From b0d790f5ee63d7e00ceeef8a08cd80cf20a06e94 Mon Sep 17 00:00:00 2001 From: Yoshi Automation Bot Date: Tue, 12 May 2020 10:12:04 -0700 Subject: [PATCH] docs(regen): update generated documentation (#126) This PR was generated using Autosynth. :rainbow: Synth log will be available here: https://source.cloud.google.com/results/invocations/ceea7185-8991-4321-ac64-03d9792fe72a/targets PiperOrigin-RevId: 310213770 Source-Link: https://github.com/googleapis/googleapis/commit/839fae42335ee1bb1e70767f3e6c51738683892b --- .github/workflows/ci.yaml | 76 ++++++ .kokoro/build.bat | 2 +- .../v1beta1/SecretManagerServiceClient.java | 10 +- .../v1beta1/CreateSecretRequest.java | 72 ++++-- .../v1beta1/CreateSecretRequestOrBuilder.java | 18 +- .../secretmanager/v1beta1/ServiceProto.java | 224 +++++++++--------- .../cloud/secrets/v1beta1/resources.proto | 5 +- .../cloud/secrets/v1beta1/service.proto | 9 +- synth.metadata | 8 +- 9 files changed, 267 insertions(+), 157 deletions(-) create mode 100644 .github/workflows/ci.yaml diff --git a/.github/workflows/ci.yaml b/.github/workflows/ci.yaml new file mode 100644 index 00000000..445b4bf8 --- /dev/null +++ b/.github/workflows/ci.yaml @@ -0,0 +1,76 @@ +on: + push: + branches: + - master + pull_request: +name: ci +jobs: + units: + runs-on: ubuntu-latest + strategy: + matrix: + java: [7, 8, 11] + steps: + - uses: actions/checkout@v2 + - uses: actions/setup-java@v1 + with: + java-version: ${{matrix.java}} + - run: java -version + - run: .kokoro/build.sh + env: + JOB_TYPE: test + - name: coverage + uses: codecov/codecov-action@v1 + with: + name: actions ${{matrix.java}} + windows: + runs-on: windows-latest + steps: + - uses: actions/checkout@v2 + - uses: actions/setup-java@v1 + with: + java-version: 8 + - run: java -version + - run: .kokoro/build.bat + env: + JOB_TYPE: test + dependencies: + runs-on: ubuntu-latest + steps: + - uses: actions/checkout@v2 + - uses: actions/setup-java@v1 + with: + java-version: 8 + - run: java -version + - run: .kokoro/dependencies.sh + linkage-monitor: + runs-on: ubuntu-latest + steps: + - uses: actions/checkout@v2 + - uses: actions/setup-java@v1 + with: + java-version: 8 + - run: java -version + - run: .kokoro/linkage-monitor.sh + lint: + runs-on: ubuntu-latest + steps: + - uses: actions/checkout@v2 + - uses: actions/setup-java@v1 + with: + java-version: 8 + - run: java -version + - run: .kokoro/build.sh + env: + JOB_TYPE: lint + clirr: + runs-on: ubuntu-latest + steps: + - uses: actions/checkout@v2 + - uses: actions/setup-java@v1 + with: + java-version: 8 + - run: java -version + - run: .kokoro/build.sh + env: + JOB_TYPE: clirr \ No newline at end of file diff --git a/.kokoro/build.bat b/.kokoro/build.bat index a3241eb9..05826ad9 100644 --- a/.kokoro/build.bat +++ b/.kokoro/build.bat @@ -1,3 +1,3 @@ :: See documentation in type-shell-output.bat -"C:\Program Files\Git\bin\bash.exe" github/java-secretmanager/.kokoro/build.sh +"C:\Program Files\Git\bin\bash.exe" %~dp0build.sh diff --git a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceClient.java b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceClient.java index 3a8e7b1c..7224c5fb 100644 --- a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceClient.java +++ b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceClient.java @@ -323,7 +323,8 @@ public final UnaryCallable listSecretsC *

A secret ID is a string with a maximum length of 255 characters and can contain * uppercase and lowercase letters, numerals, and the hyphen (`-`) and underscore (`_`) * characters. - * @param secret A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values. + * @param secret Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field + * values. * @throws com.google.api.gax.rpc.ApiException if the remote call fails */ public final Secret createSecret(ProjectName parent, String secretId, Secret secret) { @@ -358,7 +359,8 @@ public final Secret createSecret(ProjectName parent, String secretId, Secret sec *

