATION AND CLASS +@javax.annotation.Generated("by GAPIC protoc plugin") +public class SecretVersionName implements ResourceName { + + private static final PathTemplate PATH_TEMPLATE = + PathTemplate.createWithoutUrlEncoding( + "projects/{project}/secrets/{secret}/versions/{secret_version}"); + + private volatile Map fieldValuesMap; + + private final String project; + private final String secret; + private final String secretVersion; + + public String getProject() { + return project; + } + + public String getSecret() { + return secret; + } + + public String getSecretVersion() { + return secretVersion; + } + + public static Builder newBuilder() { + return new Builder(); + } + + public Builder toBuilder() { + return new Builder(this); + } + + private SecretVersionName(Builder builder) { + project = Preconditions.checkNotNull(builder.getProject()); + secret = Preconditions.checkNotNull(builder.getSecret()); + secretVersion = Preconditions.checkNotNull(builder.getSecretVersion()); + } + + public static SecretVersionName of(String project, String secret, String secretVersion) { + return newBuilder() + .setProject(project) + .setSecret(secret) + .setSecretVersion(secretVersion) + .build(); + } + + public static String format(String project, String secret, String secretVersion) { + return newBuilder() + .setProject(project) + .setSecret(secret) + .setSecretVersion(secretVersion) + .build() + .toString(); + } + + public static SecretVersionName parse(String formattedString) { + if (formattedString.isEmpty()) { + return null; + } + Map matchMap = + PATH_TEMPLATE.validatedMatch( + formattedString, "SecretVersionName.parse: formattedString not in valid format"); + return of(matchMap.get("project"), matchMap.get("secret"), matchMap.get("secret_version")); + } + + public static List parseList(List formattedStrings) { + List list = new ArrayList<>(formattedStrings.size()); + for (String formattedString : formattedStrings) { + list.add(parse(formattedString)); + } + return list; + } + + public static List toStringList(List values) { + List list = new ArrayList(values.size()); + for (SecretVersionName value : values) { + if (value == null) { + list.add(""); + } else { + list.add(value.toString()); + } + } + return list; + } + + public static boolean isParsableFrom(String formattedString) { + return PATH_TEMPLATE.matches(formattedString); + } + + public Map getFieldValuesMap() { + if (fieldValuesMap == null) { + synchronized (this) { + if (fieldValuesMap == null) { + ImmutableMap.Builder fieldMapBuilder = ImmutableMap.builder(); + fieldMapBuilder.put("project", project); + fieldMapBuilder.put("secret", secret); + fieldMapBuilder.put("secretVersion", secretVersion); + fieldValuesMap = fieldMapBuilder.build(); + } + } + } + return fieldValuesMap; + } + + public String getFieldValue(String fieldName) { + return getFieldValuesMap().get(fieldName); + } + + @Override + public String toString() { + return PATH_TEMPLATE.instantiate( + "project", project, "secret", secret, "secret_version", secretVersion); + } + + /** Builder for SecretVersionName. */ + public static class Builder { + + private String project; + private String secret; + private String secretVersion; + + public String getProject() { + return project; + } + + public String getSecret() { + return secret; + } + + public String getSecretVersion() { + return secretVersion; + } + + public Builder setProject(String project) { + this.project = project; + return this; + } + + public Builder setSecret(String secret) { + this.secret = secret; + return this; + } + + public Builder setSecretVersion(String secretVersion) { + this.secretVersion = secretVersion; + return this; + } + + private Builder() {} + + private Builder(SecretVersionName secretVersionName) { + project = secretVersionName.project; + secret = secretVersionName.secret; + secretVersion = secretVersionName.secretVersion; + } + + public SecretVersionName build() { + return new SecretVersionName(this); + } + } + + @Override + public boolean equals(Object o) { + if (o == this) { + return true; + } + if (o instanceof SecretVersionName) { + SecretVersionName that = (SecretVersionName) o; + return (this.project.equals(that.project)) + && (this.secret.equals(that.secret)) + && (this.secretVersion.equals(that.secretVersion)); + } + return false; + } + + @Override + public int hashCode() { + int h = 1; + h *= 1000003; + h ^= project.hashCode(); + h *= 1000003; + h ^= secret.hashCode(); + h *= 1000003; + h ^= secretVersion.hashCode(); + return h; + } +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretVersionOrBuilder.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretVersionOrBuilder.java new file mode 100644 index 00000000..540f1b6c --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretVersionOrBuilder.java @@ -0,0 +1,167 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/resources.proto + +package com.google.cloud.secrets.v1beta1; + +public interface SecretVersionOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.SecretVersion) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Output only. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the
+   * format `projects/*/secrets/*/versions/*`.
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] IDs in a [Secret][google.cloud.secrets.v1beta1.Secret] start at 1 and
+   * are incremented for each subsequent version of the secret.
+   * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The name. + */ + java.lang.String getName(); + /** + * + * + *
+   * Output only. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the
+   * format `projects/*/secrets/*/versions/*`.
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] IDs in a [Secret][google.cloud.secrets.v1beta1.Secret] start at 1 and
+   * are incremented for each subsequent version of the secret.
+   * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The bytes for name. + */ + com.google.protobuf.ByteString getNameBytes(); + + /** + * + * + *
+   * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return Whether the createTime field is set. + */ + boolean hasCreateTime(); + /** + * + * + *
+   * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The createTime. + */ + com.google.protobuf.Timestamp getCreateTime(); + /** + * + * + *
+   * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + com.google.protobuf.TimestampOrBuilder getCreateTimeOrBuilder(); + + /** + * + * + *
+   * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+   * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+   * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+   * 
+ * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return Whether the destroyTime field is set. + */ + boolean hasDestroyTime(); + /** + * + * + *
+   * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+   * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+   * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+   * 
+ * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The destroyTime. + */ + com.google.protobuf.Timestamp getDestroyTime(); + /** + * + * + *
+   * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+   * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+   * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+   * 
+ * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + com.google.protobuf.TimestampOrBuilder getDestroyTimeOrBuilder(); + + /** + * + * + *
+   * Output only. The current state of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretVersion.State state = 4 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The enum numeric value on the wire for state. + */ + int getStateValue(); + /** + * + * + *
