From 24720c8d23aa890ac5d78509836743d9fdc8a210 Mon Sep 17 00:00:00 2001 From: "gcf-owl-bot[bot]" <78513119+gcf-owl-bot[bot]@users.noreply.github.com> Date: Wed, 3 Nov 2021 01:44:20 +0000 Subject: [PATCH] docs: fix docstring formatting (#305) - [ ] Regenerate this pull request now. Committer: @parthea PiperOrigin-RevId: 405687537 Source-Link: https://github.com/googleapis/googleapis/commit/5f897f0cd68ea0d7729fa3edb6b61d66dff81ece Source-Link: https://github.com/googleapis/googleapis-gen/commit/f75643a54f3b681eb1c8c73e8002c1dd7d2bd5fe Copy-Tag: eyJwIjoiLmdpdGh1Yi8uT3dsQm90LnlhbWwiLCJoIjoiZjc1NjQzYTU0ZjNiNjgxZWIxYzhjNzNlODAwMmMxZGQ3ZDJiZDVmZSJ9 --- .../v1beta1/CertificateAuthority.java | 170 +++++++++--------- .../privateca/v1beta1/resources.proto | 10 +- 2 files changed, 90 insertions(+), 90 deletions(-) diff --git a/proto-google-cloud-security-private-ca-v1beta1/src/main/java/com/google/cloud/security/privateca/v1beta1/CertificateAuthority.java b/proto-google-cloud-security-private-ca-v1beta1/src/main/java/com/google/cloud/security/privateca/v1beta1/CertificateAuthority.java index 4107145b..3f86fd88 100644 --- a/proto-google-cloud-security-private-ca-v1beta1/src/main/java/com/google/cloud/security/privateca/v1beta1/CertificateAuthority.java +++ b/proto-google-cloud-security-private-ca-v1beta1/src/main/java/com/google/cloud/security/privateca/v1beta1/CertificateAuthority.java @@ -3800,11 +3800,11 @@ public interface AllowedSubjectAltNamesOrBuilder *
        * Optional. Contains valid, fully-qualified host names. Glob patterns are also
        * supported. To allow an explicit wildcard certificate, escape with
-       * backlash (i.e. "\*").
-       * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
-       * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
-       * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
-       * 'foo.bar.com'.
+       * backlash (i.e. `\*`).
+       * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+       * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+       * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+       * `foo.bar.com`.
        * 
* * repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL]; @@ -3819,11 +3819,11 @@ public interface AllowedSubjectAltNamesOrBuilder *
        * Optional. Contains valid, fully-qualified host names. Glob patterns are also
        * supported. To allow an explicit wildcard certificate, escape with
-       * backlash (i.e. "\*").
-       * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
-       * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
-       * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
-       * 'foo.bar.com'.
+       * backlash (i.e. `\*`).
+       * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+       * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+       * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+       * `foo.bar.com`.
        * 
* * repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL]; @@ -3838,11 +3838,11 @@ public interface AllowedSubjectAltNamesOrBuilder *
        * Optional. Contains valid, fully-qualified host names. Glob patterns are also
        * supported. To allow an explicit wildcard certificate, escape with
-       * backlash (i.e. "\*").
-       * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
-       * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
-       * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
-       * 'foo.bar.com'.
+       * backlash (i.e. `\*`).
+       * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+       * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+       * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+       * `foo.bar.com`.
        * 
* * repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL]; @@ -3858,11 +3858,11 @@ public interface AllowedSubjectAltNamesOrBuilder *
        * Optional. Contains valid, fully-qualified host names. Glob patterns are also
        * supported. To allow an explicit wildcard certificate, escape with
-       * backlash (i.e. "\*").
-       * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
-       * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
-       * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
-       * 'foo.bar.com'.
+       * backlash (i.e. `\*`).
+       * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+       * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+       * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+       * `foo.bar.com`.
        * 
* * repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL]; @@ -4252,11 +4252,11 @@ public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { *
        * Optional. Contains valid, fully-qualified host names. Glob patterns are also
        * supported. To allow an explicit wildcard certificate, escape with
-       * backlash (i.e. "\*").
