diff --git a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClient.java b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClient.java index 50a2e34c..02c5007c 100644 --- a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClient.java +++ b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClient.java @@ -235,6 +235,7 @@ public final ListSecretsPagedResponse listSecrets(String parent) { * .setParent(ProjectName.of("[PROJECT]").toString()) * .setPageSize(883849137) * .setPageToken("pageToken873572522") + * .setFilter("filter-1274492040") * .build(); * for (Secret element : secretManagerServiceClient.listSecrets(request).iterateAll()) { * // doThingsWith(element); @@ -263,6 +264,7 @@ public final ListSecretsPagedResponse listSecrets(ListSecretsRequest request) { * .setParent(ProjectName.of("[PROJECT]").toString()) * .setPageSize(883849137) * .setPageToken("pageToken873572522") + * .setFilter("filter-1274492040") * .build(); * ApiFuture future = * secretManagerServiceClient.listSecretsPagedCallable().futureCall(request); @@ -292,6 +294,7 @@ public final ListSecretsPagedResponse listSecrets(ListSecretsRequest request) { * .setParent(ProjectName.of("[PROJECT]").toString()) * .setPageSize(883849137) * .setPageToken("pageToken873572522") + * .setFilter("filter-1274492040") * .build(); * while (true) { * ListSecretsResponse response = @@ -896,6 +899,7 @@ public final ListSecretVersionsPagedResponse listSecretVersions(String parent) { * .setParent(SecretName.of("[PROJECT]", "[SECRET]").toString()) * .setPageSize(883849137) * .setPageToken("pageToken873572522") + * .setFilter("filter-1274492040") * .build(); * for (SecretVersion element : * secretManagerServiceClient.listSecretVersions(request).iterateAll()) { @@ -927,6 +931,7 @@ public final ListSecretVersionsPagedResponse listSecretVersions( * .setParent(SecretName.of("[PROJECT]", "[SECRET]").toString()) * .setPageSize(883849137) * .setPageToken("pageToken873572522") + * .setFilter("filter-1274492040") * .build(); * ApiFuture future = * secretManagerServiceClient.listSecretVersionsPagedCallable().futureCall(request); @@ -957,6 +962,7 @@ public final ListSecretVersionsPagedResponse listSecretVersions( * .setParent(SecretName.of("[PROJECT]", "[SECRET]").toString()) * .setPageSize(883849137) * .setPageToken("pageToken873572522") + * .setFilter("filter-1274492040") * .build(); * while (true) { * ListSecretVersionsResponse response = diff --git a/proto-google-cloud-secretmanager-v1/src/main/java/com/google/cloud/secretmanager/v1/ListSecretVersionsRequest.java b/proto-google-cloud-secretmanager-v1/src/main/java/com/google/cloud/secretmanager/v1/ListSecretVersionsRequest.java index 4b76bff4..796b3238 100644 --- a/proto-google-cloud-secretmanager-v1/src/main/java/com/google/cloud/secretmanager/v1/ListSecretVersionsRequest.java +++ b/proto-google-cloud-secretmanager-v1/src/main/java/com/google/cloud/secretmanager/v1/ListSecretVersionsRequest.java @@ -40,6 +40,7 @@ private ListSecretVersionsRequest(com.google.protobuf.GeneratedMessageV3.Builder private ListSecretVersionsRequest() { parent_ = ""; pageToken_ = ""; + filter_ = ""; } @java.lang.Override @@ -90,6 +91,13 @@ private ListSecretVersionsRequest( pageToken_ = s; break; } + case 34: + { + java.lang.String s = input.readStringRequireUtf8(); + + filter_ = s; + break; + } default: { if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { @@ -252,6 +260,63 @@ public com.google.protobuf.ByteString getPageTokenBytes() { } } + public static final int FILTER_FIELD_NUMBER = 4; + private volatile java.lang.Object filter_; + /** + * + * + *
+   * Optional. Filter string, adhering to the rules in
+   * [List-operation
+   * filtering](https://cloud.google.com/secret-manager/docs/filtering). List
+   * only secret versions matching the filter. If filter is empty, all secret
+   * versions are listed.
+   * 
+ * + * string filter = 4 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The filter. + */ + @java.lang.Override + public java.lang.String getFilter() { + java.lang.Object ref = filter_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + filter_ = s; + return s; + } + } + /** + * + * + *
+   * Optional. Filter string, adhering to the rules in
+   * [List-operation
+   * filtering](https://cloud.google.com/secret-manager/docs/filtering). List
+   * only secret versions matching the filter. If filter is empty, all secret
+   * versions are listed.