+   * Output only. The current state of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretVersion.State state = 4 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The state. + */ + com.google.cloud.secrets.v1beta1.SecretVersion.State getState(); +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretsProto.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretsProto.java new file mode 100644 index 00000000..19c63ff0 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/SecretsProto.java @@ -0,0 +1,386 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +public final class SecretsProto { + private SecretsProto() {} + + public static void registerAllExtensions(com.google.protobuf.ExtensionRegistryLite registry) {} + + public static void registerAllExtensions(com.google.protobuf.ExtensionRegistry registry) { + registerAllExtensions((com.google.protobuf.ExtensionRegistryLite) registry); + } + + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_ListSecretsRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_ListSecretsRequest_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_ListSecretsResponse_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_ListSecretsResponse_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_CreateSecretRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_CreateSecretRequest_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_AddSecretVersionRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_AddSecretVersionRequest_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_GetSecretRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_GetSecretRequest_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsRequest_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsResponse_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsResponse_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_GetSecretVersionRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_GetSecretVersionRequest_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_UpdateSecretRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_UpdateSecretRequest_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionRequest_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionResponse_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionResponse_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_DeleteSecretRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_DeleteSecretRequest_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_DisableSecretVersionRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_DisableSecretVersionRequest_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_EnableSecretVersionRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_EnableSecretVersionRequest_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_DestroySecretVersionRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_DestroySecretVersionRequest_fieldAccessorTable; + + public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() { + return descriptor; + } + + private static com.google.protobuf.Descriptors.FileDescriptor descriptor; + + static { + java.lang.String[] descriptorData = { + "\n*google/cloud/secrets/v1beta1/service.p" + + "roto\022\034google.cloud.secrets.v1beta1\032\034goog" + + "le/api/annotations.proto\032\027google/api/cli" + + "ent.proto\032\037google/api/field_behavior.pro" + + "to\032\031google/api/resource.proto\032,google/cl" + + "oud/secrets/v1beta1/resources.proto\032\036goo" + + "gle/iam/v1/iam_policy.proto\032\032google/iam/" + + "v1/policy.proto\032\033google/protobuf/empty.p" + + "roto\032 google/protobuf/field_mask.proto\"\212" + + "\001\n\022ListSecretsRequest\022C\n\006parent\030\001 \001(\tB3\340" + + "A\002\372A-\n+cloudresourcemanager.googleapis.c" + + "om/Project\022\026\n\tpage_size\030\002 \001(\005B\003\340A\001\022\027\n\npa" + + "ge_token\030\003 \001(\tB\003\340A\001\"y\n\023ListSecretsRespon" + + "se\0225\n\007secrets\030\001 \003(\0132$.google.cloud.secre" + + "ts.v1beta1.Secret\022\027\n\017next_page_token\030\002 \001" + + "(\t\022\022\n\ntotal_size\030\003 \001(\005\"\250\001\n\023CreateSecretR" + + "equest\022C\n\006parent\030\001 \001(\tB3\340A\002\372A-\n+cloudres" + + "ourcemanager.googleapis.com/Project\022\026\n\ts" + + "ecret_id\030\002 \001(\tB\003\340A\002\0224\n\006secret\030\003 \001(\0132$.go" + + "ogle.cloud.secrets.v1beta1.Secret\"\231\001\n\027Ad" + + "dSecretVersionRequest\022;\n\006parent\030\001 \001(\tB+\340" + + "A\002\372A%\n#secretmanager.googleapis.com/Secr" + + "et\022A\n\007payload\030\002 \001(\0132+.google.cloud.secre" + + "ts.v1beta1.SecretPayloadB\003\340A\002\"M\n\020GetSecr" + + "etRequest\0229\n\004name\030\001 \001(\tB+\340A\002\372A%\n#secretm" + + "anager.googleapis.com/Secret\"\211\001\n\031ListSec" + + "retVersionsRequest\022;\n\006parent\030\001 \001(\tB+\340A\002\372" + + "A%\n#secretmanager.googleapis.com/Secret\022" + + "\026\n\tpage_size\030\002 \001(\005B\003\340A\001\022\027\n\npage_token\030\003 " + + "\001(\tB\003\340A\001\"\210\001\n\032ListSecretVersionsResponse\022" + + "=\n\010versions\030\001 \003(\0132+.google.cloud.secrets" + + ".v1beta1.SecretVersion\022\027\n\017next_page_toke" + + "n\030\002 \001(\t\022\022\n\ntotal_size\030\003 \001(\005\"[\n\027GetSecret" + + "VersionRequest\022@\n\004name\030\001 \001(\tB2\340A\002\372A,\n*se" + + "cretmanager.googleapis.com/SecretVersion" + + "\"\206\001\n\023UpdateSecretRequest\0229\n\006secret\030\001 \001(\013" + + "2$.google.cloud.secrets.v1beta1.SecretB\003" + + "\340A\002\0224\n\013update_mask\030\002 \001(\0132\032.google.protob" + + "uf.FieldMaskB\003\340A\002\"^\n\032AccessSecretVersion" + + "Request\022@\n\004name\030\001 \001(\tB2\340A\002\372A,\n*secretman" + + "ager.googleapis.com/SecretVersion\"\232\001\n\033Ac" + + "cessSecretVersionResponse\022=\n\004name\030\001 \001(\tB" + + "/\372A,\n*secretmanager.googleapis.com/Secre" + + "tVersion\022<\n\007payload\030\002 \001(\0132+.google.cloud" + + ".secrets.v1beta1.SecretPayload\"P\n\023Delete" + + "SecretRequest\0229\n\004name\030\001 \001(\tB+\340A\002\372A%\n#sec" + + "retmanager.googleapis.com/Secret\"_\n\033Disa" + + "bleSecretVersionRequest\022@\n\004name\030\001 \001(\tB2\340" + + "A\002\372A,\n*secretmanager.googleapis.com/Secr" + + "etVersion\"^\n\032EnableSecretVersionRequest\022" + + "@\n\004name\030\001 \001(\tB2\340A\002\372A,\n*secretmanager.goo" + + "gleapis.com/SecretVersion\"_\n\033DestroySecr" + + "etVersionRequest\022@\n\004name\030\001 \001(\tB2\340A\002\372A,\n*" + + "secretmanager.googleapis.com/SecretVersi" + + "on2\203\026\n\024SecretManagerService\022\251\001\n\013ListSecr" + + "ets\0220.google.cloud.secrets.v1beta1.ListS" + + "ecretsRequest\0321.google.cloud.secrets.v1b" + + "eta1.ListSecretsResponse\"5\202\323\344\223\002&\022$/v1bet" + + "a1/{parent=projects/*}/secrets\332A\006parent\022" + + "\267\001\n\014CreateSecret\0221.google.cloud.secrets." + + "v1beta1.CreateSecretRequest\032$.google.clo" + + "ud.secrets.v1beta1.Secret\"N\202\323\344\223\002.\"$/v1be" + + "ta1/{parent=projects/*}/secrets:\006secret\332" + + "A\027parent,secret_id,secret\022\305\001\n\020AddSecretV" + + "ersion\0225.google.cloud.secrets.v1beta1.Ad" + + "dSecretVersionRequest\032+.google.cloud.sec" + + "rets.v1beta1.SecretVersion\"M\202\323\344\223\0026\"1/v1b" + + "eta1/{parent=projects/*/secrets/*}:addVe" + + "rsion:\001*\332A\016parent,payload\022\226\001\n\tGetSecret\022" + + "..google.cloud.secrets.v1beta1.GetSecret" + + "Request\032$.google.cloud.secrets.v1beta1.S" + + "ecret\"3\202\323\344\223\002&\022$/v1beta1/{name=projects/*" + + "/secrets/*}\332A\004name\022\271\001\n\014UpdateSecret\0221.go" + + "ogle.cloud.secrets.v1beta1.UpdateSecretR" + + "equest\032$.google.cloud.secrets.v1beta1.Se" + + "cret\"P\202\323\344\223\00252+/v1beta1/{secret.name=proj" + + "ects/*/secrets/*}:\006secret\332A\022secret,updat" + + "e_mask\022\216\001\n\014DeleteSecret\0221.google.cloud.s" + + "ecrets.v1beta1.DeleteSecretRequest\032\026.goo" + + "gle.protobuf.Empty\"3\202\323\344\223\002&*$/v1beta1/{na" + + "me=projects/*/secrets/*}\332A\004name\022\311\001\n\022List" + + "SecretVersions\0227.google.cloud.secrets.v1" + + "beta1.ListSecretVersionsRequest\0328.google" + + ".cloud.secrets.v1beta1.ListSecretVersion" + + "sResponse\"@\202\323\344\223\0021\022//v1beta1/{parent=proj" + + "ects/*/secrets/*}/versions\332A\006parent\022\266\001\n\020" + + "GetSecretVersion\0225.google.cloud.secrets." + + "v1beta1.GetSecretVersionRequest\032+.google" + + ".cloud.secrets.v1beta1.SecretVersion\">\202\323" + + "\344\223\0021\022//v1beta1/{name=projects/*/secrets/" + + "*/versions/*}\332A\004name\022\321\001\n\023AccessSecretVer" + + "sion\0228.google.cloud.secrets.v1beta1.Acce" + + "ssSecretVersionRequest\0329.google.cloud.se" + + "crets.v1beta1.AccessSecretVersionRespons" + + "e\"E\202\323