-       * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
-       * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
-       * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
-       * 'foo.bar.com'.
+       * backlash (i.e. `\*`).
+       * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+       * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+       * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+       * `foo.bar.com`.
        * 
* * repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL]; @@ -4273,11 +4273,11 @@ public com.google.protobuf.ProtocolStringList getAllowedDnsNamesList() { *
        * Optional. Contains valid, fully-qualified host names. Glob patterns are also
        * supported. To allow an explicit wildcard certificate, escape with
-       * backlash (i.e. "\*").
-       * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
-       * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
-       * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
-       * 'foo.bar.com'.
+       * backlash (i.e. `\*`).
+       * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+       * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+       * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+       * `foo.bar.com`.
        * 
* * repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL]; @@ -4294,11 +4294,11 @@ public int getAllowedDnsNamesCount() { *
        * Optional. Contains valid, fully-qualified host names. Glob patterns are also
        * supported. To allow an explicit wildcard certificate, escape with
-       * backlash (i.e. "\*").
-       * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
-       * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
-       * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
-       * 'foo.bar.com'.
+       * backlash (i.e. `\*`).
+       * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+       * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+       * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+       * `foo.bar.com`.
        * 
* * repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL]; @@ -4316,11 +4316,11 @@ public java.lang.String getAllowedDnsNames(int index) { *
        * Optional. Contains valid, fully-qualified host names. Glob patterns are also
        * supported. To allow an explicit wildcard certificate, escape with
-       * backlash (i.e. "\*").
-       * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
-       * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
-       * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
-       * 'foo.bar.com'.
+       * backlash (i.e. `\*`).
+       * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+       * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+       * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+       * `foo.bar.com`.
        * 
* * repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL]; @@ -5140,11 +5140,11 @@ private void ensureAllowedDnsNamesIsMutable() { *
          * Optional. Contains valid, fully-qualified host names. Glob patterns are also
          * supported. To allow an explicit wildcard certificate, escape with
-         * backlash (i.e. "\*").
-         * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
-         * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
-         * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
-         * 'foo.bar.com'.
+         * backlash (i.e. `\*`).
+         * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+         * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+         * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+         * `foo.bar.com`.
          * 
* * repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL]; @@ -5161,11 +5161,11 @@ public com.google.protobuf.ProtocolStringList getAllowedDnsNamesList() { *
          * Optional. Contains valid, fully-qualified host names. Glob patterns are also
          * supported. To allow an explicit wildcard certificate, escape with
-         * backlash (i.e. "\*").
-         * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
-         * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
-         * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
-         * 'foo.bar.com'.
+         * backlash (i.e. `\*`).
+         * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+         * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+         * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+         * `foo.bar.com`.
          * 
* * repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL]; @@ -5182,11 +5182,11 @@ public int getAllowedDnsNamesCount() { *
          * Optional. Contains valid, fully-qualified host names. Glob patterns are also
          * supported. To allow an explicit wildcard certificate, escape with
-         * backlash (i.e. "\*").
-         * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
-         * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
-         * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
-         * 'foo.bar.com'.
+         * backlash (i.e. `\*`).
+         * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+         * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+         * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+         * `foo.bar.com`.
          * 
* * repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL]; @@ -5204,11 +5204,11 @@ public java.lang.String getAllowedDnsNames(int index) { *
          * Optional. Contains valid, fully-qualified host names. Glob patterns are also
          * supported. To allow an explicit wildcard certificate, escape with
-         * backlash (i.e. "\*").
-         * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
-         * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
-         * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
-         * 'foo.bar.com'.
+         * backlash (i.e. `\*`).
+         * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+         * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+         * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+         * `foo.bar.com`.
          * 
* * repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL]; @@ -5226,11 +5226,11 @@ public com.google.protobuf.ByteString getAllowedDnsNamesBytes(int index) { *
          * Optional. Contains valid, fully-qualified host names. Glob patterns are also
          * supported. To allow an explicit wildcard certificate, escape with
-         * backlash (i.e. "\*").
-         * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
-         * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
-         * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
-         * 'foo.bar.com'.
