From 5f8689c9a1d6001d2873158c13cbb9a95b33fb97 Mon Sep 17 00:00:00 2001 From: Yoshi Automation Bot Date: Wed, 24 Jun 2020 19:45:01 -0700 Subject: [PATCH] fix: update default retry configs (#31) --- .flake8 | 2 + .gitignore | 2 + .kokoro/publish-docs.sh | 2 - .kokoro/release.sh | 2 - .kokoro/samples/lint/common.cfg | 34 ++ .kokoro/samples/lint/continuous.cfg | 6 + .kokoro/samples/lint/periodic.cfg | 6 + .kokoro/samples/lint/presubmit.cfg | 6 + .kokoro/samples/python3.6/common.cfg | 34 ++ .kokoro/samples/python3.6/continuous.cfg | 7 + .kokoro/samples/python3.6/periodic.cfg | 6 + .kokoro/samples/python3.6/presubmit.cfg | 6 + .kokoro/samples/python3.7/common.cfg | 34 ++ .kokoro/samples/python3.7/continuous.cfg | 6 + .kokoro/samples/python3.7/periodic.cfg | 6 + .kokoro/samples/python3.7/presubmit.cfg | 6 + .kokoro/samples/python3.8/common.cfg | 34 ++ .kokoro/samples/python3.8/continuous.cfg | 6 + .kokoro/samples/python3.8/periodic.cfg | 6 + .kokoro/samples/python3.8/presubmit.cfg | 6 + .kokoro/test-samples.sh | 104 ++++ MANIFEST.in | 3 + docs/conf.py | 9 +- docs/index.rst | 2 + docs/multiprocessing.rst | 7 + google/cloud/secretmanager.py | 6 +- google/cloud/secretmanager_v1/__init__.py | 10 +- .../gapic/secret_manager_service_client.py | 42 +- .../secret_manager_service_client_config.py | 95 +-- .../secret_manager_service_grpc_transport.py | 4 +- .../secretmanager_v1/proto/resources_pb2.py | 91 ++- .../proto/resources_pb2_grpc.py | 16 +- .../secretmanager_v1/proto/service_pb2.py | 151 +++-- .../proto/service_pb2_grpc.py | 544 +++++++++++++++--- google/cloud/secretmanager_v1/types.py | 5 +- .../cloud/secretmanager_v1beta1/__init__.py | 10 +- .../gapic/secret_manager_service_client.py | 51 +- .../secret_manager_service_client_config.py | 95 +-- .../secret_manager_service_grpc_transport.py | 4 +- .../proto/resources_pb2.py | 94 ++- .../proto/resources_pb2_grpc.py | 16 +- .../proto/service_pb2.py | 214 ++++--- .../proto/service_pb2_grpc.py | 544 +++++++++++++++--- google/cloud/secretmanager_v1beta1/types.py | 5 +- noxfile.py | 31 +- scripts/decrypt-secrets.sh | 33 ++ scripts/readme-gen/readme_gen.py | 66 +++ scripts/readme-gen/templates/README.tmpl.rst | 87 +++ scripts/readme-gen/templates/auth.tmpl.rst | 9 + .../templates/auth_api_key.tmpl.rst | 14 + .../templates/install_deps.tmpl.rst | 29 + .../templates/install_portaudio.tmpl.rst | 35 ++ synth.metadata | 17 +- synth.py | 2 + testing/.gitignore | 3 + ...t_secret_manager_service_client_v1beta1.py | 8 +- 56 files changed, 2144 insertions(+), 529 deletions(-) create mode 100644 .kokoro/samples/lint/common.cfg create mode 100644 .kokoro/samples/lint/continuous.cfg create mode 100644 .kokoro/samples/lint/periodic.cfg create mode 100644 .kokoro/samples/lint/presubmit.cfg create mode 100644 .kokoro/samples/python3.6/common.cfg create mode 100644 .kokoro/samples/python3.6/continuous.cfg create mode 100644 .kokoro/samples/python3.6/periodic.cfg create mode 100644 .kokoro/samples/python3.6/presubmit.cfg create mode 100644 .kokoro/samples/python3.7/common.cfg create mode 100644 .kokoro/samples/python3.7/continuous.cfg create mode 100644 .kokoro/samples/python3.7/periodic.cfg create mode 100644 .kokoro/samples/python3.7/presubmit.cfg create mode 100644 .kokoro/samples/python3.8/common.cfg create mode 100644 .kokoro/samples/python3.8/continuous.cfg create mode 100644 .kokoro/samples/python3.8/periodic.cfg create mode 100644 .kokoro/samples/python3.8/presubmit.cfg create mode 100755 .kokoro/test-samples.sh create mode 100644 docs/multiprocessing.rst create mode 100755 scripts/decrypt-secrets.sh create mode 100644 scripts/readme-gen/readme_gen.py create mode 100644 scripts/readme-gen/templates/README.tmpl.rst create mode 100644 scripts/readme-gen/templates/auth.tmpl.rst create mode 100644 scripts/readme-gen/templates/auth_api_key.tmpl.rst create mode 100644 scripts/readme-gen/templates/install_deps.tmpl.rst create mode 100644 scripts/readme-gen/templates/install_portaudio.tmpl.rst create mode 100644 testing/.gitignore diff --git a/.flake8 b/.flake8 index 20fe9bd..ed93163 100644 --- a/.flake8 +++ b/.flake8 @@ -21,6 +21,8 @@ exclude = # Exclude generated code. **/proto/** **/gapic/** + **/services/** + **/types/** *_pb2.py # Standard linting exemptions. diff --git a/.gitignore b/.gitignore index 3fb06e0..b87e1ed 100644 --- a/.gitignore +++ b/.gitignore @@ -10,6 +10,7 @@ dist build eggs +.eggs parts bin var @@ -49,6 +50,7 @@ bigquery/docs/generated # Virtual environment env/ coverage.xml +sponge_log.xml # System test environment variables. system_tests/local_test_setup diff --git a/.kokoro/publish-docs.sh b/.kokoro/publish-docs.sh index 145d632..f706ac9 100755 --- a/.kokoro/publish-docs.sh +++ b/.kokoro/publish-docs.sh @@ -13,8 +13,6 @@ # See the License for the specific language governing permissions and # limitations under the License. -#!/bin/bash - set -eo pipefail # Disable buffering, so that the logs stream through. diff --git a/.kokoro/release.sh b/.kokoro/release.sh index 52d7db4..18d3218 100755 --- a/.kokoro/release.sh +++ b/.kokoro/release.sh @@ -13,8 +13,6 @@ # See the License for the specific language governing permissions and # limitations under the License. -#!/bin/bash - set -eo pipefail # Start the releasetool reporter diff --git a/.kokoro/samples/lint/common.cfg b/.kokoro/samples/lint/common.cfg new file mode 100644 index 0000000..4444eee --- /dev/null +++ b/.kokoro/samples/lint/common.cfg @@ -0,0 +1,34 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Build logs will be here +action { + define_artifacts { + regex: "**/*sponge_log.xml" + } +} + +# Specify which tests to run +env_vars: { + key: "RUN_TESTS_SESSION" + value: "lint" +} + +env_vars: { + key: "TRAMPOLINE_BUILD_FILE" + value: "github/python-secret-manager/.kokoro/test-samples.sh" +} + +# Configure the docker image for kokoro-trampoline. +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/python-samples-testing-docker" +} + +# Download secrets for samples +gfile_resources: "/bigstore/cloud-devrel-kokoro-resources/python-docs-samples" + +# Download trampoline resources. +gfile_resources: "/bigstore/cloud-devrel-kokoro-resources/trampoline" + +# Use the trampoline script to run in docker. +build_file: "python-secret-manager/.kokoro/trampoline.sh" \ No newline at end of file diff --git a/.kokoro/samples/lint/continuous.cfg b/.kokoro/samples/lint/continuous.cfg new file mode 100644 index 0000000..a1c8d97 --- /dev/null +++ b/.kokoro/samples/lint/continuous.cfg @@ -0,0 +1,6 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +env_vars: { + key: "INSTALL_LIBRARY_FROM_SOURCE" + value: "True" +} \ No newline at end of file diff --git a/.kokoro/samples/lint/periodic.cfg b/.kokoro/samples/lint/periodic.cfg new file mode 100644 index 0000000..50fec96 --- /dev/null +++ b/.kokoro/samples/lint/periodic.cfg @@ -0,0 +1,6 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +env_vars: { + key: "INSTALL_LIBRARY_FROM_SOURCE" + value: "False" +} \ No newline at end of file diff --git a/.kokoro/samples/lint/presubmit.cfg b/.kokoro/samples/lint/presubmit.cfg new file mode 100644 index 0000000..a1c8d97 --- /dev/null +++ b/.kokoro/samples/lint/presubmit.cfg @@ -0,0 +1,6 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +env_vars: { + key: "INSTALL_LIBRARY_FROM_SOURCE" + value: "True" +} \ No newline at end of file diff --git a/.kokoro/samples/python3.6/common.cfg b/.kokoro/samples/python3.6/common.cfg