+   * 
+ * + * string filter = 4 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The bytes for filter. + */ + @java.lang.Override + public com.google.protobuf.ByteString getFilterBytes() { + java.lang.Object ref = filter_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + filter_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + private byte memoizedIsInitialized = -1; @java.lang.Override @@ -275,6 +340,9 @@ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io if (!getPageTokenBytes().isEmpty()) { com.google.protobuf.GeneratedMessageV3.writeString(output, 3, pageToken_); } + if (!getFilterBytes().isEmpty()) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 4, filter_); + } unknownFields.writeTo(output); } @@ -293,6 +361,9 @@ public int getSerializedSize() { if (!getPageTokenBytes().isEmpty()) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(3, pageToken_); } + if (!getFilterBytes().isEmpty()) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(4, filter_); + } size += unknownFields.getSerializedSize(); memoizedSize = size; return size; @@ -312,6 +383,7 @@ public boolean equals(final java.lang.Object obj) { if (!getParent().equals(other.getParent())) return false; if (getPageSize() != other.getPageSize()) return false; if (!getPageToken().equals(other.getPageToken())) return false; + if (!getFilter().equals(other.getFilter())) return false; if (!unknownFields.equals(other.unknownFields)) return false; return true; } @@ -329,6 +401,8 @@ public int hashCode() { hash = (53 * hash) + getPageSize(); hash = (37 * hash) + PAGE_TOKEN_FIELD_NUMBER; hash = (53 * hash) + getPageToken().hashCode(); + hash = (37 * hash) + FILTER_FIELD_NUMBER; + hash = (53 * hash) + getFilter().hashCode(); hash = (29 * hash) + unknownFields.hashCode(); memoizedHashCode = hash; return hash; @@ -481,6 +555,8 @@ public Builder clear() { pageToken_ = ""; + filter_ = ""; + return this; } @@ -511,6 +587,7 @@ public com.google.cloud.secretmanager.v1.ListSecretVersionsRequest buildPartial( result.parent_ = parent_; result.pageSize_ = pageSize_; result.pageToken_ = pageToken_; + result.filter_ = filter_; onBuilt(); return result; } @@ -572,6 +649,10 @@ public Builder mergeFrom(com.google.cloud.secretmanager.v1.ListSecretVersionsReq pageToken_ = other.pageToken_; onChanged(); } + if (!other.getFilter().isEmpty()) { + filter_ = other.filter_; + onChanged(); + } this.mergeUnknownFields(other.unknownFields); onChanged(); return this; @@ -897,6 +978,132 @@ public Builder setPageTokenBytes(com.google.protobuf.ByteString value) { return this; } + private java.lang.Object filter_ = ""; + /** + * + * + *
+     * Optional. Filter string, adhering to the rules in
+     * [List-operation
+     * filtering](https://cloud.google.com/secret-manager/docs/filtering). List
+     * only secret versions matching the filter. If filter is empty, all secret
+     * versions are listed.
+     * 
+ * + * string filter = 4 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The filter. + */ + public java.lang.String getFilter() { + java.lang.Object ref = filter_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + filter_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Optional. Filter string, adhering to the rules in
+     * [List-operation
+     * filtering](https://cloud.google.com/secret-manager/docs/filtering). List
+     * only secret versions matching the filter. If filter is empty, all secret
+     * versions are listed.
+     * 
+ * + * string filter = 4 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The bytes for filter. + */ + public com.google.protobuf.ByteString getFilterBytes() { + java.lang.Object ref = filter_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + filter_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Optional. Filter string, adhering to the rules in
+     * [List-operation
+     * filtering](https://cloud.google.com/secret-manager/docs/filtering). List
+     * only secret versions matching the filter. If filter is empty, all secret
+     * versions are listed.
+     * 
+ * + * string filter = 4 [(.google.api.field_behavior) = OPTIONAL]; + * + * @param value The filter to set. + * @return This builder for chaining. + */ + public Builder setFilter(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + + filter_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * Optional. Filter string, adhering to the rules in
+     * [List-operation
+     * filtering](https://cloud.google.com/secret-manager/docs/filtering). List
+     * only secret versions matching the filter. If filter is empty, all secret
+     * versions are listed.
+     * 
+ * + * string filter = 4 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return This builder for chaining. + */ + public Builder clearFilter() { + + filter_ = getDefaultInstance().getFilter(); + onChanged(); + return this; + } + /** + * + * + *
+     * Optional. Filter string, adhering to the rules in
+     * [List-operation
+     * filtering](https://cloud.google.com/secret-manager/docs/filtering). List
+     * only secret versions matching the filter. If filter is empty, all secret
+     * versions are listed.
+     * 
+ * + * string filter = 4 [(.google.api.field_behavior) = OPTIONAL]; + * + * @param value The bytes for filter to set. + * @return This builder for chaining. + */ + public Builder setFilterBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + + filter_ = value; + onChanged(); + return this; + } + @java.lang.Override public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { return super.setUnknownFields(unknownFields); diff --git a/proto-google-cloud-secretmanager-v1/src/main/java/com/google/cloud/secretmanager/v1/ListSecretVersionsRequestOrBuilder.java b/proto-google-cloud-secretmanager-v1/src/main/java/com/google/cloud/secretmanager/v1/ListSecretVersionsRequestOrBuilder.java index f0371d60..65998a8a 100644 --- a/proto-google-cloud-secretmanager-v1/src/main/java/com/google/cloud/secretmanager/v1/ListSecretVersionsRequestOrBuilder.java +++ b/proto-google-cloud-secretmanager-v1/src/main/java/com/google/cloud/secretmanager/v1/ListSecretVersionsRequestOrBuilder.java @@ -97,4 +97,37 @@ public interface ListSecretVersionsRequestOrBuilder * @return The bytes for pageToken. */ com.google.protobuf.ByteString getPageTokenBytes(); + + /** + * + * + *
+   * Optional. Filter string, adhering to the rules in
+   * [List-operation
+   * filtering](https://cloud.google.com/secret-manager/docs/filtering). List
+   * only secret versions matching the filter. If filter is empty, all secret
+   * versions are listed.
+   * 
+ * + * string filter = 4 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The filter. + */ + java.lang.String getFilter(); + /** + * + * + *
+   * Optional. Filter string, adhering to the rules in
+   * [List-operation
+   * filtering](https://cloud.google.com/secret-manager/docs/filtering). List
+   * only secret versions matching the filter. If filter is empty, all secret
+   * versions are listed.