\344\223\0028\0226/v1beta1/{name=projects/*/sec" + + "rets/*/versions/*}:access\332A\004name\022\311\001\n\024Dis" + + "ableSecretVersion\0229.google.cloud.secrets" + + ".v1beta1.DisableSecretVersionRequest\032+.g" + + "oogle.cloud.secrets.v1beta1.SecretVersio" + + "n\"I\202\323\344\223\002<\"7/v1beta1/{name=projects/*/sec" + + "rets/*/versions/*}:disable:\001*\332A\004name\022\306\001\n" + + "\023EnableSecretVersion\0228.google.cloud.secr" + + "ets.v1beta1.EnableSecretVersionRequest\032+" + + ".google.cloud.secrets.v1beta1.SecretVers" + + "ion\"H\202\323\344\223\002;\"6/v1beta1/{name=projects/*/s" + + "ecrets/*/versions/*}:enable:\001*\332A\004name\022\311\001" + + "\n\024DestroySecretVersion\0229.google.cloud.se" + + "crets.v1beta1.DestroySecretVersionReques" + + "t\032+.google.cloud.secrets.v1beta1.SecretV" + + "ersion\"I\202\323\344\223\002<\"7/v1beta1/{name=projects/" + + "*/secrets/*/versions/*}:destroy:\001*\332A\004nam" + + "e\022\213\001\n\014SetIamPolicy\022\".google.iam.v1.SetIa" + + "mPolicyRequest\032\025.google.iam.v1.Policy\"@\202" + + "\323\344\223\002:\"5/v1beta1/{resource=projects/*/sec" + + "rets/*}:setIamPolicy:\001*\022\210\001\n\014GetIamPolicy" + + "\022\".google.iam.v1.GetIamPolicyRequest\032\025.g" + + "oogle.iam.v1.Policy\"=\202\323\344\223\0027\0225/v1beta1/{r" + + "esource=projects/*/secrets/*}:getIamPoli" + + "cy\022\261\001\n\022TestIamPermissions\022(.google.iam.v" + + "1.TestIamPermissionsRequest\032).google.iam" + + ".v1.TestIamPermissionsResponse\"F\202\323\344\223\002@\";" + + "/v1beta1/{resource=projects/*/secrets/*}" + + ":testIamPermissions:\001*\032P\312A\034secretmanager" + + ".googleapis.com\322A.https://www.googleapis" + + ".com/auth/cloud-platformB\276\001\n com.google." + + "cloud.secrets.v1beta1B\014SecretsProtoP\001ZCg" + + "oogle.golang.org/genproto/googleapis/clo" + + "ud/secrets/v1beta1;secrets\370\001\001\242\002\003GSM\252\002\034Go" + + "ogle.Cloud.Secrets.V1Beta1\312\002\034Google\\Clou" + + "d\\Secrets\\V1beta1b\006proto3" + }; + descriptor = + com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom( + descriptorData, + new com.google.protobuf.Descriptors.FileDescriptor[] { + com.google.api.AnnotationsProto.getDescriptor(), + com.google.api.ClientProto.getDescriptor(), + com.google.api.FieldBehaviorProto.getDescriptor(), + com.google.api.ResourceProto.getDescriptor(), + com.google.cloud.secrets.v1beta1.ResourcesProto.getDescriptor(), + com.google.iam.v1.IamPolicyProto.getDescriptor(), + com.google.iam.v1.PolicyProto.getDescriptor(), + com.google.protobuf.EmptyProto.getDescriptor(), + com.google.protobuf.FieldMaskProto.getDescriptor(), + }); + internal_static_google_cloud_secrets_v1beta1_ListSecretsRequest_descriptor = + getDescriptor().getMessageTypes().get(0); + internal_static_google_cloud_secrets_v1beta1_ListSecretsRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_ListSecretsRequest_descriptor, + new java.lang.String[] { + "Parent", "PageSize", "PageToken", + }); + internal_static_google_cloud_secrets_v1beta1_ListSecretsResponse_descriptor = + getDescriptor().getMessageTypes().get(1); + internal_static_google_cloud_secrets_v1beta1_ListSecretsResponse_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_ListSecretsResponse_descriptor, + new java.lang.String[] { + "Secrets", "NextPageToken", "TotalSize", + }); + internal_static_google_cloud_secrets_v1beta1_CreateSecretRequest_descriptor = + getDescriptor().getMessageTypes().get(2); + internal_static_google_cloud_secrets_v1beta1_CreateSecretRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_CreateSecretRequest_descriptor, + new java.lang.String[] { + "Parent", "SecretId", "Secret", + }); + internal_static_google_cloud_secrets_v1beta1_AddSecretVersionRequest_descriptor = + getDescriptor().getMessageTypes().get(3); + internal_static_google_cloud_secrets_v1beta1_AddSecretVersionRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_AddSecretVersionRequest_descriptor, + new java.lang.String[] { + "Parent", "Payload", + }); + internal_static_google_cloud_secrets_v1beta1_GetSecretRequest_descriptor = + getDescriptor().getMessageTypes().get(4); + internal_static_google_cloud_secrets_v1beta1_GetSecretRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_GetSecretRequest_descriptor, + new java.lang.String[] { + "Name", + }); + internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsRequest_descriptor = + getDescriptor().getMessageTypes().get(5); + internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsRequest_descriptor, + new java.lang.String[] { + "Parent", "PageSize", "PageToken", + }); + internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsResponse_descriptor = + getDescriptor().getMessageTypes().get(6); + internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsResponse_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsResponse_descriptor, + new java.lang.String[] { + "Versions", "NextPageToken", "TotalSize", + }); + internal_static_google_cloud_secrets_v1beta1_GetSecretVersionRequest_descriptor = + getDescriptor().getMessageTypes().get(7); + internal_static_google_cloud_secrets_v1beta1_GetSecretVersionRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_GetSecretVersionRequest_descriptor, + new java.lang.String[] { + "Name", + }); + internal_static_google_cloud_secrets_v1beta1_UpdateSecretRequest_descriptor = + getDescriptor().getMessageTypes().get(8); + internal_static_google_cloud_secrets_v1beta1_UpdateSecretRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_UpdateSecretRequest_descriptor, + new java.lang.String[] { + "Secret", "UpdateMask", + }); + internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionRequest_descriptor = + getDescriptor().getMessageTypes().get(9); + internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionRequest_descriptor, + new java.lang.String[] { + "Name", + }); + internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionResponse_descriptor = + getDescriptor().getMessageTypes().get(10); + internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionResponse_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionResponse_descriptor, + new java.lang.String[] { + "Name", "Payload", + }); + internal_static_google_cloud_secrets_v1beta1_DeleteSecretRequest_descriptor = + getDescriptor().getMessageTypes().get(11); + internal_static_google_cloud_secrets_v1beta1_DeleteSecretRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_DeleteSecretRequest_descriptor, + new java.lang.String[] { + "Name", + }); + internal_static_google_cloud_secrets_v1beta1_DisableSecretVersionRequest_descriptor = + getDescriptor().getMessageTypes().get(12); + internal_static_google_cloud_secrets_v1beta1_DisableSecretVersionRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_DisableSecretVersionRequest_descriptor, + new java.lang.String[] { + "Name", + }); + internal_static_google_cloud_secrets_v1beta1_EnableSecretVersionRequest_descriptor = + getDescriptor().getMessageTypes().get(13); + internal_static_google_cloud_secrets_v1beta1_EnableSecretVersionRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_EnableSecretVersionRequest_descriptor, + new java.lang.String[] { + "Name", + }); + internal_static_google_cloud_secrets_v1beta1_DestroySecretVersionRequest_descriptor = + getDescriptor().getMessageTypes().get(14); + internal_static_google_cloud_secrets_v1beta1_DestroySecretVersionRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_DestroySecretVersionRequest_descriptor, + new java.lang.String[] { + "Name", + }); + com.google.protobuf.ExtensionRegistry registry = + com.google.protobuf.ExtensionRegistry.newInstance(); + registry.add(com.google.api.ClientProto.defaultHost); + registry.add(com.google.api.FieldBehaviorProto.fieldBehavior); + registry.add(com.google.api.AnnotationsProto.http); + registry.add(com.google.api.ClientProto.methodSignature); + registry.add(com.google.api.ClientProto.oauthScopes); + registry.add(com.google.api.ResourceProto.resourceReference); + com.google.protobuf.Descriptors.FileDescriptor.internalUpdateFileDescriptor( + descriptor, registry); + com.google.api.AnnotationsProto.getDescriptor(); + com.google.api.ClientProto.getDescriptor(); + com.google.api.FieldBehaviorProto.getDescriptor(); + com.google.api.ResourceProto.getDescriptor(); + com.google.cloud.secrets.v1beta1.ResourcesProto.getDescriptor(); + com.google.iam.v1.IamPolicyProto.getDescriptor(); + com.google.iam.v1.PolicyProto.getDescriptor(); + com.google.protobuf.EmptyProto.getDescriptor(); + com.google.protobuf.FieldMaskProto.getDescriptor(); + } + + // @@protoc_insertion_point(outer_class_scope) +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/UpdateSecretRequest.