new file mode 100644 index 0000000..d08da8f --- /dev/null +++ b/.kokoro/samples/python3.6/common.cfg @@ -0,0 +1,34 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Build logs will be here +action { + define_artifacts { + regex: "**/*sponge_log.xml" + } +} + +# Specify which tests to run +env_vars: { + key: "RUN_TESTS_SESSION" + value: "py-3.6" +} + +env_vars: { + key: "TRAMPOLINE_BUILD_FILE" + value: "github/python-secret-manager/.kokoro/test-samples.sh" +} + +# Configure the docker image for kokoro-trampoline. +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/python-samples-testing-docker" +} + +# Download secrets for samples +gfile_resources: "/bigstore/cloud-devrel-kokoro-resources/python-docs-samples" + +# Download trampoline resources. +gfile_resources: "/bigstore/cloud-devrel-kokoro-resources/trampoline" + +# Use the trampoline script to run in docker. +build_file: "python-secret-manager/.kokoro/trampoline.sh" \ No newline at end of file diff --git a/.kokoro/samples/python3.6/continuous.cfg b/.kokoro/samples/python3.6/continuous.cfg new file mode 100644 index 0000000..7218af1 --- /dev/null +++ b/.kokoro/samples/python3.6/continuous.cfg @@ -0,0 +1,7 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +env_vars: { + key: "INSTALL_LIBRARY_FROM_SOURCE" + value: "True" +} + diff --git a/.kokoro/samples/python3.6/periodic.cfg b/.kokoro/samples/python3.6/periodic.cfg new file mode 100644 index 0000000..50fec96 --- /dev/null +++ b/.kokoro/samples/python3.6/periodic.cfg @@ -0,0 +1,6 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +env_vars: { + key: "INSTALL_LIBRARY_FROM_SOURCE" + value: "False" +} \ No newline at end of file diff --git a/.kokoro/samples/python3.6/presubmit.cfg b/.kokoro/samples/python3.6/presubmit.cfg new file mode 100644 index 0000000..a1c8d97 --- /dev/null +++ b/.kokoro/samples/python3.6/presubmit.cfg @@ -0,0 +1,6 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +env_vars: { + key: "INSTALL_LIBRARY_FROM_SOURCE" + value: "True" +} \ No newline at end of file diff --git a/.kokoro/samples/python3.7/common.cfg b/.kokoro/samples/python3.7/common.cfg new file mode 100644 index 0000000..bdef8c4 --- /dev/null +++ b/.kokoro/samples/python3.7/common.cfg @@ -0,0 +1,34 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Build logs will be here +action { + define_artifacts { + regex: "**/*sponge_log.xml" + } +} + +# Specify which tests to run +env_vars: { + key: "RUN_TESTS_SESSION" + value: "py-3.7" +} + +env_vars: { + key: "TRAMPOLINE_BUILD_FILE" + value: "github/python-secret-manager/.kokoro/test-samples.sh" +} + +# Configure the docker image for kokoro-trampoline. +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/python-samples-testing-docker" +} + +# Download secrets for samples +gfile_resources: "/bigstore/cloud-devrel-kokoro-resources/python-docs-samples" + +# Download trampoline resources. +gfile_resources: "/bigstore/cloud-devrel-kokoro-resources/trampoline" + +# Use the trampoline script to run in docker. +build_file: "python-secret-manager/.kokoro/trampoline.sh" \ No newline at end of file diff --git a/.kokoro/samples/python3.7/continuous.cfg b/.kokoro/samples/python3.7/continuous.cfg new file mode 100644 index 0000000..a1c8d97 --- /dev/null +++ b/.kokoro/samples/python3.7/continuous.cfg @@ -0,0 +1,6 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +env_vars: { + key: "INSTALL_LIBRARY_FROM_SOURCE" + value: "True" +} \ No newline at end of file diff --git a/.kokoro/samples/python3.7/periodic.cfg b/.kokoro/samples/python3.7/periodic.cfg new file mode 100644 index 0000000..50fec96 --- /dev/null +++ b/.kokoro/samples/python3.7/periodic.cfg @@ -0,0 +1,6 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +env_vars: { + key: "INSTALL_LIBRARY_FROM_SOURCE" + value: "False" +} \ No newline at end of file diff --git a/.kokoro/samples/python3.7/presubmit.cfg b/.kokoro/samples/python3.7/presubmit.cfg new file mode 100644 index 0000000..a1c8d97 --- /dev/null +++ b/.kokoro/samples/python3.7/presubmit.cfg @@ -0,0 +1,6 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +env_vars: { + key: "INSTALL_LIBRARY_FROM_SOURCE" + value: "True" +} \ No newline at end of file diff --git a/.kokoro/samples/python3.8/common.cfg b/.kokoro/samples/python3.8/common.cfg new file mode 100644 index 0000000..fd9715a --- /dev/null +++ b/.kokoro/samples/python3.8/common.cfg @@ -0,0 +1,34 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +# Build logs will be here +action { + define_artifacts { + regex: "**/*sponge_log.xml" + } +} + +# Specify which tests to run +env_vars: { + key: "RUN_TESTS_SESSION" + value: "py-3.8" +} + +env_vars: { + key: "TRAMPOLINE_BUILD_FILE" + value: "github/python-secret-manager/.kokoro/test-samples.sh" +} + +# Configure the docker image for kokoro-trampoline. +env_vars: { + key: "TRAMPOLINE_IMAGE" + value: "gcr.io/cloud-devrel-kokoro-resources/python-samples-testing-docker" +} + +# Download secrets for samples +gfile_resources: "/bigstore/cloud-devrel-kokoro-resources/python-docs-samples" + +# Download trampoline resources. +gfile_resources: "/bigstore/cloud-devrel-kokoro-resources/trampoline" + +# Use the trampoline script to run in docker. +build_file: "python-secret-manager/.kokoro/trampoline.sh" \ No newline at end of file diff --git a/.kokoro/samples/python3.8/continuous.cfg b/.kokoro/samples/python3.8/continuous.cfg new file mode 100644 index 0000000..a1c8d97 --- /dev/null +++ b/.kokoro/samples/python3.8/continuous.cfg @@ -0,0 +1,6 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +env_vars: { + key: "INSTALL_LIBRARY_FROM_SOURCE" + value: "True" +} \ No newline at end of file diff --git a/.kokoro/samples/python3.8/periodic.cfg b/.kokoro/samples/python3.8/periodic.cfg new file mode 100644 index 0000000..50fec96 --- /dev/null +++ b/.kokoro/samples/python3.8/periodic.cfg @@ -0,0 +1,6 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +env_vars: { + key: "INSTALL_LIBRARY_FROM_SOURCE" + value: "False" +} \ No newline at end of file diff --git a/.kokoro/samples/python3.8/presubmit.cfg b/.kokoro/samples/python3.8/presubmit.cfg new file mode 100644 index 0000000..a1c8d97 --- /dev/null +++ b/.kokoro/samples/python3.8/presubmit.cfg @@ -0,0 +1,6 @@ +# Format: //devtools/kokoro/config/proto/build.proto + +env_vars: { + key: "INSTALL_LIBRARY_FROM_SOURCE" + value: "True" +} \ No newline at end of file diff --git a/.kokoro/test-samples.sh b/.kokoro/test-samples.sh new file mode 100755 index 0000000..01bd589 --- /dev/null +++ b/.kokoro/test-samples.sh @@ -0,0 +1,104 @@ +#!