+   * 
+ * + * string filter = 4 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The bytes for filter. + */ + com.google.protobuf.ByteString getFilterBytes(); } diff --git a/proto-google-cloud-secretmanager-v1/src/main/java/com/google/cloud/secretmanager/v1/ListSecretsRequest.java b/proto-google-cloud-secretmanager-v1/src/main/java/com/google/cloud/secretmanager/v1/ListSecretsRequest.java index 74f76862..e434e6ba 100644 --- a/proto-google-cloud-secretmanager-v1/src/main/java/com/google/cloud/secretmanager/v1/ListSecretsRequest.java +++ b/proto-google-cloud-secretmanager-v1/src/main/java/com/google/cloud/secretmanager/v1/ListSecretsRequest.java @@ -40,6 +40,7 @@ private ListSecretsRequest(com.google.protobuf.GeneratedMessageV3.Builder bui private ListSecretsRequest() { parent_ = ""; pageToken_ = ""; + filter_ = ""; } @java.lang.Override @@ -90,6 +91,13 @@ private ListSecretsRequest( pageToken_ = s; break; } + case 34: + { + java.lang.String s = input.readStringRequireUtf8(); + + filter_ = s; + break; + } default: { if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { @@ -250,6 +258,63 @@ public com.google.protobuf.ByteString getPageTokenBytes() { } } + public static final int FILTER_FIELD_NUMBER = 4; + private volatile java.lang.Object filter_; + /** + * + * + *
+   * Optional. Filter string, adhering to the rules in
+   * [List-operation
+   * filtering](https://cloud.google.com/secret-manager/docs/filtering). List
+   * only secrets matching the filter. If filter is empty, all secrets are
+   * listed.
+   * 
+ * + * string filter = 4 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The filter. + */ + @java.lang.Override + public java.lang.String getFilter() { + java.lang.Object ref = filter_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + filter_ = s; + return s; + } + } + /** + * + * + *
+   * Optional. Filter string, adhering to the rules in
+   * [List-operation
+   * filtering](https://cloud.google.com/secret-manager/docs/filtering). List
+   * only secrets matching the filter. If filter is empty, all secrets are
+   * listed.
+   * 
+ * + * string filter = 4 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The bytes for filter. + */ + @java.lang.Override + public com.google.protobuf.ByteString getFilterBytes() { + java.lang.Object ref = filter_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + filter_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + private byte memoizedIsInitialized = -1; @java.lang.Override @@ -273,6 +338,9 @@ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io if (!getPageTokenBytes().isEmpty()) { com.google.protobuf.GeneratedMessageV3.writeString(output, 3, pageToken_); } + if (!getFilterBytes().isEmpty()) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 4, filter_); + } unknownFields.writeTo(output); } @@ -291,6 +359,9 @@ public int getSerializedSize() { if (!getPageTokenBytes().isEmpty()) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(3, pageToken_); } + if (!getFilterBytes().isEmpty()) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(4, filter_); + } size += unknownFields.getSerializedSize(); memoizedSize = size; return size; @@ -310,6 +381,7 @@ public boolean equals(final java.lang.Object obj) { if (!getParent().equals(other.getParent())) return false; if (getPageSize() != other.getPageSize()) return false; if (!getPageToken().equals(other.getPageToken())) return false; + if (!getFilter().equals(other.getFilter())) return false; if (!unknownFields.equals(other.unknownFields)) return false; return true; } @@ -327,6 +399,8 @@ public int hashCode() { hash = (53 * hash) + getPageSize(); hash = (37 * hash) + PAGE_TOKEN_FIELD_NUMBER; hash = (53 * hash) + getPageToken().hashCode(); + hash = (37 * hash) + FILTER_FIELD_NUMBER; + hash = (53 * hash) + getFilter().hashCode(); hash = (29 * hash) + unknownFields.hashCode(); memoizedHashCode = hash; return hash; @@ -478,6 +552,8 @@ public Builder clear() { pageToken_ = ""; + filter_ = ""; + return this; } @@ -508,6 +584,7 @@ public com.google.cloud.secretmanager.v1.ListSecretsRequest buildPartial() { result.parent_ = parent_; result.pageSize_ = pageSize_; result.pageToken_ = pageToken_; + result.filter_ = filter_; onBuilt(); return result; } @@ -569,6 +646,10 @@ public Builder mergeFrom(com.google.cloud.secretmanager.v1.ListSecretsRequest ot pageToken_ = other.pageToken_; onChanged(); } + if (!other.getFilter().isEmpty()) { + filter_ = other.filter_; + onChanged(); + } this.mergeUnknownFields(other.unknownFields); onChanged(); return this; @@ -889,6 +970,132 @@ public Builder setPageTokenBytes(com.google.protobuf.ByteString value) { return this; } + private java.lang.Object filter_ = ""; + /** + * + * + *
+     * Optional. Filter string, adhering to the rules in
+     * [List-operation
+     * filtering](https://cloud.google.com/secret-manager/docs/filtering). List
+     * only secrets matching the filter. If filter is empty, all secrets are
+     * listed.
+     * 
+ * + * string filter = 4 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The filter. + */ + public java.lang.String getFilter() { + java.lang.Object ref = filter_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + filter_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Optional. Filter string, adhering to the rules in
+     * [List-operation
+     * filtering](https://cloud.google.com/secret-manager/docs/filtering). List
+     * only secrets matching the filter. If filter is empty, all secrets are
+     * listed.