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/UpdateSecretRequest.java new file mode 100644 index 00000000..e61c75c3 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/UpdateSecretRequest.java @@ -0,0 +1,1033 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.UpdateSecret][google.cloud.secrets.v1beta1.SecretManagerService.UpdateSecret].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.UpdateSecretRequest} + */ +public final class UpdateSecretRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.UpdateSecretRequest) + UpdateSecretRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use UpdateSecretRequest.newBuilder() to construct. + private UpdateSecretRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private UpdateSecretRequest() {} + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new UpdateSecretRequest(); + } + + @java.lang.Override + public final com.google.protobuf.UnknownFieldSet getUnknownFields() { + return this.unknownFields; + } + + private UpdateSecretRequest( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + this(); + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + com.google.protobuf.UnknownFieldSet.Builder unknownFields = + com.google.protobuf.UnknownFieldSet.newBuilder(); + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + com.google.cloud.secrets.v1beta1.Secret.Builder subBuilder = null; + if (secret_ != null) { + subBuilder = secret_.toBuilder(); + } + secret_ = + input.readMessage( + com.google.cloud.secrets.v1beta1.Secret.parser(), extensionRegistry); + if (subBuilder != null) { + subBuilder.mergeFrom(secret_); + secret_ = subBuilder.buildPartial(); + } + + break; + } + case 18: + { + com.google.protobuf.FieldMask.Builder subBuilder = null; + if (updateMask_ != null) { + subBuilder = updateMask_.toBuilder(); + } + updateMask_ = + input.readMessage(com.google.protobuf.FieldMask.parser(), extensionRegistry); + if (subBuilder != null) { + subBuilder.mergeFrom(updateMask_); + updateMask_ = subBuilder.buildPartial(); + } + + break; + } + default: + { + if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { + done = true; + } + break; + } + } + } + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(this); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); + } finally { + this.unknownFields = unknownFields.build(); + makeExtensionsImmutable(); + } + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_UpdateSecretRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_UpdateSecretRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.UpdateSecretRequest.class, + com.google.cloud.secrets.v1beta1.UpdateSecretRequest.Builder.class); + } + + public static final int SECRET_FIELD_NUMBER = 1; + private com.google.cloud.secrets.v1beta1.Secret secret_; + /** + * + * + *
+   * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the secret field is set. + */ + public boolean hasSecret() { + return secret_ != null; + } + /** + * + * + *
+   * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return The secret. + */ + public com.google.cloud.secrets.v1beta1.Secret getSecret() { + return secret_ == null ? com.google.cloud.secrets.v1beta1.Secret.getDefaultInstance() : secret_; + } + /** + * + * + *
+   * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secrets.v1beta1.SecretOrBuilder getSecretOrBuilder() { + return getSecret(); + } + + public static final int UPDATE_MASK_FIELD_NUMBER = 2; + private com.google.protobuf.FieldMask updateMask_; + /** + * + * + *
+   * Required. Specifies the fields to be updated.
+   * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the updateMask field is set. + */ + public boolean hasUpdateMask() { + return updateMask_ != null; + } + /** + * + * + *
+   * Required. Specifies the fields to be updated.
+   * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return The updateMask. + */ + public com.google.protobuf.FieldMask getUpdateMask() { + return updateMask_ == null ? com.google.protobuf.FieldMask.getDefaultInstance() : updateMask_; + } + /** + * + * + *
+   * Required. Specifies the fields to be updated.
+   * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.protobuf.FieldMaskOrBuilder getUpdateMaskOrBuilder() { + return getUpdateMask(); + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (secret_ != null) { + output.writeMessage(1, getSecret()); + } + if (updateMask_ != null) { + output.writeMessage(2, getUpdateMask()); + } + unknownFields.writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (secret_ != null) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(1, getSecret()); + } + if (updateMask_ != null) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(2, getUpdateMask()); + } + size += unknownFields.getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secrets.v1beta1.UpdateSecretRequest)) { + return super.equals(obj); + } + com.google.cloud.secrets.v1beta1.UpdateSecretRequest other = + (com.google.cloud.secrets.v1beta1.UpdateSecretRequest) obj; + + if (hasSecret() != other.hasSecret()) return false; + if (hasSecret()) { + if (!getSecret().equals(other.getSecret())) return false; + } + if (hasUpdateMask() != other.hasUpdateMask()) return false; + if (hasUpdateMask()) { + if (!getUpdateMask().equals(other.getUpdateMask())) return false; + } + if (!unknownFields.equals(other.unknownFields)) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + if (hasSecret()) { + hash = (37 * hash) + SECRET_FIELD_NUMBER; + hash = (53 * hash) + getSecret().hashCode(); + } + if (hasUpdateMask()) { + hash = (37 * hash) + UPDATE_MASK_FIELD_NUMBER; + hash = (53 * hash) + getUpdateMask().hashCode(); + } + hash = (29 * hash) + unknownFields.hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secrets.v1beta1.UpdateSecretRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.UpdateSecretRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.UpdateSecretRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.UpdateSecretRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.UpdateSecretRequest parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secrets.v1beta1.UpdateSecretRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.UpdateSecretRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.UpdateSecretRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.UpdateSecretRequest parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.UpdateSecretRequest parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secrets.v1beta1.UpdateSecretRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secrets.v1beta1.UpdateSecretRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder(com.google.cloud.secrets.v1beta1.UpdateSecretRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.UpdateSecret][google.cloud.secrets.v1beta1.SecretManagerService.UpdateSecret].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.UpdateSecretRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.UpdateSecretRequest) + com.google.cloud.secrets.v1beta1.UpdateSecretRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_UpdateSecretRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_UpdateSecretRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secrets.v1beta1.UpdateSecretRequest.class, + com.google.cloud.secrets.v1beta1.UpdateSecretRequest.Builder.class); + } + + // Construct using com.google.cloud.secrets.v1beta1.UpdateSecretRequest.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) {} + } + + @java.lang.Override + public Builder clear() { + super.clear(); + if (secretBuilder_ == null) { + secret_ = null; + } else { + secret_ = null; + secretBuilder_ = null; + } + if (updateMaskBuilder_ == null) { + updateMask_ = null; + } else { + updateMask_ = null; + updateMaskBuilder_ = null; + } + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secrets.v1beta1.SecretsProto + .internal_static_google_cloud_secrets_v1beta1_UpdateSecretRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.UpdateSecretRequest getDefaultInstanceForType() { + return com.google.cloud.secrets.v1beta1.UpdateSecretRequest.