diff --git a/proto-google-cloud-security-private-ca-v1beta1/src/main/java/com/google/cloud/security/privateca/v1beta1/CertificateAuthority.java b/proto-google-cloud-security-private-ca-v1beta1/src/main/java/com/google/cloud/security/privateca/v1beta1/CertificateAuthority.java index 4107145b..3f86fd88 100644 --- a/proto-google-cloud-security-private-ca-v1beta1/src/main/java/com/google/cloud/security/privateca/v1beta1/CertificateAuthority.java +++ b/proto-google-cloud-security-private-ca-v1beta1/src/main/java/com/google/cloud/security/privateca/v1beta1/CertificateAuthority.java @@ -3800,11 +3800,11 @@ public interface AllowedSubjectAltNamesOrBuilder *
* Optional. Contains valid, fully-qualified host names. Glob patterns are also * supported. To allow an explicit wildcard certificate, escape with - * backlash (i.e. "\*"). - * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not - * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set. - * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not - * 'foo.bar.com'. + * backlash (i.e. `\*`). + * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not + * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set. + * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not + * `foo.bar.com`. ** *
repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL];
@@ -3819,11 +3819,11 @@ public interface AllowedSubjectAltNamesOrBuilder
*
* Optional. Contains valid, fully-qualified host names. Glob patterns are also
* supported. To allow an explicit wildcard certificate, escape with
- * backlash (i.e. "\*").
- * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
- * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
- * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
- * 'foo.bar.com'.
+ * backlash (i.e. `\*`).
+ * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+ * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+ * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+ * `foo.bar.com`.
*
*
* repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL];
@@ -3838,11 +3838,11 @@ public interface AllowedSubjectAltNamesOrBuilder
*
* Optional. Contains valid, fully-qualified host names. Glob patterns are also
* supported. To allow an explicit wildcard certificate, escape with
- * backlash (i.e. "\*").
- * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
- * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
- * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
- * 'foo.bar.com'.
+ * backlash (i.e. `\*`).
+ * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+ * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+ * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+ * `foo.bar.com`.
*
*
* repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL];
@@ -3858,11 +3858,11 @@ public interface AllowedSubjectAltNamesOrBuilder
*
* Optional. Contains valid, fully-qualified host names. Glob patterns are also
* supported. To allow an explicit wildcard certificate, escape with
- * backlash (i.e. "\*").
- * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
- * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
- * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
- * 'foo.bar.com'.
+ * backlash (i.e. `\*`).
+ * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+ * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+ * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+ * `foo.bar.com`.
*
*
* repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL];
@@ -4252,11 +4252,11 @@ public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() {
*
* Optional. Contains valid, fully-qualified host names. Glob patterns are also
* supported. To allow an explicit wildcard certificate, escape with
- * backlash (i.e. "\*").
- * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
- * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
- * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
- * 'foo.bar.com'.
+ * backlash (i.e. `\*`).
+ * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+ * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+ * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+ * `foo.bar.com`.
*
*
* repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL];
@@ -4273,11 +4273,11 @@ public com.google.protobuf.ProtocolStringList getAllowedDnsNamesList() {
*
* Optional. Contains valid, fully-qualified host names. Glob patterns are also
* supported. To allow an explicit wildcard certificate, escape with
- * backlash (i.e. "\*").
- * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
- * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
- * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
- * 'foo.bar.com'.
+ * backlash (i.e. `\*`).
+ * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+ * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+ * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+ * `foo.bar.com`.
*
*
* repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL];
@@ -4294,11 +4294,11 @@ public int getAllowedDnsNamesCount() {
*
* Optional. Contains valid, fully-qualified host names. Glob patterns are also
* supported. To allow an explicit wildcard certificate, escape with
- * backlash (i.e. "\*").
- * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
- * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
- * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
- * 'foo.bar.com'.
+ * backlash (i.e. `\*`).
+ * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+ * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+ * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+ * `foo.bar.com`.
*
*
* repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL];
@@ -4316,11 +4316,11 @@ public java.lang.String getAllowedDnsNames(int index) {
*
* Optional. Contains valid, fully-qualified host names. Glob patterns are also
* supported. To allow an explicit wildcard certificate, escape with
- * backlash (i.e. "\*").
- * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
- * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
- * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
- * 'foo.bar.com'.
+ * backlash (i.e. `\*`).
+ * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+ * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+ * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+ * `foo.bar.com`.
*
*
* repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL];
@@ -5140,11 +5140,11 @@ private void ensureAllowedDnsNamesIsMutable() {
*
* Optional. Contains valid, fully-qualified host names. Glob patterns are also
* supported. To allow an explicit wildcard certificate, escape with
- * backlash (i.e. "\*").
- * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
- * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
- * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
- * 'foo.bar.com'.
+ * backlash (i.e. `\*`).
+ * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+ * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+ * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+ * `foo.bar.com`.