A secret ID is a string with a maximum length of 255 characters and can contain * uppercase and lowercase letters, numerals, and the hyphen (`-`) and underscore (`_`) * characters. - * @param secret A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values. + * @param secret Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field + * values. * @throws com.google.api.gax.rpc.ApiException if the remote call fails */ public final Secret createSecret(String parent, String secretId, Secret secret) { @@ -382,9 +384,11 @@ public final Secret createSecret(String parent, String secretId, Secret secret) * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) { * ProjectName parent = ProjectName.of("[PROJECT]"); * String secretId = ""; + * Secret secret = Secret.newBuilder().build(); * CreateSecretRequest request = CreateSecretRequest.newBuilder() * .setParent(parent.toString()) * .setSecretId(secretId) + * .setSecret(secret) * .build(); * Secret response = secretManagerServiceClient.createSecret(request); * } @@ -408,9 +412,11 @@ public final Secret createSecret(CreateSecretRequest request) { * try (SecretManagerServiceClient secretManagerServiceClient = SecretManagerServiceClient.create()) { * ProjectName parent = ProjectName.of("[PROJECT]"); * String secretId = ""; + * Secret secret = Secret.newBuilder().build(); * CreateSecretRequest request = CreateSecretRequest.newBuilder() * .setParent(parent.toString()) * .setSecretId(secretId) + * .setSecret(secret) * .build(); * ApiFuture<Secret> future = secretManagerServiceClient.createSecretCallable().futureCall(request); * // Do something diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/CreateSecretRequest.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/CreateSecretRequest.java index d33dbf8f..320b0c7a 100644 --- a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/CreateSecretRequest.java +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/CreateSecretRequest.java @@ -247,10 +247,12 @@ public com.google.protobuf.ByteString getSecretIdBytes() { * * *

-   * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+   * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
    * 
* - * .google.cloud.secrets.v1beta1.Secret secret = 3; + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * * * @return Whether the secret field is set. */ @@ -261,10 +263,12 @@ public boolean hasSecret() { * * *
-   * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+   * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
    * 
* - * .google.cloud.secrets.v1beta1.Secret secret = 3; + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * * * @return The secret. */ @@ -277,10 +281,12 @@ public com.google.cloud.secretmanager.v1beta1.Secret getSecret() { * * *
-   * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+   * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
    * 
* - * .google.cloud.secrets.v1beta1.Secret secret = 3; + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * */ public com.google.cloud.secretmanager.v1beta1.SecretOrBuilder getSecretOrBuilder() { return getSecret(); @@ -901,10 +907,12 @@ public Builder setSecretIdBytes(com.google.protobuf.ByteString value) { * * *
-     * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
      * 
* - * .google.cloud.secrets.v1beta1.Secret secret = 3; + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * * * @return Whether the secret field is set. */ @@ -915,10 +923,12 @@ public boolean hasSecret() { * * *