/bin/bash +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# https://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + + +# `-e` enables the script to automatically fail when a command fails +# `-o pipefail` sets the exit code to the rightmost comment to exit with a non-zero +set -eo pipefail +# Enables `**` to include files nested inside sub-folders +shopt -s globstar + +cd github/python-secret-manager + +# Run periodic samples tests at latest release +if [[ $KOKORO_BUILD_ARTIFACTS_SUBDIR = *"periodic"* ]]; then + LATEST_RELEASE=$(git describe --abbrev=0 --tags) + git checkout $LATEST_RELEASE +fi + +# Disable buffering, so that the logs stream through. +export PYTHONUNBUFFERED=1 + +# Debug: show build environment +env | grep KOKORO + +# Install nox +python3.6 -m pip install --upgrade --quiet nox + +# Use secrets acessor service account to get secrets +if [[ -f "${KOKORO_GFILE_DIR}/secrets_viewer_service_account.json" ]]; then + gcloud auth activate-service-account \ + --key-file="${KOKORO_GFILE_DIR}/secrets_viewer_service_account.json" \ + --project="cloud-devrel-kokoro-resources" +fi + +# This script will create 3 files: +# - testing/test-env.sh +# - testing/service-account.json +# - testing/client-secrets.json +./scripts/decrypt-secrets.sh + +source ./testing/test-env.sh +export GOOGLE_APPLICATION_CREDENTIALS=$(pwd)/testing/service-account.json + +# For cloud-run session, we activate the service account for gcloud sdk. +gcloud auth activate-service-account \ + --key-file "${GOOGLE_APPLICATION_CREDENTIALS}" + +export GOOGLE_CLIENT_SECRETS=$(pwd)/testing/client-secrets.json + +echo -e "\n******************** TESTING PROJECTS ********************" + +# Switch to 'fail at end' to allow all tests to complete before exiting. +set +e +# Use RTN to return a non-zero value if the test fails. +RTN=0 +ROOT=$(pwd) +# Find all requirements.txt in the samples directory (may break on whitespace). +for file in samples/**/requirements.txt; do + cd "$ROOT" + # Navigate to the project folder. + file=$(dirname "$file") + cd "$file" + + echo "------------------------------------------------------------" + echo "- testing $file" + echo "------------------------------------------------------------" + + # Use nox to execute the tests for the project. + python3.6 -m nox -s "$RUN_TESTS_SESSION" + EXIT=$? + + # If this is a periodic build, send the test log to the Build Cop Bot. + # See https://github.com/googleapis/repo-automation-bots/tree/master/packages/buildcop. + if [[ $KOKORO_BUILD_ARTIFACTS_SUBDIR = *"periodic"* ]]; then + chmod +x $KOKORO_GFILE_DIR/linux_amd64/buildcop + $KOKORO_GFILE_DIR/linux_amd64/buildcop + fi + + if [[ $EXIT -ne 0 ]]; then + RTN=1 + echo -e "\n Testing failed: Nox returned a non-zero exit code. \n" + else + echo -e "\n Testing completed.\n" + fi + +done +cd "$ROOT" + +# Workaround for Kokoro permissions issue: delete secrets +rm testing/{test-env.sh,client-secrets.json,service-account.json} + +exit "$RTN" \ No newline at end of file diff --git a/MANIFEST.in b/MANIFEST.in index 68855ab..e9e29d1 100644 --- a/MANIFEST.in +++ b/MANIFEST.in @@ -20,3 +20,6 @@ recursive-include google *.json *.proto recursive-include tests * global-exclude *.py[co] global-exclude __pycache__ + +# Exclude scripts for samples readmegen +prune scripts/readme-gen \ No newline at end of file diff --git a/docs/conf.py b/docs/conf.py index 26233eb..df08df0 100644 --- a/docs/conf.py +++ b/docs/conf.py @@ -38,21 +38,18 @@ "sphinx.ext.napoleon", "sphinx.ext.todo", "sphinx.ext.viewcode", + "recommonmark", ] # autodoc/autosummary flags autoclass_content = "both" -autodoc_default_flags = ["members"] +autodoc_default_options = {"members": True} autosummary_generate = True # Add any paths that contain templates here, relative to this directory. templates_path = ["_templates"] -# Allow markdown includes (so releases.md can include CHANGLEOG.md) -# http://www.sphinx-doc.org/en/master/markdown.html -source_parsers = {".md": "recommonmark.parser.CommonMarkParser"} - # The suffix(es) of source filenames. # You can specify multiple suffix as a list of string: # source_suffix = ['.rst', '.md'] @@ -340,7 +337,7 @@ intersphinx_mapping = { "python": ("http://python.readthedocs.org/en/latest/", None), "google-auth": ("https://google-auth.readthedocs.io/en/stable", None), - "google.api_core": ("https://googleapis.dev/python/google-api-core/latest/", None), + "google.api_core": ("https://googleapis.dev/python/google-api-core/latest/", None,), "grpc": ("https://grpc.io/grpc/python/", None), } diff --git a/docs/index.rst b/docs/index.rst index fd9ab86..0d244ab 100644 --- a/docs/index.rst +++ b/docs/index.rst @@ -1,5 +1,7 @@ .. include:: README.rst +.. include:: multiprocessing.rst + v1 Api Reference ---------------- .. toctree:: diff --git a/docs/multiprocessing.rst b/docs/multiprocessing.rst new file mode 100644 index 0000000..1cb29d4 --- /dev/null +++ b/docs/multiprocessing.rst @@ -0,0 +1,7 @@ +.. note:: + + Because this client uses :mod:`grpcio` library, it is safe to + share instances across threads. In multiprocessing scenarios, the best + practice is to create client instances *after* the invocation of + :func:`os.fork` by :class:`multiprocessing.Pool` or + :class:`multiprocessing.Process`. diff --git a/google/cloud/secretmanager.py b/google/cloud/secretmanager.py index b691efa..f5b5f0d 100644 --- a/google/cloud/secretmanager.py +++ b/google/cloud/secretmanager.py @@ -22,4 +22,8 @@ from google.cloud.secretmanager_v1 import types -__all__ = ("enums", "types", "SecretManagerServiceClient") +__all__ = ( + "enums", + "types", + "SecretManagerServiceClient", +) diff --git a/google/cloud/secretmanager_v1/__init__.py b/google/cloud/secretmanager_v1/__init__.py index 8095975..c2d69d7 100644 --- a/google/cloud/secretmanager_v1/__init__.py +++ b/google/cloud/secretmanager_v1/__init__.py @@ -26,8 +26,8 @@ if sys.version_info[:2] == (2, 7): message = ( - "A future version of this library will drop support for Python 2.7." - "More details about Python 2 support for Google Cloud Client Libraries" + "A future version of this library will drop support for Python 2.7. " + "More details about Python 2 support for Google Cloud Client Libraries " "can be found at https://cloud.google.com/python/docs/python2-sunset/" ) warnings.warn(message, DeprecationWarning) @@ -40,4 +40,8 @@ class SecretManagerServiceClient( enums = enums -__all__ = ("enums", "types", "SecretManagerServiceClient") +__all__ = ( + "enums", + "types", + "SecretManagerServiceClient", +) diff --git a/google/cloud/secretmanager_v1/gapic/secret_manager_service_client.py b/google/cloud/secretmanager_v1/gapic/secret_manager_service_client.py index 3c33fa7..fcd3d12 100644 --- a/google/cloud/secretmanager_v1/gapic/secret_manager_service_client.py +++ b/google/cloud/secretmanager_v1/gapic/secret_manager_service_client.py @@ -47,7 +47,7 @@ _GAPIC_LIBRARY_VERSION = pkg_resources.get_distribution( - "google-cloud-secret-manager" + "google-cloud-secret-manager", ).version @@ -93,14 +93,14 @@ def from_service_account_file(cls, filename, *args, **kwargs): def project_path(cls, project): """Return a fully-qualified project string.""" return google.api_core.path_template.expand( - "projects/{project}", project=project + "projects/{project}", project=project, ) @classmethod def secret_path(cls, project, secret): """Return a fully-qualified secret string.""" return google.api_core.path_template.expand( - "projects/{project}/secrets/{secret}", project=project, secret=secret + "projects/{project}/secrets/{secret}", project=project, secret=secret, ) @classmethod @@ -200,12 +200,12 @@ def __init__( self.transport = transport else: self.transport = secret_manager_service_grpc_transport.SecretManagerServiceGrpcTransport( - address=api_endpoint, channel=channel, credentials=credentials + address=api_endpoint, channel=channel, credentials=credentials, ) if client_info is None: client_info = google.api_core.gapic_v1.client_info.ClientInfo( - gapic_version=_GAPIC_LIBRARY_VERSION + gapic_version=_GAPIC_LIBRARY_VERSION, ) else: client_info.gapic_version = _GAPIC_LIBRARY_VERSION @@ -216,7 +216,7 @@ def __init__( # (Ordinarily, these are the defaults specified in the `*_config.py` # file next to this one.) self._method_configs = google.api_core.gapic_v1.config.parse_method_configs( - client_config["interfaces"][self._INTERFACE_NAME] + client_config["interfaces"][self._INTERFACE_NAME], ) # Save a dictionary of cached API call functions. @@ -299,7 +299,7 @@ def list_secrets( client_info=self._client_info, ) - request = service_pb2.ListSecretsRequest(parent=parent, page_size=page_size) + request = service_pb2.ListSecretsRequest(parent=parent, page_size=page_size,) if metadata is None: metadata = [] metadata = list(metadata) @@ -398,7 +398,7 @@ def create_secret( ) request = service_pb2.CreateSecretRequest( - parent=parent, secret_id=secret_id, secret=secret + parent=parent, secret_id=secret_id, secret=secret, ) if metadata is None: metadata = [] @@ -478,7 +478,7 @@ def add_secret_version( client_info=self._client_info, ) - request = service_pb2.AddSecretVersionRequest(parent=parent, payload=payload) + request = service_pb2.AddSecretVersionRequest(parent=parent, payload=payload,) if metadata is None: metadata = [] metadata = list(metadata) @@ -548,7 +548,7 @@ def get_secret( client_info=self._client_info, ) - request = service_pb2.GetSecretRequest(name=name) + request = service_pb2.GetSecretRequest(name=name,) if metadata is None: metadata = [] metadata = list(metadata) @@ -630,7 +630,7 @@ def update_secret( ) request = service_pb2.UpdateSecretRequest( - secret=secret, update_mask=update_mask + secret=secret, update_mask=update_mask, ) if metadata is None: metadata = [] @@ -698,7 +698,7 @@ def delete_secret( client_info=self._client_info, ) - request = service_pb2.DeleteSecretRequest(name=name) + request = service_pb2.DeleteSecretRequest(name=name,) if metadata is None: metadata = [] metadata = list(metadata) @@ -790,7 +790,7 @@ def list_secret_versions( ) request = service_pb2.ListSecretVersionsRequest( - parent=parent, page_size=page_size + parent=parent, page_size=page_size, ) if metadata is None: metadata = [] @@ -877,7 +877,7 @@ def get_secret_version( client_info=self._client_info, ) - request = service_pb2.GetSecretVersionRequest(name=name) + request = service_pb2.GetSecretVersionRequest(name=name,) if metadata is None: metadata = [] metadata = list(metadata) @@ -950,7 +950,7 @@ def access_secret_version( client_info=self._client_info, ) - request = service_pb2.AccessSecretVersionRequest(name=name) + request = service_pb2.AccessSecretVersionRequest(name=name,) if metadata is None: metadata = [] metadata = list(metadata) @@ -1022,7 +1022,7 @@ def disable_secret_version( client_info=self._client_info, ) - request = service_pb2.DisableSecretVersionRequest(name=name) + request = service_pb2.DisableSecretVersionRequest(name=name,) if metadata is None: metadata = [] metadata = list(metadata) @@ -1094,7 +1094,7 @@ def enable_secret_version( client_info=self._client_info, ) - request = service_pb2.EnableSecretVersionRequest(name=name) + request = service_pb2.EnableSecretVersionRequest(name=name,) if metadata is None: metadata = [] metadata = list(metadata) @@ -1167,7 +1167,7 @@ def destroy_secret_version( client_info=self._client_info, ) - request = service_pb2.DestroySecretVersionRequest(name=name) + request = service_pb2.DestroySecretVersionRequest(name=name,) if metadata is None: metadata = [] metadata = list(metadata) @@ -1253,7 +1253,7 @@ def set_iam_policy( client_info=self._client_info, ) - request = iam_policy_pb2.SetIamPolicyRequest(resource=resource, policy=policy) + request = iam_policy_pb2.SetIamPolicyRequest(resource=resource, policy=policy,) if metadata is None: metadata = [] metadata = list(metadata) @@ -1332,7 +1332,7 @@ def get_iam_policy( ) request = iam_policy_pb2.GetIamPolicyRequest( - resource=resource, options=options_ + resource=resource, options=options_, ) if metadata is None: metadata = [] @@ -1419,7 +1419,7 @@ def test_iam_permissions( ) request = iam_policy_pb2.TestIamPermissionsRequest( - resource=resource, permissions=permissions + resource=resource, permissions=permissions, ) if metadata is None: metadata = [] diff --git a/google/cloud/secretmanager_v1/gapic/secret_manager_service_client_config.py b/google/cloud/secretmanager_v1/gapic/secret_manager_service_client_config.py index e8be643..513bbef 100644 --- a/google/cloud/secretmanager_v1/gapic/secret_manager_service_client_config.py +++ b/google/cloud/secretmanager_v1/gapic/secret_manager_service_client_config.py @@ -2,95 +2,114 @@ "interfaces": { "google.cloud.secretmanager.v1.SecretManagerService": { "retry_codes": { - "idempotent": ["DEADLINE_EXCEEDED", "UNAVAILABLE"], - "non_idempotent": [], + "retry_policy_1_codes": ["UNAVAILABLE", "UNKNOWN"], + "no_retry_codes": [], + "no_retry_1_codes": [], }, "retry_params": { - "default": { - "initial_retry_delay_millis": 100, + "retry_policy_1_params": { + "initial_retry_delay_millis": 1000, "retry_delay_multiplier": 1.3, "max_retry_delay_millis": 60000, - "initial_rpc_timeout_millis": 20000, + "initial_rpc_timeout_millis": 60000, "rpc_timeout_multiplier": 1.0, - "max_rpc_timeout_millis": 20000, - "total_timeout_millis": 600000, - } + "max_rpc_timeout_millis": 60000, + "total_timeout_millis": 60000, + }, + "no_retry_params": { + "initial_retry_delay_millis": 0, + "retry_delay_multiplier": 0.0, + "max_retry_delay_millis": 0, + "initial_rpc_timeout_millis": 0, + "rpc_timeout_multiplier": 1.0, + "max_rpc_timeout_millis": 0, + "total_timeout_millis": 0, + }, + "no_retry_1_params": { + "initial_retry_delay_millis": 0, + "retry_delay_multiplier": 0.0, + "max_retry_delay_millis": 0, + "initial_rpc_timeout_millis": 60000, + "rpc_timeout_multiplier": 1.0, + "max_rpc_timeout_millis": 60000, + "total_timeout_millis": 60000, + }, }, "methods": { "ListSecrets": { "timeout_millis": 60000, - "retry_codes_name": "idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "CreateSecret": { "timeout_millis": 60000, - "retry_codes_name": "non_idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "AddSecretVersion": { "timeout_millis": 60000, - "retry_codes_name": "non_idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "GetSecret": { "timeout_millis": 60000, - "retry_codes_name": "idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "UpdateSecret": { "timeout_millis": 60000, - "retry_codes_name": "non_idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "DeleteSecret": { "timeout_millis": 60000, - "retry_codes_name": "non_idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "ListSecretVersions": { "timeout_millis": 60000, - "retry_codes_name": "idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "GetSecretVersion": { "timeout_millis": 60000, - "retry_codes_name": "idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "AccessSecretVersion": { "timeout_millis": 60000, - "retry_codes_name": "idempotent", - "retry_params_name": "default", + "retry_codes_name": "retry_policy_1_codes", + "retry_params_name": "retry_policy_1_params", }, "DisableSecretVersion": { "timeout_millis": 60000, - "retry_codes_name": "non_idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "EnableSecretVersion": { "timeout_millis": 60000, - "retry_codes_name": "non_idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "DestroySecretVersion": { "timeout_millis": 60000, - "retry_codes_name": "non_idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "SetIamPolicy": { "timeout_millis": 60000, - "retry_codes_name": "non_idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "GetIamPolicy": { "timeout_millis": 