*
*
* repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL];
@@ -5161,11 +5161,11 @@ public com.google.protobuf.ProtocolStringList getAllowedDnsNamesList() {
*
* Optional. Contains valid, fully-qualified host names. Glob patterns are also
* supported. To allow an explicit wildcard certificate, escape with
- * backlash (i.e. "\*").
- * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
- * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
- * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
- * 'foo.bar.com'.
+ * backlash (i.e. `\*`).
+ * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+ * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+ * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+ * `foo.bar.com`.
*
*
* repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL];
@@ -5182,11 +5182,11 @@ public int getAllowedDnsNamesCount() {
*
* Optional. Contains valid, fully-qualified host names. Glob patterns are also
* supported. To allow an explicit wildcard certificate, escape with
- * backlash (i.e. "\*").
- * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
- * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
- * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
- * 'foo.bar.com'.
+ * backlash (i.e. `\*`).
+ * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+ * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+ * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+ * `foo.bar.com`.
*
*
* repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL];
@@ -5204,11 +5204,11 @@ public java.lang.String getAllowedDnsNames(int index) {
*
* Optional. Contains valid, fully-qualified host names. Glob patterns are also
* supported. To allow an explicit wildcard certificate, escape with
- * backlash (i.e. "\*").
- * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
- * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
- * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
- * 'foo.bar.com'.
+ * backlash (i.e. `\*`).
+ * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+ * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+ * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+ * `foo.bar.com`.
*
*
* repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL];
@@ -5226,11 +5226,11 @@ public com.google.protobuf.ByteString getAllowedDnsNamesBytes(int index) {
*
* Optional. Contains valid, fully-qualified host names. Glob patterns are also
* supported. To allow an explicit wildcard certificate, escape with
- * backlash (i.e. "\*").
- * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
- * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
- * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
- * 'foo.bar.com'.
+ * backlash (i.e. `\*`).
+ * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+ * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+ * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+ * `foo.bar.com`.
*
*
* repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL];
@@ -5255,11 +5255,11 @@ public Builder setAllowedDnsNames(int index, java.lang.String value) {
*
* Optional. Contains valid, fully-qualified host names. Glob patterns are also
* supported. To allow an explicit wildcard certificate, escape with
- * backlash (i.e. "\*").
- * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
- * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
- * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
- * 'foo.bar.com'.
+ * backlash (i.e. `\*`).
+ * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+ * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+ * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+ * `foo.bar.com`.
*
*
* repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL];
@@ -5283,11 +5283,11 @@ public Builder addAllowedDnsNames(java.lang.String value) {
*
* Optional. Contains valid, fully-qualified host names. Glob patterns are also
* supported. To allow an explicit wildcard certificate, escape with
- * backlash (i.e. "\*").
- * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
- * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
- * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
- * 'foo.bar.com'.
+ * backlash (i.e. `\*`).
+ * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+ * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+ * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+ * `foo.bar.com`.
*
*
* repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL];
@@ -5308,11 +5308,11 @@ public Builder addAllAllowedDnsNames(java.lang.Iterable values
*
* Optional. Contains valid, fully-qualified host names. Glob patterns are also
* supported. To allow an explicit wildcard certificate, escape with
- * backlash (i.e. "\*").
- * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
- * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
- * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
- * 'foo.bar.com'.
+ * backlash (i.e. `\*`).
+ * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+ * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+ * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+ * `foo.bar.com`.
*
*
* repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL];
@@ -5332,11 +5332,11 @@ public Builder clearAllowedDnsNames() {
*
* Optional. Contains valid, fully-qualified host names. Glob patterns are also
* supported. To allow an explicit wildcard certificate, escape with
- * backlash (i.e. "\*").
- * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
- * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
- * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
- * 'foo.bar.com'.
+ * backlash (i.e. `\*`).
+ * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+ * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+ * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+ * `foo.bar.com`.
*
*
* repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL];
diff --git a/proto-google-cloud-security-private-ca-v1beta1/src/main/proto/google/cloud/security/privateca/v1beta1/resources.proto b/proto-google-cloud-security-private-ca-v1beta1/src/main/proto/google/cloud/security/privateca/v1beta1/resources.proto
index 937e931d..f2bf7de0 100644
--- a/proto-google-cloud-security-private-ca-v1beta1/src/main/proto/google/cloud/security/privateca/v1beta1/resources.proto
+++ b/proto-google-cloud-security-private-ca-v1beta1/src/main/proto/google/cloud/security/privateca/v1beta1/resources.proto
@@ -71,11 +71,11 @@ message CertificateAuthority {
message AllowedSubjectAltNames {
// Optional. Contains valid, fully-qualified host names. Glob patterns are also
// supported. To allow an explicit wildcard certificate, escape with
- // backlash (i.e. "\*").
- // E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
- // *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
- // E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
- // 'foo.bar.com'.
+ // backlash (i.e. `\*`).
+ // E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+ // `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+ // E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+ // `foo.bar.com`.
repeated string allowed_dns_names = 1 [(google.api.field_behavior) = OPTIONAL];
// Optional. Contains valid RFC 3986 URIs. Glob patterns are also supported. To