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.UpdateSecretRequest build() { + com.google.cloud.secrets.v1beta1.UpdateSecretRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.UpdateSecretRequest buildPartial() { + com.google.cloud.secrets.v1beta1.UpdateSecretRequest result = + new com.google.cloud.secrets.v1beta1.UpdateSecretRequest(this); + if (secretBuilder_ == null) { + result.secret_ = secret_; + } else { + result.secret_ = secretBuilder_.build(); + } + if (updateMaskBuilder_ == null) { + result.updateMask_ = updateMask_; + } else { + result.updateMask_ = updateMaskBuilder_.build(); + } + onBuilt(); + return result; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secrets.v1beta1.UpdateSecretRequest) { + return mergeFrom((com.google.cloud.secrets.v1beta1.UpdateSecretRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secrets.v1beta1.UpdateSecretRequest other) { + if (other == com.google.cloud.secrets.v1beta1.UpdateSecretRequest.getDefaultInstance()) + return this; + if (other.hasSecret()) { + mergeSecret(other.getSecret()); + } + if (other.hasUpdateMask()) { + mergeUpdateMask(other.getUpdateMask()); + } + this.mergeUnknownFields(other.unknownFields); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + com.google.cloud.secrets.v1beta1.UpdateSecretRequest parsedMessage = null; + try { + parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + parsedMessage = + (com.google.cloud.secrets.v1beta1.UpdateSecretRequest) e.getUnfinishedMessage(); + throw e.unwrapIOException(); + } finally { + if (parsedMessage != null) { + mergeFrom(parsedMessage); + } + } + return this; + } + + private com.google.cloud.secrets.v1beta1.Secret secret_; + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secrets.v1beta1.Secret, + com.google.cloud.secrets.v1beta1.Secret.Builder, + com.google.cloud.secrets.v1beta1.SecretOrBuilder> + secretBuilder_; + /** + * + * + *
+     * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the secret field is set. + */ + public boolean hasSecret() { + return secretBuilder_ != null || secret_ != null; + } + /** + * + * + *
+     * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return The secret. + */ + public com.google.cloud.secrets.v1beta1.Secret getSecret() { + if (secretBuilder_ == null) { + return secret_ == null + ? com.google.cloud.secrets.v1beta1.Secret.getDefaultInstance() + : secret_; + } else { + return secretBuilder_.getMessage(); + } + } + /** + * + * + *
+     * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder setSecret(com.google.cloud.secrets.v1beta1.Secret value) { + if (secretBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + secret_ = value; + onChanged(); + } else { + secretBuilder_.setMessage(value); + } + + return this; + } + /** + * + * + *
+     * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder setSecret(com.google.cloud.secrets.v1beta1.Secret.Builder builderForValue) { + if (secretBuilder_ == null) { + secret_ = builderForValue.build(); + onChanged(); + } else { + secretBuilder_.setMessage(builderForValue.build()); + } + + return this; + } + /** + * + * + *
+     * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder mergeSecret(com.google.cloud.secrets.v1beta1.Secret value) { + if (secretBuilder_ == null) { + if (secret_ != null) { + secret_ = + com.google.cloud.secrets.v1beta1.Secret.newBuilder(secret_) + .mergeFrom(value) + .buildPartial(); + } else { + secret_ = value; + } + onChanged(); + } else { + secretBuilder_.mergeFrom(value); + } + + return this; + } + /** + * + * + *
+     * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder clearSecret() { + if (secretBuilder_ == null) { + secret_ = null; + onChanged(); + } else { + secret_ = null; + secretBuilder_ = null; + } + + return this; + } + /** + * + * + *
+     * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secrets.v1beta1.Secret.Builder getSecretBuilder() { + + onChanged(); + return getSecretFieldBuilder().getBuilder(); + } + /** + * + * + *
+     * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secrets.v1beta1.SecretOrBuilder getSecretOrBuilder() { + if (secretBuilder_ != null) { + return secretBuilder_.getMessageOrBuilder(); + } else { + return secret_ == null + ? com.google.cloud.secrets.v1beta1.Secret.getDefaultInstance() + : secret_; + } + } + /** + * + * + *
+     * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secrets.v1beta1.Secret, + com.google.cloud.secrets.v1beta1.Secret.Builder, + com.google.cloud.secrets.v1beta1.SecretOrBuilder> + getSecretFieldBuilder() { + if (secretBuilder_ == null) { + secretBuilder_ = + new com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secrets.v1beta1.Secret, + com.google.cloud.secrets.v1beta1.Secret.Builder, + com.google.cloud.secrets.v1beta1.SecretOrBuilder>( + getSecret(), getParentForChildren(), isClean()); + secret_ = null; + } + return secretBuilder_; + } + + private com.google.protobuf.FieldMask updateMask_; + private com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.FieldMask, + com.google.protobuf.FieldMask.Builder, + com.google.protobuf.FieldMaskOrBuilder> + updateMaskBuilder_; + /** + * + * + *
+     * Required. Specifies the fields to be updated.
+     * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the updateMask field is set. + */ + public boolean hasUpdateMask() { + return updateMaskBuilder_ != null || updateMask_ != null; + } + /** + * + * + *
+     * Required. Specifies the fields to be updated.
+     * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return The updateMask. + */ + public com.google.protobuf.FieldMask getUpdateMask() { + if (updateMaskBuilder_ == null) { + return updateMask_ == null + ? com.google.protobuf.FieldMask.getDefaultInstance() + : updateMask_; + } else { + return updateMaskBuilder_.getMessage(); + } + } + /** + * + * + *
+     * Required. Specifies the fields to be updated.
+     * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder setUpdateMask(com.google.protobuf.FieldMask value) { + if (updateMaskBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + updateMask_ = value; + onChanged(); + } else { + updateMaskBuilder_.setMessage(value); + } + + return this; + } + /** + * + * + *
+     * Required. Specifies the fields to be updated.
+     * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder setUpdateMask(com.google.protobuf.FieldMask.Builder builderForValue) { + if (updateMaskBuilder_ == null) { + updateMask_ = builderForValue.build(); + onChanged(); + } else { + updateMaskBuilder_.setMessage(builderForValue.build()); + } + + return this; + } + /** + * + * + *
+     * Required. Specifies the fields to be updated.
+     * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder mergeUpdateMask(com.google.protobuf.FieldMask value) { + if (updateMaskBuilder_ == null) { + if (updateMask_ != null) { + updateMask_ = + com.google.protobuf.FieldMask.newBuilder(updateMask_).mergeFrom(value).buildPartial(); + } else { + updateMask_ = value; + } + onChanged(); + } else { + updateMaskBuilder_.mergeFrom(value); + } + + return this; + } + /** + * + * + *
+     * Required. Specifies the fields to be updated.
+     * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder clearUpdateMask() { + if (updateMaskBuilder_ == null) { + updateMask_ = null; + onChanged(); + } else { + updateMask_ = null; + updateMaskBuilder_ = null; + } + + return this; + } + /** + * + * + *
+     * Required. Specifies the fields to be updated.
+     * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.protobuf.FieldMask.Builder getUpdateMaskBuilder() { + + onChanged(); + return getUpdateMaskFieldBuilder().getBuilder(); + } + /** + * + * + *
+     * Required. Specifies the fields to be updated.
+     * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.protobuf.FieldMaskOrBuilder getUpdateMaskOrBuilder() { + if (updateMaskBuilder_ != null) { + return updateMaskBuilder_.getMessageOrBuilder(); + } else { + return updateMask_ == null + ? com.google.protobuf.FieldMask.getDefaultInstance() + : updateMask_; + } + } + /** + * + * + *
+     * Required. Specifies the fields to be updated.