+     * 
+ * + * string filter = 4 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The bytes for filter. + */ + public com.google.protobuf.ByteString getFilterBytes() { + java.lang.Object ref = filter_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + filter_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Optional. Filter string, adhering to the rules in
+     * [List-operation
+     * filtering](https://cloud.google.com/secret-manager/docs/filtering). List
+     * only secrets matching the filter. If filter is empty, all secrets are
+     * listed.
+     * 
+ * + * string filter = 4 [(.google.api.field_behavior) = OPTIONAL]; + * + * @param value The filter to set. + * @return This builder for chaining. + */ + public Builder setFilter(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + + filter_ = value; + onChanged(); + return this; + } + /** + * + * + *
+     * Optional. Filter string, adhering to the rules in
+     * [List-operation
+     * filtering](https://cloud.google.com/secret-manager/docs/filtering). List
+     * only secrets matching the filter. If filter is empty, all secrets are
+     * listed.
+     * 
+ * + * string filter = 4 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return This builder for chaining. + */ + public Builder clearFilter() { + + filter_ = getDefaultInstance().getFilter(); + onChanged(); + return this; + } + /** + * + * + *
+     * Optional. Filter string, adhering to the rules in
+     * [List-operation
+     * filtering](https://cloud.google.com/secret-manager/docs/filtering). List
+     * only secrets matching the filter. If filter is empty, all secrets are
+     * listed.
+     * 
+ * + * string filter = 4 [(.google.api.field_behavior) = OPTIONAL]; + * + * @param value The bytes for filter to set. + * @return This builder for chaining. + */ + public Builder setFilterBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + + filter_ = value; + onChanged(); + return this; + } + @java.lang.Override public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { return super.setUnknownFields(unknownFields); diff --git a/proto-google-cloud-secretmanager-v1/src/main/java/com/google/cloud/secretmanager/v1/ListSecretsRequestOrBuilder.java b/proto-google-cloud-secretmanager-v1/src/main/java/com/google/cloud/secretmanager/v1/ListSecretsRequestOrBuilder.java index 73775df5..2f85d05b 100644 --- a/proto-google-cloud-secretmanager-v1/src/main/java/com/google/cloud/secretmanager/v1/ListSecretsRequestOrBuilder.java +++ b/proto-google-cloud-secretmanager-v1/src/main/java/com/google/cloud/secretmanager/v1/ListSecretsRequestOrBuilder.java @@ -95,4 +95,37 @@ public interface ListSecretsRequestOrBuilder * @return The bytes for pageToken. */ com.google.protobuf.ByteString getPageTokenBytes(); + + /** + * + * + *
+   * Optional. Filter string, adhering to the rules in
+   * [List-operation
+   * filtering](https://cloud.google.com/secret-manager/docs/filtering). List
+   * only secrets matching the filter. If filter is empty, all secrets are
+   * listed.
+   * 
+ * + * string filter = 4 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The filter. + */ + java.lang.String getFilter(); + /** + * + * + *
+   * Optional. Filter string, adhering to the rules in
+   * [List-operation
+   * filtering](https://cloud.google.com/secret-manager/docs/filtering). List
+   * only secrets matching the filter. If filter is empty, all secrets are
+   * listed.
+   * 
+ * + * string filter = 4 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The bytes for filter. + */ + com.google.protobuf.ByteString getFilterBytes(); } diff --git a/proto-google-cloud-secretmanager-v1/src/main/java/com/google/cloud/secretmanager/v1/ServiceProto.java b/proto-google-cloud-secretmanager-v1/src/main/java/com/google/cloud/secretmanager/v1/ServiceProto.java index 89b94c03..48e7a44f 100644 --- a/proto-google-cloud-secretmanager-v1/src/main/java/com/google/cloud/secretmanager/v1/ServiceProto.java +++ b/proto-google-cloud-secretmanager-v1/src/main/java/com/google/cloud/secretmanager/v1/ServiceProto.java @@ -105,129 +105,130 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() { + "google/iam/v1/iam_policy.proto\032\032google/i" + "am/v1/policy.proto\032\033google/protobuf/empt" + "y.proto\032 google/protobuf/field_mask.prot" - + "o\"\212\001\n\022ListSecretsRequest\022C\n\006parent\030\001 \001(\t" + + "o\"\237\001\n\022ListSecretsRequest\022C\n\006parent\030\001 \001(\t" + "B3\340A\002\372A-\n+cloudresourcemanager.googleapi" + "s.com/Project\022\026\n\tpage_size\030\002 \001(\005B\003\340A\001\022\027\n" - + "\npage_token\030\003 \001(\tB\003\340A\001\"z\n\023ListSecretsRes" - + "ponse\0226\n\007secrets\030\001 \003(\0132%.google.cloud.se" - + "cretmanager.v1.Secret\022\027\n\017next_page_token" - + "\030\002 \001(\t\022\022\n\ntotal_size\030\003 \001(\005\"\256\001\n\023CreateSec" - + "retRequest\022C\n\006parent\030\001 \001(\tB3\340A\002\372A-\n+clou" - + "dresourcemanager.googleapis.com/Project\022" - + "\026\n\tsecret_id\030\002 \001(\tB\003\340A\002\022:\n\006secret\030\003 \001(\0132" - + "%.google.cloud.secretmanager.v1.SecretB\003" - + "\340A\002\"\232\001\n\027AddSecretVersionRequest\022;\n\006paren" - + "t\030\001 \001(\tB+\340A\002\372A%\n#secretmanager.googleapi" - + "s.com/Secret\022B\n\007payload\030\002 \001(\0132,.google.c" - + "loud.secretmanager.v1.SecretPayloadB\003\340A\002" - + "\"M\n\020GetSecretRequest\0229\n\004name\030\001 \001(\tB+\340A\002\372" - + "A%\n#secretmanager.googleapis.com/Secret\"" - + "\211\001\n\031ListSecretVersionsRequest\022;\n\006parent\030" - + "\001 \001(\tB+\340A\002\372A%\n#secretmanager.googleapis." - + "com/Secret\022\026\n\tpage_size\030\002 \001(\005B\003\340A\001\022\027\n\npa" - + "ge_token\030\003 \001(\tB\003\340A\001\"\211\001\n\032ListSecretVersio" - + "nsResponse\022>\n\010versions\030\001 \003(\0132,.google.cl" - + "oud.secretmanager.v1.SecretVersion\022\027\n\017ne" - + "xt_page_token\030\002 \001(\t\022\022\n\ntotal_size\030\003 \001(\005\"" - + "[\n\027GetSecretVersionRequest\022@\n\004name\030\001 \001(\t" - + "B2\340A\002\372A,\n*secretmanager.googleapis.com/S" - + "ecretVersion\"\207\001\n\023UpdateSecretRequest\022:\n\006" - + "secret\030\001 \001(\0132%.google.cloud.secretmanage" - + "r.v1.SecretB\003\340A\002\0224\n\013update_mask\030\002 \001(\0132\032." - + "google.protobuf.FieldMaskB\003\340A\002\"^\n\032Access" - + "SecretVersionRequest\022@\n\004name\030\001 \001(\tB2\340A\002\372" - + "A,\n*secretmanager.googleapis.com/SecretV" - + "ersion\"\233\001\n\033AccessSecretVersionResponse\022=" - + "\n\004name\030\001 \001(\tB/\372A,\n*secretmanager.googlea" - + "pis.com/SecretVersion\022=\n\007payload\030\002 \001(\0132," - + ".google.cloud.secretmanager.v1.SecretPay" - + "load\"c\n\023DeleteSecretRequest\0229\n\004name\030\001 \001(" - + "\tB+\340A\002\372A%\n#secretmanager.googleapis.com/" - + "Secret\022\021\n\004etag\030\002 \001(\tB\003\340A\001\"r\n\033DisableSecr" - + "etVersionRequest\022@\n\004name\030\001 \001(\tB2\340A\002\372A,\n*" - + "secretmanager.googleapis.com/SecretVersi" - + "on\022\021\n\004etag\030\002 \001(\tB\003\340A\001\"q\n\032EnableSecretVer" - + "sionRequest\022@\n\004name\030\001 \001(\tB2\340A\002\372A,\n*secre" - + "tmanager.googleapis.com/SecretVersion\022\021\n" - + "\004etag\030\002 \001(\tB\003\340A\001\"r\n\033DestroySecretVersion" - + "Request\022@\n\004name\030\001 \001(\tB2\340A\002\372A,\n*secretman" - + "ager.googleapis.com/SecretVersion\022\021\n\004eta" - + "g\030\002 \001(\tB\003\340A\0012\317\025\n\024SecretManagerService\022\246\001" - + "\n\013ListSecrets\0221.google.cloud.secretmanag" - + "er.v1.ListSecretsRequest\0322.google.cloud." - + "secretmanager.v1.ListSecretsResponse\"0\202\323" - + "\344\223\002!\022\037/v1/{parent=projects/*}/secrets\332A\006" - + "parent\022\264\001\n\014CreateSecret\0222.google.cloud.s" - + "ecretmanager.v1.CreateSecretRequest\032%.go" - + "ogle.cloud.secretmanager.v1.Secret\"I\202\323\344\223" - + "\002)\"\037/v1/{parent=projects/*}/secrets:\006sec" - + "ret\332A\027parent,secret_id,secret\022\302\001\n\020AddSec" - + "retVersion\0226.google.cloud.secretmanager." - + "v1.AddSecretVersionRequest\032,.google.clou" - + "d.secretmanager.v1.SecretVersion\"H\202\323\344\223\0021" - + "\",/v1/{parent=projects/*/secrets/*}:addV" - + "ersion:\001*\332A\016parent,payload\022\223\001\n\tGetSecret" - + "\022/.google.cloud.secretmanager.v1.GetSecr" - + "etRequest\032%.google.cloud.secretmanager.v" - + "1.Secret\".\202\323\344\223\002!\022\037/v1/{name=projects/*/s" - + "ecrets/*}\332A\004name\022\266\001\n\014UpdateSecret\0222.goog" - + "le.cloud.secretmanager.v1.UpdateSecretRe" - + "quest\032%.google.cloud.secretmanager.v1.Se" - + "cret\"K\202\323\344\223\00202&/v1/{secret.name=projects/" - + "*/secrets/*}:\006secret\332A\022secret,update_mas" - + "k\022\212\001\n\014DeleteSecret\0222.google.cloud.secret" - + "manager.v1.DeleteSecretRequest\032\026.google." - + "protobuf.Empty\".