-     * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
      * 
* - * .google.cloud.secrets.v1beta1.Secret secret = 3; + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * * * @return The secret. */ @@ -935,10 +945,12 @@ public com.google.cloud.secretmanager.v1beta1.Secret getSecret() { * * *
-     * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
      * 
* - * .google.cloud.secrets.v1beta1.Secret secret = 3; + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * */ public Builder setSecret(com.google.cloud.secretmanager.v1beta1.Secret value) { if (secretBuilder_ == null) { @@ -957,10 +969,12 @@ public Builder setSecret(com.google.cloud.secretmanager.v1beta1.Secret value) { * * *
-     * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
      * 
* - * .google.cloud.secrets.v1beta1.Secret secret = 3; + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * */ public Builder setSecret( com.google.cloud.secretmanager.v1beta1.Secret.Builder builderForValue) { @@ -977,10 +991,12 @@ public Builder setSecret( * * *
-     * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
      * 
* - * .google.cloud.secrets.v1beta1.Secret secret = 3; + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * */ public Builder mergeSecret(com.google.cloud.secretmanager.v1beta1.Secret value) { if (secretBuilder_ == null) { @@ -1003,10 +1019,12 @@ public Builder mergeSecret(com.google.cloud.secretmanager.v1beta1.Secret value) * * *
-     * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
      * 
* - * .google.cloud.secrets.v1beta1.Secret secret = 3; + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * */ public Builder clearSecret() { if (secretBuilder_ == null) { @@ -1023,10 +1041,12 @@ public Builder clearSecret() { * * *
-     * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
      * 
* - * .google.cloud.secrets.v1beta1.Secret secret = 3; + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * */ public com.google.cloud.secretmanager.v1beta1.Secret.Builder getSecretBuilder() { @@ -1037,10 +1057,12 @@ public com.google.cloud.secretmanager.v1beta1.Secret.Builder getSecretBuilder() * * *
-     * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
      * 
* - * .google.cloud.secrets.v1beta1.Secret secret = 3; + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * */ public com.google.cloud.secretmanager.v1beta1.SecretOrBuilder getSecretOrBuilder() { if (secretBuilder_ != null) { @@ -1055,10 +1077,12 @@ public com.google.cloud.secretmanager.v1beta1.SecretOrBuilder getSecretOrBuilder * * *
-     * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
      * 
* - * .google.cloud.secrets.v1beta1.Secret secret = 3; + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * */ private com.google.protobuf.SingleFieldBuilderV3< com.google.cloud.secretmanager.v1beta1.Secret, diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/CreateSecretRequestOrBuilder.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/CreateSecretRequestOrBuilder.java index 0215e482..c2057fba 100644 --- a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/CreateSecretRequestOrBuilder.java +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/CreateSecretRequestOrBuilder.java @@ -89,10 +89,12 @@ public interface CreateSecretRequestOrBuilder * * *
-   * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+   * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
    * 
* - * .google.cloud.secrets.v1beta1.Secret secret = 3; + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * * * @return Whether the secret field is set. */ @@ -101,10 +103,12 @@ public interface CreateSecretRequestOrBuilder * * *
-   * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+   * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