+     * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + private com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.FieldMask, + com.google.protobuf.FieldMask.Builder, + com.google.protobuf.FieldMaskOrBuilder> + getUpdateMaskFieldBuilder() { + if (updateMaskBuilder_ == null) { + updateMaskBuilder_ = + new com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.FieldMask, + com.google.protobuf.FieldMask.Builder, + com.google.protobuf.FieldMaskOrBuilder>( + getUpdateMask(), getParentForChildren(), isClean()); + updateMask_ = null; + } + return updateMaskBuilder_; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.UpdateSecretRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.UpdateSecretRequest) + private static final com.google.cloud.secrets.v1beta1.UpdateSecretRequest DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secrets.v1beta1.UpdateSecretRequest(); + } + + public static com.google.cloud.secrets.v1beta1.UpdateSecretRequest getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public UpdateSecretRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return new UpdateSecretRequest(input, extensionRegistry); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secrets.v1beta1.UpdateSecretRequest getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/UpdateSecretRequestOrBuilder.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/UpdateSecretRequestOrBuilder.java new file mode 100644 index 00000000..70411346 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secrets/v1beta1/UpdateSecretRequestOrBuilder.java @@ -0,0 +1,104 @@ +/* + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +package com.google.cloud.secrets.v1beta1; + +public interface UpdateSecretRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.UpdateSecretRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the secret field is set. + */ + boolean hasSecret(); + /** + * + * + *
+   * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return The secret. + */ + com.google.cloud.secrets.v1beta1.Secret getSecret(); + /** + * + * + *
+   * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + com.google.cloud.secrets.v1beta1.SecretOrBuilder getSecretOrBuilder(); + + /** + * + * + *
+   * Required. Specifies the fields to be updated.
+   * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the updateMask field is set. + */ + boolean hasUpdateMask(); + /** + * + * + *
+   * Required. Specifies the fields to be updated.
+   * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return The updateMask. + */ + com.google.protobuf.FieldMask getUpdateMask(); + /** + * + * + *
+   * Required. Specifies the fields to be updated.
+   * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + com.google.protobuf.FieldMaskOrBuilder getUpdateMaskOrBuilder(); +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/resources.proto b/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/resources.proto new file mode 100644 index 00000000..c3a8c681 --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/resources.proto @@ -0,0 +1,156 @@ +// Copyright 2019 Google LLC. +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. +// + +syntax = "proto3"; + +package google.cloud.secrets.v1beta1; + +import "google/api/field_behavior.proto"; +import "google/api/resource.proto"; +import "google/protobuf/timestamp.proto"; +import "google/api/annotations.proto"; + +option cc_enable_arenas = true; +option csharp_namespace = "Google.Cloud.Secrets.V1Beta1"; +option go_package = "google.golang.org/genproto/googleapis/cloud/secrets/v1beta1;secrets"; +option java_multiple_files = true; +option java_outer_classname = "ResourcesProto"; +option java_package = "com.google.cloud.secrets.v1beta1"; +option objc_class_prefix = "GSM"; +option php_namespace = "Google\\Cloud\\Secrets\\V1beta1"; + +// A [Secret][google.cloud.secrets.v1beta1.Secret] is a logical secret whose value and versions can +// be accessed. +// +// A [Secret][google.cloud.secrets.v1beta1.Secret] is made up of zero or more [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] that +// represent the secret data. +message Secret { + option (google.api.resource) = { + type: "secretmanager.googleapis.com/Secret" + pattern: "projects/{project}/secrets/{secret}" + }; + + // Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the format `projects/*/secrets/*`. + string name = 1 [(google.api.field_behavior) = OUTPUT_ONLY]; + + // Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret]. + // + // The replication policy cannot be changed after the Secret has been created. + Replication replication = 2 [ + (google.api.field_behavior) = IMMUTABLE, + (google.api.field_behavior) = REQUIRED + ]; + + // Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created. + google.protobuf.Timestamp create_time = 3 [(google.api.field_behavior) = OUTPUT_ONLY]; + + // The labels assigned to this Secret. + // + // Label keys must be between 1 and 63 characters long, have a UTF-8 encoding + // of maximum 128 bytes, and must conform to the following PCRE regular + // expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}` + // + // Label values must be between 0 and 63 characters long, have a UTF-8 + // encoding of maximum 128 bytes, and must conform to the following PCRE + // regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}` + // + // No more than 64 labels can be assigned to a given resource. + map labels = 4; +} + +// A secret version resource in the Secret Manager API. +message SecretVersion { + option (google.api.resource) = { + type: "secretmanager.googleapis.com/SecretVersion" + pattern: "projects/{project}/secrets/{secret}/versions/{secret_version}" + }; + + // The state of a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion], indicating if it can be accessed. + enum State { + // Not specified. This value is unused and invalid. + STATE_UNSPECIFIED = 0; + + // The [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] may be accessed. + ENABLED = 1; + + // The [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] may not be accessed, but the secret data + // is still available and can be placed back into the [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED] + // state. + DISABLED = 2; + + // The [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] is destroyed and the secret data is no longer + // stored. A version may not leave this state once entered. + DESTROYED = 3; + } + + // Output only. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the + // format `projects/*/secrets/*/versions/*`. + // + // [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] IDs in a [Secret][google.cloud.secrets.v1beta1.Secret] start at 1 and + // are incremented for each subsequent version of the secret. + string name = 1 [(google.api.field_behavior) = OUTPUT_ONLY]; + + // Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created. + google.protobuf.Timestamp create_time = 2 [(google.api.field_behavior) = OUTPUT_ONLY]; + + // Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed. + // Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is + // [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED]. + google.protobuf.Timestamp destroy_time = 3 [(google.api.field_behavior) = OUTPUT_ONLY]; + + // Output only. The current state of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + State state = 4 [(google.api.field_behavior) = OUTPUT_ONLY]; +} + +// A policy that defines the replication configuration of data. +message Replication { + // A replication policy that replicates the [Secret][google.cloud.secrets.v1beta1.Secret] payload without any + // restrictions. + message Automatic { + + } + + // A replication policy that replicates the [Secret][google.cloud.secrets.v1beta1.Secret] payload into the + // locations specified in [Secret.replication.user_managed.replicas][] + message UserManaged { + // Represents a Replica for this [Secret][google.cloud.secrets.v1beta1.Secret]. + message Replica { + // The canonical IDs of the location to replicate data. + // For example: `"us-east1"`. + string location = 1; + } + + // Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret]. + // + // Cannot be empty. + repeated Replica replicas = 1 [(google.api.field_behavior) = REQUIRED]; + } + + // The replication policy for this secret. + oneof replication { + // The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions. + Automatic automatic = 1; + + // The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified. + UserManaged user_managed = 2; + } +} + +// A secret payload resource in the Secret Manager API. This contains the +// sensitive secret data that is associated with a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. +message SecretPayload { + // The secret data. Must be no larger than 64KiB. + bytes data = 1; +} diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/service.proto b/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/service.proto new file mode 100644 index 00000000..33f2942d --- /dev/null +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/service.proto @@ -0,0 +1,416 @@ +// Copyright 2019 Google LLC. +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. +// + +syntax = "proto3"; + +package google.cloud.secrets.v1beta1; + +import "google/api/annotations.proto"; +import "google/api/client.proto"; +import "google/api/field_behavior.proto"; +import "google/api/resource.proto"; +import "google/cloud/secrets/v1beta1/resources.proto"; +import "google/iam/v1/iam_policy.proto"; +import "google/iam/v1/policy.proto"; +import "google/protobuf/empty.proto"; +import "google/protobuf/field_mask.proto"; + +option cc_enable_arenas = true; +option csharp_namespace = "Google.Cloud.Secrets.V1Beta1"; +option go_package = "google.golang.org/genproto/googleapis/cloud/secrets/v1beta1;secrets"; +option java_multiple_files = true; +option java_outer_classname = "SecretsProto"; +option java_package = "com.google.cloud.secrets.v1beta1"; +option objc_class_prefix = "GSM"; +option php_namespace = "Google\\Cloud\\Secrets\\V1beta1"; + +// `projects/*/secrets/*/versions/latest` is an alias to the `latest` +// [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + +// Secret Manager Service +// +// Manages secrets and operations using those secrets. Implements a REST +// model with the following objects: +// +// * [Secret][google.cloud.secrets.v1beta1.Secret] +// * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] +service SecretManagerService { + option (google.api.default_host) = "secretmanager.googleapis.com"; + option (google.api.oauth_scopes) = "https://www.googleapis.com/auth/cloud-platform"; + + // Lists [Secrets][google.cloud.secrets.v1beta1.Secret]. + rpc ListSecrets(ListSecretsRequest) returns (ListSecretsResponse) { + option (google.api.http) = { + get: "/v1beta1/{parent=projects/*}/secrets" + }; + option (google.api.method_signature) = "parent"; + } + + // Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. + rpc CreateSecret(CreateSecretRequest) returns (Secret) { + option (google.api.http) = { + post: "/v1beta1/{parent=projects/*}/secrets" + body: "secret" + }; + option (google.api.method_signature) = "parent,secret_id,secret"; + } + + // Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret data and attaches + // it to an existing [Secret][google.cloud.secrets.v1beta1.Secret]. + rpc AddSecretVersion(AddSecretVersionRequest) returns (SecretVersion) { + option (google.api.http) = { + post: "/v1beta1/{parent=projects/*/secrets/*}:addVersion" + body: "*" + }; + option (google.api.method_signature) = "parent,payload"; + } + + // Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret]. + rpc GetSecret(GetSecretRequest) returns (Secret) { + option (google.api.http) = { + get: "/v1beta1/{name=projects/*/secrets/*}" + }; + option (google.api.method_signature) = "name"; + } + + // Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret]. + rpc UpdateSecret(UpdateSecretRequest) returns (Secret) { + option (google.api.http) = { + patch: "/v1beta1/{secret.name=projects/*/secrets/*}" + body: "secret" + }; + option (google.api.method_signature) = "secret,update_mask"; + } + + // Deletes a [Secret][google.cloud.secrets.v1beta1.Secret]. + rpc DeleteSecret(DeleteSecretRequest) returns (google.protobuf.Empty) { + option (google.api.http) = { + delete: "/v1beta1/{name=projects/*/secrets/*}" + }; + option (google.api.method_signature) = "name"; + } + + // Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return secret + // data. + rpc ListSecretVersions(ListSecretVersionsRequest) returns (ListSecretVersionsResponse) { + option (google.api.http) = { + get: "/v1beta1/{parent=projects/*/secrets/*}/versions" + }; + option (google.api.method_signature) = "parent"; + } + + // Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + // + // `projects/*/secrets/*/versions/latest` is an alias to the `latest` + // [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + rpc GetSecretVersion(GetSecretVersionRequest) returns (SecretVersion) { + option (google.api.http) = { + get: "/v1beta1/{name=projects/*/secrets/*/versions/*}" + }; + option (google.api.method_signature) = "name"; + } + + // Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the secret data. + // + // `projects/*/secrets/*/versions/latest` is an alias to the `latest` + // [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + rpc AccessSecretVersion(AccessSecretVersionRequest) returns (AccessSecretVersionResponse) { + option (google.api.http) = { + get: "/v1beta1/{name=projects/*/secrets/*/versions/*}:access" + }; + option (google.api.method_signature) = "name"; + } + + // Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + // + // Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + // [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED]. + rpc DisableSecretVersion(DisableSecretVersionRequest) returns (SecretVersion) { + option (google.api.http) = { + post: "/v1beta1/{name=projects/*/secrets/*/versions/*}:disable" + body: "*" + }; + option (google.api.method_signature) = "name"; + } + + // Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + // + // Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + // [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED]. + rpc EnableSecretVersion(EnableSecretVersionRequest) returns (SecretVersion) { + option (google.api.http) = { + post: "/v1beta1/{name=projects/*/secrets/*/versions/*}:enable" + body: "*" + }; + option (google.api.method_signature) = "name"; + } + + // Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + // + // Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + // [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably destroys the + // secret data. + rpc DestroySecretVersion(DestroySecretVersionRequest) returns (SecretVersion) { + option (google.api.http) = { + post: "/v1beta1/{name=projects/*/secrets/*/versions/*}:destroy" + body: "*" + }; + option (google.api.method_signature) = "name"; + } + + // Sets the access control policy on the specified secret. Replaces any + // existing policy. + // + // Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced according + // to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret]. + rpc SetIamPolicy(google.iam.v1.SetIamPolicyRequest) returns (google.iam.v1.Policy) { + option (google.api.http) = { + post: "/v1beta1/{resource=projects/*/secrets/*}:setIamPolicy" + body: "*" + }; + } + + // Gets the access control policy for a secret. + // Returns empty policy if the secret exists and does not have a policy set. + rpc GetIamPolicy(google.iam.v1.GetIamPolicyRequest) returns (google.iam.v1.Policy) { + option (google.api.http) = { + get: "/v1beta1/{resource=projects/*/secrets/*}:getIamPolicy" + }; + } + + // Returns permissions that a caller has for the specified secret. + // If the secret does not exist, this call returns an empty set of + // permissions, not a NOT_FOUND error. + // + // Note: This operation is designed to be used for building permission-aware + // UIs and command-line tools, not for authorization checking. This operation + // may "fail open" without warning. + rpc TestIamPermissions(google.iam.v1.TestIamPermissionsRequest) returns (google.iam.v1.TestIamPermissionsResponse) { + option (google.api.http) = { + post: "/v1beta1/{resource=projects/*/secrets/*}:testIamPermissions" + body: "*" + }; + } +} + +// Request message for [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets]. +message ListSecretsRequest { + // Required. The resource name of the project associated with the + // [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`. + string parent = 1 [ + (google.api.field_behavior) = REQUIRED, + (google.api.resource_reference) = { + type: "cloudresourcemanager.googleapis.com/Project" + } + ]; + + // Optional. The maximum number of results to be returned in a single page. If + // set to 0, the server decides the number of results to return. If the + // number is greater than 25000, it is capped at 25000. + int32 page_size = 2 [(google.api.field_behavior) = OPTIONAL]; + + // Optional. Pagination token, returned earlier via + // [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token]. + string page_token = 3 [(google.api.field_behavior) = OPTIONAL]; +} + +// Response message for [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets]. +message ListSecretsResponse { + // The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest + // first). + repeated Secret secrets = 1; + + // A token to retrieve the next page of results. Pass this value in + // [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page. + string next_page_token = 2; + + // The total number of [Secrets][google.cloud.secrets.v1beta1.Secret]. + int32 total_size = 3; +} + +// Request message for [SecretManagerService.CreateSecret][google.cloud.secrets.v1beta1.SecretManagerService.CreateSecret]. +message CreateSecretRequest { + // Required. The resource name of the project to associate with the + // [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`. + string