\202\323\344\223\002!*\037/v1/{name=projec" - + "ts/*/secrets/*}\332A\004name\022\306\001\n\022ListSecretVer" - + "sions\0228.google.cloud.secretmanager.v1.Li" - + "stSecretVersionsRequest\0329.google.cloud.s" - + "ecretmanager.v1.ListSecretVersionsRespon" - + "se\";\202\323\344\223\002,\022*/v1/{parent=projects/*/secre" - + "ts/*}/versions\332A\006parent\022\263\001\n\020GetSecretVer" - + "sion\0226.google.cloud.secretmanager.v1.Get" - + "SecretVersionRequest\032,.google.cloud.secr" - + "etmanager.v1.SecretVersion\"9\202\323\344\223\002,\022*/v1/" - + "{name=projects/*/secrets/*/versions/*}\332A" - + "\004name\022\316\001\n\023AccessSecretVersion\0229.google.c" - + "loud.secretmanager.v1.AccessSecretVersio" - + "nRequest\032:.google.cloud.secretmanager.v1" - + ".AccessSecretVersionResponse\"@\202\323\344\223\0023\0221/v" + + "\npage_token\030\003 \001(\tB\003\340A\001\022\023\n\006filter\030\004 \001(\tB\003" + + "\340A\001\"z\n\023ListSecretsResponse\0226\n\007secrets\030\001 " + + "\003(\0132%.google.cloud.secretmanager.v1.Secr" + + "et\022\027\n\017next_page_token\030\002 \001(\t\022\022\n\ntotal_siz" + + "e\030\003 \001(\005\"\256\001\n\023CreateSecretRequest\022C\n\006paren" + + "t\030\001 \001(\tB3\340A\002\372A-\n+cloudresourcemanager.go" + + "ogleapis.com/Project\022\026\n\tsecret_id\030\002 \001(\tB" + + "\003\340A\002\022:\n\006secret\030\003 \001(\0132%.google.cloud.secr" + + "etmanager.v1.SecretB\003\340A\002\"\232\001\n\027AddSecretVe" + + "rsionRequest\022;\n\006parent\030\001 \001(\tB+\340A\002\372A%\n#se" + + "cretmanager.googleapis.com/Secret\022B\n\007pay" + + "load\030\002 \001(\0132,.google.cloud.secretmanager." + + "v1.SecretPayloadB\003\340A\002\"M\n\020GetSecretReques" + + "t\0229\n\004name\030\001 \001(\tB+\340A\002\372A%\n#secretmanager.g" + + "oogleapis.com/Secret\"\236\001\n\031ListSecretVersi" + + "onsRequest\022;\n\006parent\030\001 \001(\tB+\340A\002\372A%\n#secr" + + "etmanager.googleapis.com/Secret\022\026\n\tpage_" + + "size\030\002 \001(\005B\003\340A\001\022\027\n\npage_token\030\003 \001(\tB\003\340A\001" + + "\022\023\n\006filter\030\004 \001(\tB\003\340A\001\"\211\001\n\032ListSecretVers" + + "ionsResponse\022>\n\010versions\030\001 \003(\0132,.google." + + "cloud.secretmanager.v1.SecretVersion\022\027\n\017" + + "next_page_token\030\002 \001(\t\022\022\n\ntotal_size\030\003 \001(" + + "\005\"[\n\027GetSecretVersionRequest\022@\n\004name\030\001 \001" + + "(\tB2\340A\002\372A,\n*secretmanager.googleapis.com" + + "/SecretVersion\"\207\001\n\023UpdateSecretRequest\022:" + + "\n\006secret\030\001 \001(\0132%.google.cloud.secretmana" + + "ger.v1.SecretB\003\340A\002\0224\n\013update_mask\030\002 \001(\0132" + + "\032.google.protobuf.FieldMaskB\003\340A\002\"^\n\032Acce" + + "ssSecretVersionRequest\022@\n\004name\030\001 \001(\tB2\340A" + + "\002\372A,\n*secretmanager.googleapis.com/Secre" + + "tVersion\"\233\001\n\033AccessSecretVersionResponse" + + "\022=\n\004name\030\001 \001(\tB/\372A,\n*secretmanager.googl" + + "eapis.com/SecretVersion\022=\n\007payload\030\002 \001(\013" + + "2,.google.cloud.secretmanager.v1.SecretP" + + "ayload\"c\n\023DeleteSecretRequest\0229\n\004name\030\001 " + + "\001(\tB+\340A\002\372A%\n#secretmanager.googleapis.co" + + "m/Secret\022\021\n\004etag\030\002 \001(\tB\003\340A\001\"r\n\033DisableSe" + + "cretVersionRequest\022@\n\004name\030\001 \001(\tB2\340A\002\372A," + + "\n*secretmanager.googleapis.com/SecretVer" + + "sion\022\021\n\004etag\030\002 \001(\tB\003\340A\001\"q\n\032EnableSecretV" + + "ersionRequest\022@\n\004name\030\001 \001(\tB2\340A\002\372A,\n*sec" + + "retmanager.googleapis.com/SecretVersion\022" + + "\021\n\004etag\030\002 \001(\tB\003\340A\001\"r\n\033DestroySecretVersi" + + "onRequest\022@\n\004name\030\001 \001(\tB2\340A\002\372A,\n*secretm" + + "anager.googleapis.com/SecretVersion\022\021\n\004e" + + "tag\030\002 \001(\tB\003\340A\0012\317\025\n\024SecretManagerService\022" + + "\246\001\n\013ListSecrets\0221.google.cloud.secretman" + + "ager.v1.ListSecretsRequest\0322.google.clou" + + "d.secretmanager.v1.ListSecretsResponse\"0" + + "\202\323\344\223\002!