    * 
* - * .google.cloud.secrets.v1beta1.Secret secret = 3; + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * * * @return The secret. */ @@ -113,10 +117,12 @@ public interface CreateSecretRequestOrBuilder * * *
-   * A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+   * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
    * 
* - * .google.cloud.secrets.v1beta1.Secret secret = 3; + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * */ com.google.cloud.secretmanager.v1beta1.SecretOrBuilder getSecretOrBuilder(); } diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ServiceProto.java b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ServiceProto.java index 14f07b9c..f986f07b 100644 --- a/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ServiceProto.java +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ServiceProto.java @@ -111,123 +111,123 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() { + "ge_token\030\003 \001(\tB\003\340A\001\"y\n\023ListSecretsRespon" + "se\0225\n\007secrets\030\001 \003(\0132$.google.cloud.secre" + "ts.v1beta1.Secret\022\027\n\017next_page_token\030\002 \001" - + "(\t\022\022\n\ntotal_size\030\003 \001(\005\"\250\001\n\023CreateSecretR" + + "(\t\022\022\n\ntotal_size\030\003 \001(\005\"\255\001\n\023CreateSecretR" + "equest\022C\n\006parent\030\001 \001(\tB3\340A\002\372A-\n+cloudres" + "ourcemanager.googleapis.com/Project\022\026\n\ts" - + "ecret_id\030\002 \001(\tB\003\340A\002\0224\n\006secret\030\003 \001(\0132$.go" - + "ogle.cloud.secrets.v1beta1.Secret\"\231\001\n\027Ad" - + "dSecretVersionRequest\022;\n\006parent\030\001 \001(\tB+\340" - + "A\002\372A%\n#secretmanager.googleapis.com/Secr" - + "et\022A\n\007payload\030\002 \001(\0132+.google.cloud.secre" - + "ts.v1beta1.SecretPayloadB\003\340A\002\"M\n\020GetSecr" - + "etRequest\0229\n\004name\030\001 \001(\tB+\340A\002\372A%\n#secretm" - + "anager.googleapis.com/Secret\"\211\001\n\031ListSec" - + "retVersionsRequest\022;\n\006parent\030\001 \001(\tB+\340A\002\372" - + "A%\n#secretmanager.googleapis.com/Secret\022" - + "\026\n\tpage_size\030\002 \001(\005B\003\340A\001\022\027\n\npage_token\030\003 " - + "\001(\tB\003\340A\001\"\210\001\n\032ListSecretVersionsResponse\022" - + "=\n\010versions\030\001 \003(\0132+.google.cloud.secrets" - + ".v1beta1.SecretVersion\022\027\n\017next_page_toke" - + "n\030\002 \001(\t\022\022\n\ntotal_size\030\003 \001(\005\"[\n\027GetSecret" - + "VersionRequest\022@\n\004name\030\001 \001(\tB2\340A\002\372A,\n*se" - + "cretmanager.googleapis.com/SecretVersion" - + "\"\206\001\n\023UpdateSecretRequest\0229\n\006secret\030\001 \001(\013" - + "2$.google.cloud.secrets.v1beta1.SecretB\003" - + "\340A\002\0224\n\013update_mask\030\002 \001(\0132\032.google.protob" - + "uf.FieldMaskB\003\340A\002\"^\n\032AccessSecretVersion" - + "Request\022@\n\004name\030\001 \001(\tB2\340A\002\372A,\n*secretman" - + "ager.googleapis.com/SecretVersion\"\232\001\n\033Ac" - + "cessSecretVersionResponse\022=\n\004name\030\001 \001(\tB" - + "/\372A,\n*secretmanager.googleapis.com/Secre" - + "tVersion\022<\n\007payload\030\002 \001(\0132+.google.cloud" - + ".secrets.v1beta1.SecretPayload\"P\n\023Delete" - + "SecretRequest\0229\n\004name\030\001 \001(\tB+\340A\002\372A%\n#sec" - + "retmanager.googleapis.com/Secret\"_\n\033Disa" - + "bleSecretVersionRequest\022@\n\004name\030\001 \001(\tB2\340" - + "A\002\372A,\n*secretmanager.googleapis.com/Secr" - + "etVersion\"^\n\032EnableSecretVersionRequest\022" - + "@\n\004name\030\001 \001(\tB2\340A\002\372A,\n*secretmanager.goo" - + "gleapis.com/SecretVersion\"_\n\033DestroySecr" - + "etVersionRequest\022@\n\004name\030\001 \001(\tB2\340A\002\372A,\n*" - + "secretmanager.googleapis.com/SecretVersi" - + "on2\203\026\n\024SecretManagerService\022\251\001\n\013ListSecr" - + "ets\0220.google.cloud.secrets.v1beta1.ListS" - + "ecretsRequest\0321.google.cloud.secrets.v1b" - + "eta1.ListSecretsResponse\"5\202\323\344\223\002&\022$/v1bet" - + "a1/{parent=projects/*}/secrets\332A\006parent\022" - + "\267\001\n\014CreateSecret\0221.google.cloud.secrets." - + "v1beta1.CreateSecretRequest\032$.google.clo" - + "ud.secrets.v1beta1.Secret\"N\202\323\344\223\002.