60000, - "retry_codes_name": "idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "TestIamPermissions": { "timeout_millis": 60000, - "retry_codes_name": "non_idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, }, } diff --git a/google/cloud/secretmanager_v1/gapic/transports/secret_manager_service_grpc_transport.py b/google/cloud/secretmanager_v1/gapic/transports/secret_manager_service_grpc_transport.py index 7d45544..edb4642 100644 --- a/google/cloud/secretmanager_v1/gapic/transports/secret_manager_service_grpc_transport.py +++ b/google/cloud/secretmanager_v1/gapic/transports/secret_manager_service_grpc_transport.py @@ -53,7 +53,7 @@ def __init__( # exception (channels come with credentials baked in already). if channel is not None and credentials is not None: raise ValueError( - "The `channel` and `credentials` arguments are mutually " "exclusive." + "The `channel` and `credentials` arguments are mutually " "exclusive.", ) # Create the channel. @@ -74,7 +74,7 @@ def __init__( self._stubs = { "secret_manager_service_stub": service_pb2_grpc.SecretManagerServiceStub( channel - ) + ), } @classmethod diff --git a/google/cloud/secretmanager_v1/proto/resources_pb2.py b/google/cloud/secretmanager_v1/proto/resources_pb2.py index 7659210..4664373 100644 --- a/google/cloud/secretmanager_v1/proto/resources_pb2.py +++ b/google/cloud/secretmanager_v1/proto/resources_pb2.py @@ -16,7 +16,7 @@ # Generated by the protocol buffer compiler. DO NOT EDIT! # source: google/cloud/secretmanager_v1/proto/resources.proto - +"""Generated protocol buffer code.""" from google.protobuf import descriptor as _descriptor from google.protobuf import message as _message from google.protobuf import reflection as _reflection @@ -38,6 +38,7 @@ package="google.cloud.secretmanager.v1", syntax="proto3", serialized_options=b"\n!com.google.cloud.secretmanager.v1B\016ResourcesProtoP\001ZJgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1;secretmanager\370\001\001\242\002\003GSM\252\002\035Google.Cloud.SecretManager.V1\312\002\035Google\\Cloud\\SecretManager\\V1\352\002 Google::Cloud::SecretManager::V1", + create_key=_descriptor._internal_create_key, serialized_pb=b'\n3google/cloud/secretmanager_v1/proto/resources.proto\x12\x1dgoogle.cloud.secretmanager.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1cgoogle/api/annotations.proto"\xdb\x02\n\x06Secret\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12G\n\x0breplication\x18\x02 \x01(\x0b\x32*.google.cloud.secretmanager.v1.ReplicationB\x06\xe0\x41\x05\xe0\x41\x02\x12\x34\n\x0b\x63reate_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x41\n\x06labels\x18\x04 \x03(\x0b\x32\x31.google.cloud.secretmanager.v1.Secret.LabelsEntry\x1a-\n\x0bLabelsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01:M\xea\x41J\n#secretmanager.googleapis.com/Secret\x12#projects/{project}/secrets/{secret}"\x91\x03\n\rSecretVersion\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x35\n\x0c\x64\x65stroy_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x46\n\x05state\x18\x04 \x01(\x0e\x32\x32.google.cloud.secretmanager.v1.SecretVersion.StateB\x03\xe0\x41\x03"H\n\x05State\x12\x15\n\x11STATE_UNSPECIFIED\x10\x00\x12\x0b\n\x07\x45NABLED\x10\x01\x12\x0c\n\x08\x44ISABLED\x10\x02\x12\r\n\tDESTROYED\x10\x03:n\xea\x41k\n*secretmanager.googleapis.com/SecretVersion\x12=projects/{project}/secrets/{secret}/versions/{secret_version}"\xc8\x02\n\x0bReplication\x12I\n\tautomatic\x18\x01 \x01(\x0b\x32\x34.google.cloud.secretmanager.v1.Replication.AutomaticH\x00\x12N\n\x0cuser_managed\x18\x02 \x01(\x0b\x32\x36.google.cloud.secretmanager.v1.Replication.UserManagedH\x00\x1a\x0b\n\tAutomatic\x1a\x81\x01\n\x0bUserManaged\x12U\n\x08replicas\x18\x01 \x03(\x0b\x32>.google.cloud.secretmanager.v1.Replication.UserManaged.ReplicaB\x03\xe0\x41\x02\x1a\x1b\n\x07Replica\x12\x10\n\x08location\x18\x01 \x01(\tB\r\n\x0breplication"\x1d\n\rSecretPayload\x12\x0c\n\x04\x64\x61ta\x18\x01 \x01(\x0c\x42\xed\x01\n!com.google.cloud.secretmanager.v1B\x0eResourcesProtoP\x01ZJgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1;secretmanager\xf8\x01\x01\xa2\x02\x03GSM\xaa\x02\x1dGoogle.Cloud.SecretManager.V1\xca\x02\x1dGoogle\\Cloud\\SecretManager\\V1\xea\x02 Google::Cloud::SecretManager::V1b\x06proto3', dependencies=[ google_dot_api_dot_field__behavior__pb2.DESCRIPTOR, @@ -53,6 +54,7 @@ full_name="google.cloud.secretmanager.v1.SecretVersion.State", filename=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, values=[ _descriptor.EnumValueDescriptor( name="STATE_UNSPECIFIED", @@ -60,15 +62,31 @@ number=0, serialized_options=None, type=None, + create_key=_descriptor._internal_create_key, ), _descriptor.EnumValueDescriptor( - name="ENABLED", index=1, number=1, serialized_options=None, type=None + name="ENABLED", + index=1, + number=1, + serialized_options=None, + type=None, + create_key=_descriptor._internal_create_key, ), _descriptor.EnumValueDescriptor( - name="DISABLED", index=2, number=2, serialized_options=None, type=None + name="DISABLED", + index=2, + number=2, + serialized_options=None, + type=None, + create_key=_descriptor._internal_create_key, ), _descriptor.EnumValueDescriptor( - name="DESTROYED", index=3, number=3, serialized_options=None, type=None + name="DESTROYED", + index=3, + number=3, + serialized_options=None, + type=None, + create_key=_descriptor._internal_create_key, ), ], containing_type=None, @@ -85,6 +103,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="key", @@ -103,6 +122,7 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="value", @@ -121,6 +141,7 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], @@ -141,6 +162,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="name", @@ -159,6 +181,7 @@ extension_scope=None, serialized_options=b"\340A\003", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="replication", @@ -177,6 +200,7 @@ extension_scope=None, serialized_options=b"\340A\005\340A\002", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="create_time", @@ -195,6 +219,7 @@ extension_scope=None, serialized_options=b"\340A\003", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="labels", @@ -213,10 +238,11 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], - nested_types=[_SECRET_LABELSENTRY], + nested_types=[_SECRET_LABELSENTRY,], enum_types=[], serialized_options=b"\352AJ\n#secretmanager.googleapis.com/Secret\022#projects/{project}/secrets/{secret}", is_extendable=False, @@ -234,6 +260,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="name", @@ -252,6 +279,7 @@ extension_scope=None, serialized_options=b"\340A\003", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="create_time", @@ -270,6 +298,7 @@ extension_scope=None, serialized_options=b"\340A\003", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="destroy_time", @@ -288,6 +317,7 @@ extension_scope=None, serialized_options=b"\340A\003", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="state", @@ -306,11 +336,12 @@ extension_scope=None, serialized_options=b"\340A\003", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], nested_types=[], - enum_types=[_SECRETVERSION_STATE], + enum_types=[_SECRETVERSION_STATE,], serialized_options=b"\352Ak\n*secretmanager.googleapis.com/SecretVersion\022=projects/{project}/secrets/{secret}/versions/{secret_version}", is_extendable=False, syntax="proto3", @@ -327,6 +358,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[], extensions=[], nested_types=[], @@ -346,6 +378,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="location", @@ -364,7 +397,8 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, - ) + create_key=_descriptor._internal_create_key, + ), ], extensions=[], nested_types=[], @@ -384,6 +418,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="replicas", @@ -402,10 +437,11 @@ extension_scope=None, serialized_options=b"\340A\002", file=DESCRIPTOR, - ) + create_key=_descriptor._internal_create_key, + ), ], extensions=[], - nested_types=[_REPLICATION_USERMANAGED_REPLICA], + nested_types=[_REPLICATION_USERMANAGED_REPLICA,], enum_types=[], serialized_options=None, is_extendable=False, @@ -422,6 +458,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="automatic", @@ -440,6 +477,7 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="user_managed", @@ -458,10 +496,11 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], - nested_types=[_REPLICATION_AUTOMATIC, _REPLICATION_USERMANAGED], + nested_types=[_REPLICATION_AUTOMATIC, _REPLICATION_USERMANAGED,], enum_types=[], serialized_options=None, is_extendable=False, @@ -473,8 +512,9 @@ full_name="google.cloud.secretmanager.v1.Replication.replication", index=0, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[], - ) + ), ], serialized_start=964, serialized_end=1292, @@ -487,6 +527,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="data", @@ -505,7 +546,8 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, - ) + create_key=_descriptor._internal_create_key, + ), ], extensions=[], nested_types=[], @@ -574,13 +616,11 @@ ), "DESCRIPTOR": _SECRET, "__module__": "google.cloud.secretmanager_v1.proto.resources_pb2", - "__doc__": """A [Secret][google.cloud.secretmanager.v1.Secret] is a - logical secret whose value and versions can be accessed. - - A [Secret][google.cloud.secretmanager.v1.Secret] is made up of zero or - more [SecretVersions][google.cloud.secretmanager.v1.SecretVersion] that - represent the secret data. - + "__doc__": """A [Secret][google.cloud.secretmanager.v1.Secret] is a logical secret + whose value and versions can be accessed. A + [Secret][google.cloud.secretmanager.v1.Secret] is made up of zero or + more [SecretVersions][google.cloud.secretmanager.v1.SecretVersion] + that represent the secret data. Attributes: name: @@ -622,7 +662,6 @@ "__module__": "google.cloud.secretmanager_v1.proto.resources_pb2", "__doc__": """A secret version resource in the Secret Manager API. - Attributes: name: Output only. The resource name of the @@ -664,9 +703,7 @@ "__module__": "google.cloud.secretmanager_v1.proto.resources_pb2", "__doc__": """A replication policy that replicates the [Secret][google.cloud.secretmanager.v1.Secret] payload without any - restrictions. - - """, + restrictions.""", # @@protoc_insertion_point(class_scope:google.cloud.secretmanager.v1.Replication.Automatic) }, ), @@ -683,7 +720,6 @@ "__doc__": """Represents a Replica for this [Secret][google.cloud.secretmanager.v1.Secret]. - Attributes: location: The canonical IDs of the location to replicate data. For @@ -698,7 +734,6 @@ [Secret][google.cloud.secretmanager.v1.Secret] payload into the locations specified in [Secret.replication.user_managed.replicas][] - Attributes: replicas: Required. The list of Replicas for this @@ -712,7 +747,6 @@ "__module__": "google.cloud.secretmanager_v1.proto.resources_pb2", "__doc__": """A policy that defines the replication configuration of data. - Attributes: replication: The replication policy for this secret. @@ -737,11 +771,10 @@ { "DESCRIPTOR": _SECRETPAYLOAD, "__module__": "google.cloud.secretmanager_v1.proto.resources_pb2", - "__doc__": """A secret payload resource in the Secret Manager API. This - contains the sensitive secret data that is associated with a + "__doc__": """A secret payload resource in the Secret Manager API. This contains the + sensitive secret payload that is associated with a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. - Attributes: data: The secret data. Must be no larger than 64KiB. diff --git a/google/cloud/secretmanager_v1/proto/resources_pb2_grpc.py b/google/cloud/secretmanager_v1/proto/resources_pb2_grpc.py index b662812..8a93939 100644 --- a/google/cloud/secretmanager_v1/proto/resources_pb2_grpc.py +++ b/google/cloud/secretmanager_v1/proto/resources_pb2_grpc.py @@ -1,17 +1,3 @@ -# Copyright 2020 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - # Generated by the gRPC Python protocol compiler plugin. DO NOT EDIT! - +"""Client and server classes corresponding to protobuf-defined services.""" import grpc diff --git a/google/cloud/secretmanager_v1/proto/service_pb2.py b/google/cloud/secretmanager_v1/proto/service_pb2.py index 5220b2f..0cb47e8 100644 --- a/google/cloud/secretmanager_v1/proto/service_pb2.py +++ b/google/cloud/secretmanager_v1/proto/service_pb2.py @@ -16,7 +16,7 @@ # Generated by the protocol buffer compiler. DO NOT EDIT! # source: google/cloud/secretmanager_v1/proto/service.proto - +"""Generated protocol buffer code.""" from google.protobuf import descriptor as _descriptor from google.protobuf import message as _message from google.protobuf import reflection as _reflection @@ -45,6 +45,7 @@ package="google.cloud.secretmanager.v1", syntax="proto3", serialized_options=b"\n!com.google.cloud.secretmanager.v1B\014ServiceProtoP\001ZJgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1;secretmanager\370\001\001\242\002\003GSM\252\002\035Google.Cloud.SecretManager.V1\312\002\035Google\\Cloud\\SecretManager\\V1\352\002 Google::Cloud::SecretManager::V1", + create_key=_descriptor._internal_create_key, serialized_pb=b'\n1google/cloud/secretmanager_v1/proto/service.proto\x12\x1dgoogle.cloud.secretmanager.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x33google/cloud/secretmanager_v1/proto/resources.proto\x1a\x1egoogle/iam/v1/iam_policy.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a\x1bgoogle/protobuf/empty.proto\x1a google/protobuf/field_mask.proto"\x8a\x01\n\x12ListSecretsRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01"z\n\x13ListSecretsResponse\x12\x36\n\x07secrets\x18\x01 \x03(\x0b\x32%.google.cloud.secretmanager.v1.Secret\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05"\xae\x01\n\x13\x43reateSecretRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x16\n\tsecret_id\x18\x02 \x01(\tB\x03\xe0\x41\x02\x12:\n\x06secret\x18\x03 \x01(\x0b\x32%.google.cloud.secretmanager.v1.SecretB\x03\xe0\x41\x02"\x9a\x01\n\x17\x41\x64\x64SecretVersionRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x42\n\x07payload\x18\x02 \x01(\x0b\x32,.google.cloud.secretmanager.v1.SecretPayloadB\x03\xe0\x41\x02"M\n\x10GetSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret"\x89\x01\n\x19ListSecretVersionsRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01"\x89\x01\n\x1aListSecretVersionsResponse\x12>\n\x08versions\x18\x01 \x03(\x0b\x32,.google.cloud.secretmanager.v1.SecretVersion\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05"[\n\x17GetSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"\x87\x01\n\x13UpdateSecretRequest\x12:\n\x06secret\x18\x01 \x01(\x0b\x32%.google.cloud.secretmanager.v1.SecretB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02"^\n\x1a\x41\x63\x63\x65ssSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"\x9b\x01\n\x1b\x41\x63\x63\x65ssSecretVersionResponse\x12=\n\x04name\x18\x01 \x01(\tB/\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12=\n\x07payload\x18\x02 \x01(\x0b\x32,.google.cloud.secretmanager.v1.SecretPayload"P\n\x13\x44\x65leteSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret"_\n\x1b\x44isableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"^\n\x1a\x45nableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"_\n\x1b\x44\x65stroySecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion2\xcf\x15\n\x14SecretManagerService\x12\xa6\x01\n\x0bListSecrets\x12\x31.google.cloud.secretmanager.v1.ListSecretsRequest\x1a\x32.google.cloud.secretmanager.v1.ListSecretsResponse"0\x82\xd3\xe4\x93\x02!