\022\037/v1/{parent=projects/*}/secrets\332" + + "A\006parent\022\264\001\n\014CreateSecret\0222.google.cloud" + + ".secretmanager.v1.CreateSecretRequest\032%." + + "google.cloud.secretmanager.v1.Secret\"I\202\323" + + "\344\223\002)\"\037/v1/{parent=projects/*}/secrets:\006s" + + "ecret\332A\027parent,secret_id,secret\022\302\001\n\020AddS" + + "ecretVersion\0226.google.cloud.secretmanage" + + "r.v1.AddSecretVersionRequest\032,.google.cl" + + "oud.secretmanager.v1.SecretVersion\"H\202\323\344\223" + + "\0021\",/v1/{parent=projects/*/secrets/*}:ad" + + "dVersion:\001*\332A\016parent,payload\022\223\001\n\tGetSecr" + + "et\022/.google.cloud.secretmanager.v1.GetSe" + + "cretRequest\032%.google.cloud.secretmanager" + + ".v1.Secret\".\202\323\344\223\002!\022\037/v1/{name=projects/*" + + "/secrets/*}\332A\004name\022\266\001\n\014UpdateSecret\0222.go" + + "ogle.cloud.secretmanager.v1.UpdateSecret" + + "Request\032%.google.cloud.secretmanager.v1." + + "Secret\"K\202\323\344\223\00202&/v1/{secret.name=project" + + "s/*/secrets/*}:\006secret\332A\022secret,update_m" + + "ask\022\212\001\n\014DeleteSecret\0222.google.cloud.secr" + + "etmanager.v1.DeleteSecretRequest\032\026.googl" + + "e.protobuf.Empty\".\202\323\344\223\002!*\037/v1/{name=proj" + + "ects/*/secrets/*}\332A\004name\022\306\001\n\022ListSecretV" + + "ersions\0228.google.cloud.secretmanager.v1." + + "ListSecretVersionsRequest\0329.google.cloud" + + ".secretmanager.v1.ListSecretVersionsResp" + + "onse\";\202\323\344\223\002,\022*/v1/{parent=projects/*/sec" + + "rets/*}/versions\332A\006parent\022\263\001\n\020GetSecretV" + + "ersion\0226.google.cloud.secretmanager.v1.G" + + "etSecretVersionRequest\032,.google.cloud.se" + + "cretmanager.v1.SecretVersion\"9\202\323\344\223\002,\022*/v" + "1/{name=projects/*/secrets/*/versions/*}" - + ":access\332A\004name\022\306\001\n\024DisableSecretVersion\022" - + ":.google.cloud.secretmanager.v1.DisableS" - + "ecretVersionRequest\032,.google.cloud.secre" - + "tmanager.v1.SecretVersion\"D\202\323\344\223\0027\"2/v1/{" - + "name=projects/*/secrets/*/versions/*}:di" - + "sable:\001*\332A\004name\022\303\001\n\023EnableSecretVersion\022" - + "9.google.cloud.secretmanager.v1.EnableSe" - + "cretVersionRequest\032,.google.cloud.secret" - + "manager.v1.SecretVersion\"C\202\323\344\223\0026\"1/v1/{n" - + "ame=projects/*/secrets/*/versions/*}:ena" - + "ble:\001*\332A\004name\022\306\001\n\024DestroySecretVersion\022:" - + ".google.cloud.secretmanager.v1.DestroySe" - + "cretVersionRequest\032,.google.cloud.secret" - + "manager.v1.SecretVersion\"D\202\323\344\223\0027\"2/v1/{n" - + "ame=projects/*/secrets/*/versions/*}:des" - + "troy:\001*\332A\004name\022\206\001\n\014SetIamPolicy\022\".google" - + ".iam.v1.SetIamPolicyRequest\032\025.google.iam" - + ".v1.Policy\";\202\323\344\223\0025\"0/v1/{resource=projec" - + "ts/*/secrets/*}:setIamPolicy:\001*\022\203\001\n\014GetI" - + "amPolicy\022\".google.iam.v1.GetIamPolicyReq" - + "uest\032\025.google.iam.v1.Policy\"8\202\323\344\223\0022\0220/v1" - + "/{resource=projects/*/secrets/*}:getIamP" - + "olicy\022\254\001\n\022TestIamPermissions\022(.google.ia" - + "m.v1.TestIamPermissionsRequest\032).google." - + "iam.v1.TestIamPermissionsResponse\"A\202\323\344\223\002" - + ";\"6/v1/{resource=projects/*/secrets/*}:t" - + "estIamPermissions:\001*\032P\312A\034secretmanager.g" - + "oogleapis.com\322A.https://www.googleapis.c" - + "om/auth/cloud-platformB\353\001\n!com.google.cl" - + "oud.secretmanager.v1B\014ServiceProtoP\001ZJgo" - + "ogle.golang.org/genproto/googleapis/clou" - + "d/secretmanager/v1;secretmanager\370\001\001\242\002\003GS" - + "M\252\002\035Google.Cloud.SecretManager.V1\312\002\035Goog" - + "le\\Cloud\\SecretManager\\V1\352\002 Google::Clou" - + "d::SecretManager::V1b\006proto3" + + "\332A\004name\022\316\001\n\023AccessSecretVersion\0229.google" + + ".cloud.secretmanager.v1.AccessSecretVers" + + "ionRequest\032:.google.cloud.secretmanager." + + "v1.AccessSecretVersionResponse\"@\202\323\344\223\0023\0221" + + "/v1/{name=projects/*/secrets/*/versions/" + + "*}:access\332A\004name\022\306\001\n\024DisableSecretVersio" + + "n\022:.google.cloud.secretmanager.v1.Disabl" + + "eSecretVersionRequest\032,.google.cloud.sec" + + "retmanager.v1.SecretVersion\"D\202\323\344\223\0027\"2/v1" + + "/{name=projects/*/secrets/*/versions/*}:" + + "disable:\001*\332A\004name\022\303\001\n\023EnableSecretVersio" + + "n\0229.google.cloud.secretmanager.v1.Enable" + + "SecretVersionRequest\032,.google.cloud.secr" + + "etmanager.v1.SecretVersion\"C\202\323\344\223\0026\"1/v1/" + + "{name=projects/*/secrets/*/versions/*}:e" + + "nable:\001*\332A\004name\022\306\001\n\024DestroySecretVersion" + + "\022:.google.cloud.secretmanager.v1.Destroy" + + "SecretVersionRequest\032,