\"$/v1be" - + "ta1/{parent=projects/*}/secrets:\006secret\332" - + "A\027parent,secret_id,secret\022\305\001\n\020AddSecretV" - + "ersion\0225.google.cloud.secrets.v1beta1.Ad" - + "dSecretVersionRequest\032+.google.cloud.sec" - + "rets.v1beta1.SecretVersion\"M\202\323\344\223\0026\"1/v1b" - + "eta1/{parent=projects/*/secrets/*}:addVe" - + "rsion:\001*\332A\016parent,payload\022\226\001\n\tGetSecret\022" - + "..google.cloud.secrets.v1beta1.GetSecret" - + "Request\032$.google.cloud.secrets.v1beta1.S" - + "ecret\"3\202\323\344\223\002&\022$/v1beta1/{name=projects/*" - + "/secrets/*}\332A\004name\022\271\001\n\014UpdateSecret\0221.go" - + "ogle.cloud.secrets.v1beta1.UpdateSecretR" - + "equest\032$.google.cloud.secrets.v1beta1.Se" - + "cret\"P\202\323\344\223\00252+/v1beta1/{secret.name=proj" - + "ects/*/secrets/*}:\006secret\332A\022secret,updat" - + "e_mask\022\216\001\n\014DeleteSecret\0221.google.cloud.s" - + "ecrets.v1beta1.DeleteSecretRequest\032\026.goo" - + "gle.protobuf.Empty\"3\202\323\344\223\002&*$/v1beta1/{na" - + "me=projects/*/secrets/*}\332A\004name\022\311\001\n\022List" - + "SecretVersions\0227.google.cloud.secrets.v1" - + "beta1.ListSecretVersionsRequest\0328.google" - + ".cloud.secrets.v1beta1.ListSecretVersion" - + "sResponse\"@\202\323\344\223\0021\022//v1beta1/{parent=proj" - + "ects/*/secrets/*}/versions\332A\006parent\022\266\001\n\020" - + "GetSecretVersion\0225.google.cloud.secrets." - + "v1beta1.GetSecretVersionRequest\032+.google" - + ".cloud.secrets.v1beta1.SecretVersion\">\202\323" - + "\344\223\0021\022//v1beta1/{name=projects/*/secrets/" - + "*/versions/*}\332A\004name\022\321\001\n\023AccessSecretVer" - + "sion\0228.google.cloud.secrets.v1beta1.Acce" - + "ssSecretVersionRequest\0329.google.cloud.se" - + "crets.v1beta1.AccessSecretVersionRespons" - + "e\"E\202\323\344\223\0028\0226/v1beta1/{name=projects/*/sec" - + "rets/*/versions/*}:access\332A\004name\022\311\001\n\024Dis" - + "ableSecretVersion\0229.google.cloud.secrets" - + ".v1beta1.DisableSecretVersionRequest\032+.g" + + "ecret_id\030\002 \001(\tB\003\340A\002\0229\n\006secret\030\003 \001(\0132$.go" + + "ogle.cloud.secrets.v1beta1.SecretB\003\340A\002\"\231" + + "\001\n\027AddSecretVersionRequest\022;\n\006parent\030\001 \001" + + "(\tB+\340A\002\372A%\n#secretmanager.googleapis.com" + + "/Secret\022A\n\007payload\030\002 \001(\0132+.google.cloud." + + "secrets.v1beta1.SecretPayloadB\003\340A\002\"M\n\020Ge" + + "tSecretRequest\0229\n\004name\030\001 \001(\tB+\340A\002\372A%\n#se" + + "cretmanager.googleapis.com/Secret\"\211\001\n\031Li" + + "stSecretVersionsRequest\022;\n\006parent\030\001 \001(\tB" + + "+\340A\002\372A%\n#secretmanager.googleapis.com/Se" + + "cret\022\026\n\tpage_size\030\002 \001(\005B\003\340A\001\022\027\n\npage_tok" + + "en\030\003 \001(\tB\003\340A\001\"\210\001\n\032ListSecretVersionsResp" + + "onse\022=\n\010versions\030\001 \003(\0132+.google.cloud.se" + + "crets.v1beta1.SecretVersion\022\027\n\017next_page" + + "_token\030\002 \001(\t\022\022\n\ntotal_size\030\003 \001(\005\"[\n\027GetS" + + "ecretVersionRequest\022@\n\004name\030\001 \001(\tB2\340A\002\372A" + + ",\n*secretmanager.googleapis.com/SecretVe" + + "rsion\"\206\001\n\023UpdateSecretRequest\0229\n\006secret\030" + + "\001 \001(\0132$.google.cloud.secrets.v1beta1.Sec" + + "retB\003\340A\002\0224\n\013update_mask\030\002 \001(\0132\032.google.p" + + "rotobuf.FieldMaskB\003\340A\002\"^\n\032AccessSecretVe" + + "rsionRequest\022@\n\004name\030\001 \001(\tB2\340A\002\372A,\n*secr" + + "etmanager.googleapis.com/SecretVersion\"\232" + + "\001\n\033AccessSecretVersionResponse\022=\n\004name\030\001" + + " \001(\tB/\372A,\n*secretmanager.googleapis.com/" + + "SecretVersion\022<\n\007payload\030\002 \001(\0132+.google." + + "cloud.secrets.v1beta1.SecretPayload\"P\n\023D" + + "eleteSecretRequest\0229\n\004name\030\001 \001(\tB+\340A\002\372A%" + + "\n#secretmanager.googleapis.com/Secret\"_\n" + + "\033DisableSecretVersionRequest\022@\n\004name\030\001 \001" + + "(\tB2\340A\002\372A,\n*secretmanager.googleapis.com" + + "/SecretVersion\"^\n\032EnableSecretVersionReq" + + "uest\022@\n\004name\030\001 \001(\tB2\340A\002\372A,\n*secretmanage" + + "r.googleapis.com/SecretVersion\"_\n\033Destro" + + "ySecretVersionRequest\022@\n\004name\030\001 \001(\tB2\340A\002" + + "\372A,\n*secretmanager.googleapis.com/Secret" + + "Version2\203\026\n\024SecretManagerService\022\251\001\n\013Lis" + + "tSecrets\0220.google.cloud.secrets.v1beta1." + + "ListSecretsRequest\0321.google.cloud.secret" + + "s.v1beta1.ListSecretsResponse\"5\202\323\344\223\002&\022$/" + + "v1beta1/{parent=projects/*}/secrets\332A\006pa" + + "rent\022\267\001\n\014CreateSecret\0221.google.cloud.sec" + + "rets.v1beta1.CreateSecretRequest\032$.googl" + + "e.cloud.secrets.v1beta1.Secret\"N\202\323\344\223\002.\"$" + + "/v1beta1/{parent=projects/*}/secrets:\006se" + + "cret\332A\027parent,secret_id,secret\022\305\001\n\020AddSe" + + "cretVersion\0225.google.cloud.secrets.v1bet" + + "a1.AddSecretVersionRequest\032+.google.clou" + + "d.secrets.v1beta1.SecretVersion\"M\202\323\344\223\0026\"" + + "1/v1beta1/{parent=projects/*/secrets/*}:" + + "addVersion:\001*\332A\016parent,payload\022\226\001\n\tGetSe" + + "cret\022..google.cloud.secrets.v1beta1.GetS" + + "ecretRequest\032$.google.cloud.secrets.v1be" + + "ta1.Secret\"3\202\323\344\223\002&\022$/v1beta1/{name=proje" + + "cts/*/secrets/*}\332A\004name\022\271\001\n\014UpdateSecret" + + "\0221.google.cloud.secrets.v1beta1.UpdateSe" + + "cretRequest\032$.google.cloud.secrets.v1bet" + + "a1.Secret\"P\202\323\344\223\00252+/v1beta1/{secret.name" + + "=projects/*/secrets/*}:\006secret\332A\022secret," + + "update_mask\022\216\001\n\014DeleteSecret\0221.google.cl" + + "oud.secrets.v1beta1.DeleteSecretRequest\032" + + "\026.google.protobuf.Empty\"3\202\323\344\223\002&*$/v1beta" + + "1/{name=projects/*/secrets/*}\332A\004name\022\311\001\n" + + "\022ListSecretVersions\0227.google.cloud.secre" + + "ts.v1beta1.ListSecretVersionsRequest\0328.g" + + "oogle.cloud.secrets.v1beta1.ListSecretVe" + + "rsionsResponse\"@\202\323\344\223\0021\022//v1beta1/{parent" + + "=projects/*/secrets/*}/versions\332A\006parent" + + "\022\266\001\n\020GetSecretVersion\0225.google.cloud.sec" + + "rets.v1beta1.GetSecretVersionRequest\032+.g" + "oogle.cloud.secrets.v1beta1.SecretVersio" - + "n\"I\202\323\344\223\002<\"7/v1beta1/{name=projects/*/sec" - + "rets/*/versions/*}:disable:\001*\332A\004name\022\306\001\n" - + "\023EnableSecretVersion\0228.google.cloud.secr" - + "ets.v1beta1.EnableSecretVersionRequest\032+" - + ".google.cloud.secrets.v1beta1.SecretVers" - + "ion\"H\202\323\344\223\002;\"6/v1beta1/{name=projects/*/s" - + "ecrets/*/versions/*}:enable:\001*\332A\004name\022\311\001" - + "\n\024DestroySecretVersion\0229.google.cloud.se" - + "crets.v1beta1.DestroySecretVersionReques" + + "n\">\202\323\344\223\0021\022//v1beta1/{name=projects/*/sec" + + "rets/*/versions/*}\332A\004name\022\321\001\n\023AccessSecr" + + "etVersion\0228.google.cloud.secrets.v1beta1" + + ".AccessSecretVersionRequest\0329.google.clo" + + "ud.secrets.v1beta1.AccessSecretVersionRe" + + "sponse\"E\202\323\344\223\0028\0226/v1beta1/{name=projects/" + + "*/secrets/*/versions/*}:access\332A\004name\022\311\001" + + "\n\024DisableSecretVersion\0229.google.cloud.se" + + "crets.v1beta1.DisableSecretVersionReques" + "t\032+.google.cloud.secrets.v1beta1.SecretV" + "ersion\"I\202\323\344\223\002<\"7/v1beta1/{name=projects/" - + "*/secrets/*/versions/*}:destroy:\001*\332A\004nam" - + "e\022\213\001\n\014SetIamPolicy\022\".google.iam.v1.SetIa" - + "mPolicyRequest\032\025.google.iam.v1.Policy\"@\202" - + "\323\344\223\002:\"5/v1beta1/{resource=projects/*/sec" - + "rets/*}:setIamPolicy:\001*\022\210\001\n\014GetIamPolicy" - + "\022\".google.iam.v1.GetIamPolicyRequest\032\025.g" - + "oogle.iam.v1.Policy\"=\202\323\344\223\0027\0225/v1beta1/{r" - + "esource=projects/*/secrets/*}:getIamPoli" - + "cy\022\261\001\n\022TestIamPermissions\022(.google.iam.v" - + "1.TestIamPermissionsRequest\032).google.iam" - + ".v1.TestIamPermissionsResponse\"F\202\323\344\223\002@\";" - + "/v1beta1/{resource=projects/*/secrets/*}" - + ":testIamPermissions:\001*\032P\312A\034secretmanager" - + ".googleapis.com\322A.https://www.googleapis" - + ".com/auth/cloud-platformB\204\002\n&com.google." - + "cloud.secretmanager.v1beta1B\014ServiceProt" - + "oP\001ZOgoogle.golang.org/genproto/googleap" - + "is/cloud/secretmanager/v1beta1;secretman" - + "ager\370\001\001\242\002\003GSM\252\002\"Google.Cloud.SecretManag" - + "er.V1Beta1\312\002\"Google\\Cloud\\SecretManager\\" - + "V1beta1\352\002%Google::Cloud::SecretManager::" - + "V1beta1b\006proto3" + + "*/secrets/*/versions/*}:disable:\001*\332A\004nam" + + "e\022\306\001\n\023EnableSecretVersion\0228.google.cloud" + + ".secrets.v1beta1.EnableSecretVersionRequ" + + "est\032+.google.cloud.secrets.v1beta1.Secre" + + "tVersion\"H\202\323\344\223\002;\"6/v1beta1/{name=project" + + "s/*/secrets/*/versions/*}:enable:\001*\332A\004na" + + "me\022\311\001\n\024DestroySecretVersion\0229.google.clo" + + "ud.secrets.v1beta1.DestroySecretVersionR" + + "equest\032+.google.cloud.secrets.v1beta1.Se" + + "cretVersion\"I\202\323\344\223\002<\"7/v1beta1/{name=proj" + + "ects/*/secrets/*/versions/*}:destroy:\001*\332" + + "A\004name\022\213\001\n\014SetIamPolicy\022\".google.iam.v1." + + "SetIamPolicyRequest\032\025.google.iam.v1.Poli" + + "cy\"@\202\323\344\223\002:\"5/v1beta1/{resource=projects/" + + "*/secrets/*}:setIamPolicy:\001*\022\210\001\n\014GetIamP" + + "olicy\022\".google.iam.v1.GetIamPolicyReques" + + "t\032\025.google.iam.v1.Policy\"=\202\323\344\223\0027\0225/v1bet" + + "a1/{resource=projects/*/secrets/*}:getIa" + + "mPolicy\022\261\001\n\022TestIamPermissions\022(.google." + + "iam.v1.TestIamPermissionsRequest\032).googl" + + "e.iam.v1.TestIamPermissionsResponse\"F\202\323\344" + + "\223\002@\";/v1beta1/{resource=projects/*/secre" + + "ts/*}:testIamPermissions:\001*\032P\312A\034secretma" + + "nager.googleapis.com\322A.https://www.googl" + + "eapis.com/auth/cloud-platformB\204\002\n&com.go" + + "ogle.cloud.secretmanager.v1beta1B\014Servic" + + "eProtoP\001ZOgoogle.golang.org/genproto/goo" + + "gleapis/cloud/secretmanager/v1beta1;secr" + + "etmanager\370\001\001\242\002\003GSM\252\002\"Google.Cloud.Secret" + + "Manager.V1Beta1\312\002\"Google\\Cloud\\SecretMan" + + "ager\\V1beta1\352\002%Google::Cloud::SecretMana" + + "ger::V1beta1b\006proto3" }; descriptor = com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom( diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/resources.proto b/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/resources.proto index 3d2673e8..4819addd 