parent = 1 [ + (google.api.field_behavior) = REQUIRED, + (google.api.resource_reference) = { + type: "cloudresourcemanager.googleapis.com/Project" + } + ]; + + // Required. This must be unique within the project. + string secret_id = 2 [(google.api.field_behavior) = REQUIRED]; + + // A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values. + Secret secret = 3; +} + +// Request message for [SecretManagerService.AddSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AddSecretVersion]. +message AddSecretVersionRequest { + // Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the + // [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`. + string parent = 1 [ + (google.api.field_behavior) = REQUIRED, + (google.api.resource_reference) = { + type: "secretmanager.googleapis.com/Secret" + } + ]; + + // Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + SecretPayload payload = 2 [(google.api.field_behavior) = REQUIRED]; +} + +// Request message for [SecretManagerService.GetSecret][google.cloud.secrets.v1beta1.SecretManagerService.GetSecret]. +message GetSecretRequest { + // Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`. + string name = 1 [ + (google.api.field_behavior) = REQUIRED, + (google.api.resource_reference) = { + type: "secretmanager.googleapis.com/Secret" + } + ]; +} + +// Request message for [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions]. +message ListSecretVersionsRequest { + // Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the + // [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format + // `projects/*/secrets/*`. + string parent = 1 [ + (google.api.field_behavior) = REQUIRED, + (google.api.resource_reference) = { + type: "secretmanager.googleapis.com/Secret" + } + ]; + + // Optional. The maximum number of results to be returned in a single page. If + // set to 0, the server decides the number of results to return. If the + // number is greater than 25000, it is capped at 25000. + int32 page_size = 2 [(google.api.field_behavior) = OPTIONAL]; + + // Optional. Pagination token, returned earlier via + // ListSecretVersionsResponse.next_page_token][]. + string page_token = 3 [(google.api.field_behavior) = OPTIONAL]; +} + +// Response message for [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions]. +message ListSecretVersionsResponse { + // The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by + // create_time (newest first). + repeated SecretVersion versions = 1; + + // A token to retrieve the next page of results. Pass this value in + // [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page. + string next_page_token = 2; + + // The total number of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. + int32 total_size = 3; +} + +// Request message for [SecretManagerService.GetSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.GetSecretVersion]. +message GetSecretVersionRequest { + // Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format + // `projects/*/secrets/*/versions/*`. + // `projects/*/secrets/*/versions/latest` is an alias to the `latest` + // [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + string name = 1 [ + (google.api.field_behavior) = REQUIRED, + (google.api.resource_reference) = { + type: "secretmanager.googleapis.com/SecretVersion" + } + ]; +} + +// Request message for [SecretManagerService.UpdateSecret][google.cloud.secrets.v1beta1.SecretManagerService.UpdateSecret]. +message UpdateSecretRequest { + // Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values. + Secret secret = 1 [(google.api.field_behavior) = REQUIRED]; + + // Required. Specifies the fields to be updated. + google.protobuf.FieldMask update_mask = 2 [(google.api.field_behavior) = REQUIRED]; +} + +// Request message for [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion]. +message AccessSecretVersionRequest { + // Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format + // `projects/*/secrets/*/versions/*`. + string name = 1 [ + (google.api.field_behavior) = REQUIRED, + (google.api.resource_reference) = { + type: "secretmanager.googleapis.com/SecretVersion" + } + ]; +} + +// Response message for [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion]. +message AccessSecretVersionResponse { + // The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format + // `projects/*/secrets/*/versions/*`. + string name = 1 [(google.api.resource_reference) = { + type: "secretmanager.googleapis.com/SecretVersion" + }]; + + // Secret payload + SecretPayload payload = 2; +} + +// Request message for [SecretManagerService.DeleteSecret][google.cloud.secrets.v1beta1.SecretManagerService.DeleteSecret]. +message DeleteSecretRequest { + // Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format + // `projects/*/secrets/*`. + string name = 1 [ + (google.api.field_behavior) = REQUIRED, + (google.api.resource_reference) = { + type: "secretmanager.googleapis.com/Secret" + } + ]; +} + +// Request message for [SecretManagerService.DisableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DisableSecretVersion]. +message DisableSecretVersionRequest { + // Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format + // `projects/*/secrets/*/versions/*`. + string name = 1 [ + (google.api.field_behavior) = REQUIRED, + (google.api.resource_reference) = { + type: "secretmanager.googleapis.com/SecretVersion" + } + ]; +} + +// Request message for [SecretManagerService.EnableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.EnableSecretVersion]. +message EnableSecretVersionRequest { + // Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format + // `projects/*/secrets/*/versions/*`. + string name = 1 [ + (google.api.field_behavior) = REQUIRED, + (google.api.resource_reference) = { + type: "secretmanager.googleapis.com/SecretVersion" + } + ]; +} + +// Request message for [SecretManagerService.DestroySecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DestroySecretVersion]. +message DestroySecretVersionRequest { + // Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format + // `projects/*/secrets/*/versions/*`. + string name = 1 [ + (google.api.field_behavior) = REQUIRED, + (google.api.resource_reference) = { + type: "secretmanager.googleapis.com/SecretVersion" + } + ]; +} diff --git a/renovate.json b/renovate.json new file mode 100644 index 00000000..99810470 --- /dev/null +++ b/renovate.json @@ -0,0 +1,27 @@ +{ + "extends": [ + "config:base" + ], + "ignoreDeps": [], + "packageRules": [ + { + "managers": ["maven"], + "packageNames": ["com.google.guava:guava*"], + "versionScheme": "docker" + }, + { + "packagePatterns": ["^io.grpc:grpc-"], + "groupName": "gRPC packages" + }, + { + "packagePatterns": ["^com.google.protobuf:protobuf-"], + "groupName": "Protobuf packages" + }, + { + "packagePatterns": ["^io.opencensus:opencensus-"], + "groupName": "OpenCensus packages" + } + ], + "semanticCommits": true, + "semanticCommitType": "deps" +} diff --git a/synth.metadata b/synth.metadata new file mode 100644 index 00000000..a0b07c2d --- /dev/null +++ b/synth.metadata @@ -0,0 +1,31 @@ +{ + "updateTime": "2019-12-10T17:59:32.592497Z", + "sources": [ + { + "git": { + "name": "googleapis", + "remote": "https://github.com/googleapis/googleapis.git", + "sha": "6cc9499e225a4f6a5e34fe07e390f67055d7991c", + "internalRef": "284643689" + } + }, + { + "template": { + "name": "java_library", + "origin": "synthtool.gcp", + "version": "2019.10.17" + } + } + ], + "destinations": [ + { + "client": { + "source": "googleapis", + "apiName": "secretmanager", + "apiVersion": "v1beta1", + "language": "java", + "generator": "bazel" + } + } + ] +} \ No newline at end of file diff --git a/synth.py b/synth.py new file mode 100644 index 00000000..2b172379 --- /dev/null +++ b/synth.py @@ -0,0 +1,40 @@ +# Copyright 2018 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +"""This script is used to synthesize generated parts of this library.""" + +import synthtool as s +import synthtool.gcp as gcp +import synthtool.languages.java as java + +gapic = gcp.GAPICBazel() + +service = 'secretmanager' +versions = ['v1beta1'] + +for version in versions: + library = java.bazel_library( + service=service, + version=version, + package_pattern='com.google.cloud.secrets.{version}', + gapic=gapic, + proto_path=f'google/cloud/secrets/{version}', + bazel_target=f'//google/cloud/secrets/{version}:google-cloud-{service}-{version}-java', + ) + +common_templates = gcp.CommonTemplates() +templates = common_templates.java_library() +s.copy(templates, excludes=[ + # 'README.md', +]) \ No newline at end of file diff --git a/versions.txt b/versions.txt new file mode 100644 index 00000000..2a8d1f48 --- /dev/null +++ b/versions.txt @@ -0,0 +1,6 @@ +# Format: +# module:released-version:current-version + +proto-google-cloud-secretmanager-v1beta1:0.0.0:0.0.1-SNAPSHOT +grpc-google-cloud-secretmanager-v1beta1:0.0.0:0.0.1-SNAPSHOT +google-cloud-secretmanager:0.0.0:0.0.1-SNAPSHOT \ No newline at end of file