.google.cloud.secr" + + "etmanager.v1.SecretVersion\"D\202\323\344\223\0027\"2/v1/" + + "{name=projects/*/secrets/*/versions/*}:d" + + "estroy:\001*\332A\004name\022\206\001\n\014SetIamPolicy\022\".goog" + + "le.iam.v1.SetIamPolicyRequest\032\025.google.i" + + "am.v1.Policy\";\202\323\344\223\0025\"0/v1/{resource=proj" + + "ects/*/secrets/*}:setIamPolicy:\001*\022\203\001\n\014Ge" + + "tIamPolicy\022\".google.iam.v1.GetIamPolicyR" + + "equest\032\025.google.iam.v1.Policy\"8\202\323\344\223\0022\0220/" + + "v1/{resource=projects/*/secrets/*}:getIa" + + "mPolicy\022\254\001\n\022TestIamPermissions\022(.google." + + "iam.v1.TestIamPermissionsRequest\032).googl" + + "e.iam.v1.TestIamPermissionsResponse\"A\202\323\344" + + "\223\002;\"6/v1/{resource=projects/*/secrets/*}" + + ":testIamPermissions:\001*\032P\312A\034secretmanager" + + ".googleapis.com\322A.https://www.googleapis" + + ".com/auth/cloud-platformB\353\001\n!com.google." + + "cloud.secretmanager.v1B\014ServiceProtoP\001ZJ" + + "google.golang.org/genproto/googleapis/cl" + + "oud/secretmanager/v1;secretmanager\370\001\001\242\002\003" + + "GSM\252\002\035Google.Cloud.SecretManager.V1\312\002\035Go" + + "ogle\\Cloud\\SecretManager\\V1\352\002 Google::Cl" + + "oud::SecretManager::V1b\006proto3" }; descriptor = com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom( @@ -249,7 +250,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() { new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( internal_static_google_cloud_secretmanager_v1_ListSecretsRequest_descriptor, new java.lang.String[] { - "Parent", "PageSize", "PageToken", + "Parent", "PageSize", "PageToken", "Filter", }); internal_static_google_cloud_secretmanager_v1_ListSecretsResponse_descriptor = getDescriptor().getMessageTypes().get(1); @@ -289,7 +290,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() { new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( internal_static_google_cloud_secretmanager_v1_ListSecretVersionsRequest_descriptor, new java.lang.String[] { - "Parent", "PageSize", "PageToken", + "Parent", "PageSize", "PageToken", "Filter", }); internal_static_google_cloud_secretmanager_v1_ListSecretVersionsResponse_descriptor = getDescriptor().getMessageTypes().get(6); diff --git a/proto-google-cloud-secretmanager-v1/src/main/proto/google/cloud/secretmanager/v1/service.proto b/proto-google-cloud-secretmanager-v1/src/main/proto/google/cloud/secretmanager/v1/service.proto index 44ffe421..52b3b094 100644 --- a/proto-google-cloud-secretmanager-v1/src/main/proto/google/cloud/secretmanager/v1/service.proto +++ b/proto-google-cloud-secretmanager-v1/src/main/proto/google/cloud/secretmanager/v1/service.proto @@ -221,6 +221,13 @@ message ListSecretsRequest { // Optional. Pagination token, returned earlier via // [ListSecretsResponse.next_page_token][google.cloud.secretmanager.v1.ListSecretsResponse.next_page_token]. string page_token = 3 [(google.api.field_behavior) = OPTIONAL]; + + // Optional. Filter string, adhering to the rules in + // [List-operation + // filtering](https://cloud.google.com/secret-manager/docs/filtering). List + // only secrets matching the filter. If filter is empty, all secrets are + // listed. + string filter = 4 [(google.api.field_behavior) = OPTIONAL]; } // Response message for [SecretManagerService.ListSecrets][google.cloud.secretmanager.v1.SecretManagerService.ListSecrets]. @@ -305,6 +312,13 @@ message ListSecretVersionsRequest { // Optional. Pagination token, returned earlier via // ListSecretVersionsResponse.next_page_token][]. string page_token = 3 [(google.api.field_behavior) = OPTIONAL]; + + // Optional. Filter string, adhering to the rules in + // [List-operation + // filtering](https://cloud.google.com/secret-manager/docs/filtering). List + // only secret versions matching the filter. If filter is empty, all secret + // versions are listed. + string filter = 4 [(google.api.field_behavior) = OPTIONAL]; } // Response message for [SecretManagerService.ListSecretVersions][google.cloud.secretmanager.v1.SecretManagerService.ListSecretVersions]. diff --git a/synth.metadata b/synth.metadata index 930b2c81..921645a0 100644 --- a/synth.metadata +++ b/synth.metadata @@ -11,8 +11,8 @@ "git": { "name": "googleapis", "remote": "https://github.com/googleapis/googleapis.git", - "sha": "1eade8161f2ef102282869bc3eb18841807b2b46", - "internalRef": "383886699" + "sha": "2948f31dd210514f87ce6e1e08bce48ecf4660d1", + "internalRef": "387156636" } }, {