+         * backlash (i.e. `\*`).
+         * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+         * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+         * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+         * `foo.bar.com`.
          * 
* * repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL]; @@ -5255,11 +5255,11 @@ public Builder setAllowedDnsNames(int index, java.lang.String value) { *
          * Optional. Contains valid, fully-qualified host names. Glob patterns are also
          * supported. To allow an explicit wildcard certificate, escape with
-         * backlash (i.e. "\*").
-         * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
-         * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
-         * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
-         * 'foo.bar.com'.
+         * backlash (i.e. `\*`).
+         * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+         * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+         * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+         * `foo.bar.com`.
          * 
* * repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL]; @@ -5283,11 +5283,11 @@ public Builder addAllowedDnsNames(java.lang.String value) { *
          * Optional. Contains valid, fully-qualified host names. Glob patterns are also
          * supported. To allow an explicit wildcard certificate, escape with
-         * backlash (i.e. "\*").
-         * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
-         * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
-         * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
-         * 'foo.bar.com'.
+         * backlash (i.e. `\*`).
+         * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+         * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+         * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+         * `foo.bar.com`.
          * 
* * repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL]; @@ -5308,11 +5308,11 @@ public Builder addAllAllowedDnsNames(java.lang.Iterable values *
          * Optional. Contains valid, fully-qualified host names. Glob patterns are also
          * supported. To allow an explicit wildcard certificate, escape with
-         * backlash (i.e. "\*").
-         * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
-         * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
-         * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
-         * 'foo.bar.com'.
+         * backlash (i.e. `\*`).
+         * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+         * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+         * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+         * `foo.bar.com`.
          * 
* * repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL]; @@ -5332,11 +5332,11 @@ public Builder clearAllowedDnsNames() { *
          * Optional. Contains valid, fully-qualified host names. Glob patterns are also
          * supported. To allow an explicit wildcard certificate, escape with
-         * backlash (i.e. "\*").
-         * E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not
-         * *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
-         * E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not
-         * 'foo.bar.com'.
+         * backlash (i.e. `\*`).
+         * E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not
+         * `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set.
+         * E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not
+         * `foo.bar.com`.
          * 
* * repeated string allowed_dns_names = 1 [(.google.api.field_behavior) = OPTIONAL]; diff --git a/proto-google-cloud-security-private-ca-v1beta1/src/main/proto/google/cloud/security/privateca/v1beta1/resources.proto b/proto-google-cloud-security-private-ca-v1beta1/src/main/proto/google/cloud/security/privateca/v1beta1/resources.proto index 937e931d..f2bf7de0 100644 --- a/proto-google-cloud-security-private-ca-v1beta1/src/main/proto/google/cloud/security/privateca/v1beta1/resources.proto +++ b/proto-google-cloud-security-private-ca-v1beta1/src/main/proto/google/cloud/security/privateca/v1beta1/resources.proto @@ -71,11 +71,11 @@ message CertificateAuthority { message AllowedSubjectAltNames { // Optional. Contains valid, fully-qualified host names. Glob patterns are also // supported. To allow an explicit wildcard certificate, escape with - // backlash (i.e. "\*"). - // E.g. for globbed entries: '*bar.com' will allow foo.bar.com, but not - // *.bar.com, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set. - // E.g. for wildcard entries: '\*.bar.com' will allow '*.bar.com', but not - // 'foo.bar.com'. + // backlash (i.e. `\*`). + // E.g. for globbed entries: `*bar.com` will allow `foo.bar.com`, but not + // `*.bar.com`, unless the [allow_globbing_dns_wildcards][google.cloud.security.privateca.v1beta1.CertificateAuthority.CertificateAuthorityPolicy.AllowedSubjectAltNames.allow_globbing_dns_wildcards] field is set. + // E.g. for wildcard entries: `\*.bar.com` will allow `*.bar.com`, but not + // `foo.bar.com`. repeated string allowed_dns_names = 1 [(google.api.field_behavior) = OPTIONAL]; // Optional. Contains valid RFC 3986 URIs. Glob patterns are also supported. To