100644 --- a/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/resources.proto +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/resources.proto @@ -1,4 +1,4 @@ -// Copyright 2019 Google LLC. +// Copyright 2020 Google LLC // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. @@ -11,7 +11,6 @@ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. -// syntax = "proto3"; @@ -25,12 +24,12 @@ import "google/api/annotations.proto"; option cc_enable_arenas = true; option csharp_namespace = "Google.Cloud.SecretManager.V1Beta1"; option go_package = "google.golang.org/genproto/googleapis/cloud/secretmanager/v1beta1;secretmanager"; -option ruby_package = "Google::Cloud::SecretManager::V1beta1"; option java_multiple_files = true; option java_outer_classname = "ResourcesProto"; option java_package = "com.google.cloud.secretmanager.v1beta1"; option objc_class_prefix = "GSM"; option php_namespace = "Google\\Cloud\\SecretManager\\V1beta1"; +option ruby_package = "Google::Cloud::SecretManager::V1beta1"; // A [Secret][google.cloud.secrets.v1beta1.Secret] is a logical secret whose value and versions can // be accessed. diff --git a/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/service.proto b/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/service.proto index ae96b9ed..9efb8cfc 100644 --- a/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/service.proto +++ b/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/service.proto @@ -1,4 +1,4 @@ -// Copyright 2019 Google LLC. +// Copyright 2020 Google LLC // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. @@ -11,7 +11,6 @@ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. -// syntax = "proto3"; @@ -30,12 +29,12 @@ import "google/protobuf/field_mask.proto"; option cc_enable_arenas = true; option csharp_namespace = "Google.Cloud.SecretManager.V1Beta1"; option go_package = "google.golang.org/genproto/googleapis/cloud/secretmanager/v1beta1;secretmanager"; -option ruby_package = "Google::Cloud::SecretManager::V1beta1"; option java_multiple_files = true; option java_outer_classname = "ServiceProto"; option java_package = "com.google.cloud.secretmanager.v1beta1"; option objc_class_prefix = "GSM"; option php_namespace = "Google\\Cloud\\SecretManager\\V1beta1"; +option ruby_package = "Google::Cloud::SecretManager::V1beta1"; // `projects/*/secrets/*/versions/latest` is an alias to the `latest` // [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. @@ -259,8 +258,8 @@ message CreateSecretRequest { // underscore (`_`) characters. string secret_id = 2 [(google.api.field_behavior) = REQUIRED]; - // A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values. - Secret secret = 3; + // Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values. + Secret secret = 3 [(google.api.field_behavior) = REQUIRED]; } // Request message for [SecretManagerService.AddSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AddSecretVersion]. diff --git a/synth.metadata b/synth.metadata index 9ed7080f..1ebed037 100644 --- a/synth.metadata +++ b/synth.metadata @@ -4,22 +4,22 @@ "git": { "name": ".", "remote": "https://github.com/googleapis/java-secretmanager.git", - "sha": "19de0d51a085dbe31088090b98960c2b7acebef2" + "sha": "efe745dd8e8966f284f47cb7958127892b4ce2e6" } }, { "git": { "name": "googleapis", "remote": "https://github.com/googleapis/googleapis.git", - "sha": "ee4ea76504aa60c2bff9b7c11269c155d8c21e0d", - "internalRef": "305619145" + "sha": "aed11c01e52921613b9ee469c2d85f5f33175fb7", + "internalRef": "310660461" } }, { "git": { "name": "synthtool", "remote": "https://github.com/googleapis/synthtool.git", - "sha": "f8a9933e5e98202b04ef427f28d1d79221190fa4" + "sha": "98c50772ec23295c64cf0d2ddf199ea52961fd4c" } } ],