\x12\x1f/v1/{parent=projects/*}/secrets\xda\x41\x06parent\x12\xb4\x01\n\x0c\x43reateSecret\x12\x32.google.cloud.secretmanager.v1.CreateSecretRequest\x1a%.google.cloud.secretmanager.v1.Secret"I\x82\xd3\xe4\x93\x02)"\x1f/v1/{parent=projects/*}/secrets:\x06secret\xda\x41\x17parent,secret_id,secret\x12\xc2\x01\n\x10\x41\x64\x64SecretVersion\x12\x36.google.cloud.secretmanager.v1.AddSecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion"H\x82\xd3\xe4\x93\x02\x31",/v1/{parent=projects/*/secrets/*}:addVersion:\x01*\xda\x41\x0eparent,payload\x12\x93\x01\n\tGetSecret\x12/.google.cloud.secretmanager.v1.GetSecretRequest\x1a%.google.cloud.secretmanager.v1.Secret".\x82\xd3\xe4\x93\x02!\x12\x1f/v1/{name=projects/*/secrets/*}\xda\x41\x04name\x12\xb6\x01\n\x0cUpdateSecret\x12\x32.google.cloud.secretmanager.v1.UpdateSecretRequest\x1a%.google.cloud.secretmanager.v1.Secret"K\x82\xd3\xe4\x93\x02\x30\x32&/v1/{secret.name=projects/*/secrets/*}:\x06secret\xda\x41\x12secret,update_mask\x12\x8a\x01\n\x0c\x44\x65leteSecret\x12\x32.google.cloud.secretmanager.v1.DeleteSecretRequest\x1a\x16.google.protobuf.Empty".\x82\xd3\xe4\x93\x02!*\x1f/v1/{name=projects/*/secrets/*}\xda\x41\x04name\x12\xc6\x01\n\x12ListSecretVersions\x12\x38.google.cloud.secretmanager.v1.ListSecretVersionsRequest\x1a\x39.google.cloud.secretmanager.v1.ListSecretVersionsResponse";\x82\xd3\xe4\x93\x02,\x12*/v1/{parent=projects/*/secrets/*}/versions\xda\x41\x06parent\x12\xb3\x01\n\x10GetSecretVersion\x12\x36.google.cloud.secretmanager.v1.GetSecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion"9\x82\xd3\xe4\x93\x02,\x12*/v1/{name=projects/*/secrets/*/versions/*}\xda\x41\x04name\x12\xce\x01\n\x13\x41\x63\x63\x65ssSecretVersion\x12\x39.google.cloud.secretmanager.v1.AccessSecretVersionRequest\x1a:.google.cloud.secretmanager.v1.AccessSecretVersionResponse"@\x82\xd3\xe4\x93\x02\x33\x12\x31/v1/{name=projects/*/secrets/*/versions/*}:access\xda\x41\x04name\x12\xc6\x01\n\x14\x44isableSecretVersion\x12:.google.cloud.secretmanager.v1.DisableSecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion"D\x82\xd3\xe4\x93\x02\x37"2/v1/{name=projects/*/secrets/*/versions/*}:disable:\x01*\xda\x41\x04name\x12\xc3\x01\n\x13\x45nableSecretVersion\x12\x39.google.cloud.secretmanager.v1.EnableSecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion"C\x82\xd3\xe4\x93\x02\x36"1/v1/{name=projects/*/secrets/*/versions/*}:enable:\x01*\xda\x41\x04name\x12\xc6\x01\n\x14\x44\x65stroySecretVersion\x12:.google.cloud.secretmanager.v1.DestroySecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion"D\x82\xd3\xe4\x93\x02\x37"2/v1/{name=projects/*/secrets/*/versions/*}:destroy:\x01*\xda\x41\x04name\x12\x86\x01\n\x0cSetIamPolicy\x12".google.iam.v1.SetIamPolicyRequest\x1a\x15.google.iam.v1.Policy";\x82\xd3\xe4\x93\x02\x35"0/v1/{resource=projects/*/secrets/*}:setIamPolicy:\x01*\x12\x83\x01\n\x0cGetIamPolicy\x12".google.iam.v1.GetIamPolicyRequest\x1a\x15.google.iam.v1.Policy"8\x82\xd3\xe4\x93\x02\x32\x12\x30/v1/{resource=projects/*/secrets/*}:getIamPolicy\x12\xac\x01\n\x12TestIamPermissions\x12(.google.iam.v1.TestIamPermissionsRequest\x1a).google.iam.v1.TestIamPermissionsResponse"A\x82\xd3\xe4\x93\x02;"6/v1/{resource=projects/*/secrets/*}:testIamPermissions:\x01*\x1aP\xca\x41\x1csecretmanager.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\xeb\x01\n!com.google.cloud.secretmanager.v1B\x0cServiceProtoP\x01ZJgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1;secretmanager\xf8\x01\x01\xa2\x02\x03GSM\xaa\x02\x1dGoogle.Cloud.SecretManager.V1\xca\x02\x1dGoogle\\Cloud\\SecretManager\\V1\xea\x02 Google::Cloud::SecretManager::V1b\x06proto3', dependencies=[ google_dot_api_dot_annotations__pb2.DESCRIPTOR, @@ -66,6 +67,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="parent", @@ -84,6 +86,7 @@ extension_scope=None, serialized_options=b"\340A\002\372A-\n+cloudresourcemanager.googleapis.com/Project", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="page_size", @@ -102,6 +105,7 @@ extension_scope=None, serialized_options=b"\340A\001", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="page_token", @@ -120,6 +124,7 @@ extension_scope=None, serialized_options=b"\340A\001", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], @@ -141,6 +146,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="secrets", @@ -159,6 +165,7 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="next_page_token", @@ -177,6 +184,7 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="total_size", @@ -195,6 +203,7 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], @@ -216,6 +225,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="parent", @@ -234,6 +244,7 @@ extension_scope=None, serialized_options=b"\340A\002\372A-\n+cloudresourcemanager.googleapis.com/Project", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="secret_id", @@ -252,6 +263,7 @@ extension_scope=None, serialized_options=b"\340A\002", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="secret", @@ -270,6 +282,7 @@ extension_scope=None, serialized_options=b"\340A\002", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], @@ -291,6 +304,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="parent", @@ -309,6 +323,7 @@ extension_scope=None, serialized_options=b"\340A\002\372A%\n#secretmanager.googleapis.com/Secret", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="payload", @@ -327,6 +342,7 @@ extension_scope=None, serialized_options=b"\340A\002", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], @@ -348,6 +364,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="name", @@ -366,7 +383,8 @@ extension_scope=None, serialized_options=b"\340A\002\372A%\n#secretmanager.googleapis.com/Secret", file=DESCRIPTOR, - ) + create_key=_descriptor._internal_create_key, + ), ], extensions=[], nested_types=[], @@ -387,6 +405,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="parent", @@ -405,6 +424,7 @@ extension_scope=None, serialized_options=b"\340A\002\372A%\n#secretmanager.googleapis.com/Secret", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="page_size", @@ -423,6 +443,7 @@ extension_scope=None, serialized_options=b"\340A\001", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="page_token", @@ -441,6 +462,7 @@ extension_scope=None, serialized_options=b"\340A\001", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], @@ -462,6 +484,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="versions", @@ -480,6 +503,7 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="next_page_token", @@ -498,6 +522,7 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="total_size", @@ -516,6 +541,7 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], @@ -537,6 +563,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="name", @@ -555,7 +582,8 @@ extension_scope=None, serialized_options=b"\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, - ) + create_key=_descriptor._internal_create_key, + ), ], extensions=[], nested_types=[], @@ -576,6 +604,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="secret", @@ -594,6 +623,7 @@ extension_scope=None, serialized_options=b"\340A\002", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="update_mask", @@ -612,6 +642,7 @@ extension_scope=None, serialized_options=b"\340A\002", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], @@ -633,6 +664,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="name", @@ -651,7 +683,8 @@ extension_scope=None, serialized_options=b"\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, - ) + create_key=_descriptor._internal_create_key, + ), ], extensions=[], nested_types=[], @@ -672,6 +705,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="name", @@ -690,6 +724,7 @@ extension_scope=None, serialized_options=b"\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="payload", @@ -708,6 +743,7 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], @@ -729,6 +765,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="name", @@ -747,7 +784,8 @@ extension_scope=None, serialized_options=b"\340A\002\372A%\n#secretmanager.googleapis.com/Secret", file=DESCRIPTOR, - ) + create_key=_descriptor._internal_create_key, + ), ], extensions=[], nested_types=[], @@ -768,6 +806,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="name", @@ -786,7 +825,8 @@ extension_scope=None, serialized_options=b"\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, - ) + create_key=_descriptor._internal_create_key, + ), ], extensions=[], nested_types=[], @@ -807,6 +847,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="name", @@ -825,7 +866,8 @@ extension_scope=None, serialized_options=b"\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, - ) + create_key=_descriptor._internal_create_key, + ), ], extensions=[], nested_types=[], @@ -846,6 +888,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="name", @@ -864,7 +907,8 @@ extension_scope=None, serialized_options=b"\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, - ) + create_key=_descriptor._internal_create_key, + ), ], extensions=[], nested_types=[], @@ -948,9 +992,8 @@ { "DESCRIPTOR": _LISTSECRETSREQUEST, "__module__": "google.cloud.secretmanager_v1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.ListSecrets][google.cloud.secretmanager.v1.SecretManagerService.ListSecrets]. - + "__doc__": """Request message for [SecretManagerService.ListSecrets][google.cloud.se + cretmanager.v1.SecretManagerService.ListSecrets]. Attributes: parent: @@ -978,9 +1021,8 @@ { "DESCRIPTOR": _LISTSECRETSRESPONSE, "__module__": "google.cloud.secretmanager_v1.proto.service_pb2", - "__doc__": """Response message for - [SecretManagerService.ListSecrets][google.cloud.secretmanager.v1.SecretManagerService.ListSecrets]. - + "__doc__": """Response message for [SecretManagerService.ListSecrets][google.cloud.s + ecretmanager.v1.SecretManagerService.ListSecrets]. Attributes: secrets: @@ -1005,9 +1047,8 @@ { "DESCRIPTOR": _CREATESECRETREQUEST, "__module__": "google.cloud.secretmanager_v1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.CreateSecret][google.cloud.secretmanager.v1.SecretManagerService.CreateSecret]. - + "__doc__": """Request message for [SecretManagerService.CreateSecret][google.cloud.s + ecretmanager.v1.SecretManagerService.CreateSecret]. Attributes: parent: @@ -1034,9 +1075,8 @@ { "DESCRIPTOR": _ADDSECRETVERSIONREQUEST, "__module__": "google.cloud.secretmanager_v1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.AddSecretVersion][google.cloud.secretmanager.v1.SecretManagerService.AddSecretVersion]. - + "__doc__": """Request message for [SecretManagerService.AddSecretVersion][google.clo + ud.secretmanager.v1.SecretManagerService.AddSecretVersion]. Attributes: parent: @@ -1060,9 +1100,8 @@ { "DESCRIPTOR": _GETSECRETREQUEST, "__module__": "google.cloud.secretmanager_v1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.GetSecret][google.cloud.secretmanager.v1.SecretManagerService.GetSecret]. - + "__doc__": """Request message for [SecretManagerService.GetSecret][google.cloud.secr + etmanager.v1.SecretManagerService.GetSecret]. Attributes: name: @@ -1081,9 +1120,8 @@ { "DESCRIPTOR": _LISTSECRETVERSIONSREQUEST, "__module__": "google.cloud.secretmanager_v1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.ListSecretVersions][google.cloud.secretmanager.v1.SecretManagerService.ListSecretVersions]. - + "__doc__": """Request message for [SecretManagerService.ListSecretVersions][google.c + loud.secretmanager.v1.SecretManagerService.ListSecretVersions]. Attributes: parent: @@ -1112,9 +1150,8 @@ { "DESCRIPTOR": _LISTSECRETVERSIONSRESPONSE, "__module__": "google.cloud.secretmanager_v1.proto.service_pb2", - "__doc__": """Response message for - [SecretManagerService.ListSecretVersions][google.cloud.secretmanager.v1.SecretManagerService.ListSecretVersions]. - + "__doc__": """Response message for [SecretManagerService.ListSecretVersions][google. + cloud.secretmanager.v1.SecretManagerService.ListSecretVersions]. Attributes: versions: @@ -1141,9 +1178,8 @@ { "DESCRIPTOR": _GETSECRETVERSIONREQUEST, "__module__": "google.cloud.secretmanager_v1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.GetSecretVersion][google.cloud.secretmanager.v1.SecretManagerService.GetSecretVersion]. - + "__doc__": """Request message for [SecretManagerService.GetSecretVersion][google.clo + ud.secretmanager.v1.SecretManagerService.GetSecretVersion]. Attributes: name: @@ -1165,9 +1201,8 @@ { "DESCRIPTOR": _UPDATESECRETREQUEST, "__module__": "google.cloud.secretmanager_v1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.UpdateSecret][google.cloud.secretmanager.v1.SecretManagerService.UpdateSecret]. - + "__doc__": """Request message for [SecretManagerService.UpdateSecret][google.cloud.s + ecretmanager.v1.SecretManagerService.UpdateSecret]. Attributes: secret: @@ -1187,9 +1222,8 @@ { "DESCRIPTOR": _ACCESSSECRETVERSIONREQUEST, "__module__": "google.cloud.secretmanager_v1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.AccessSecretVersion][google.cloud.secretmanager.v1.SecretManagerService.AccessSecretVersion]. - + "__doc__": """Request message for [SecretManagerService.AccessSecretVersion][google. + cloud.secretmanager.v1.SecretManagerService.AccessSecretVersion]. Attributes: name: @@ -1208,9 +1242,8 @@ { "DESCRIPTOR": _ACCESSSECRETVERSIONRESPONSE, "__module__": "google.cloud.secretmanager_v1.proto.service_pb2", - "__doc__": """Response message for - [SecretManagerService.AccessSecretVersion][google.cloud.secretmanager.v1.SecretManagerService.AccessSecretVersion]. - + "__doc__": """Response message for [SecretManagerService.AccessSecretVersion][google + .cloud.secretmanager.v1.SecretManagerService.AccessSecretVersion]. Attributes: name: @@ -1231,9 +1264,8 @@ { "DESCRIPTOR": _DELETESECRETREQUEST, "__module__": "google.cloud.secretmanager_v1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.DeleteSecret][google.cloud.secretmanager.v1.SecretManagerService.DeleteSecret]. - + "__doc__": """Request message for [SecretManagerService.DeleteSecret][google.cloud.s + ecretmanager.v1.SecretManagerService.DeleteSecret]. Attributes: name: @@ -1252,9 +1284,8 @@ { "DESCRIPTOR": _DISABLESECRETVERSIONREQUEST, "__module__": "google.cloud.secretmanager_v1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.DisableSecretVersion][google.cloud.secretmanager.v1.SecretManagerService.DisableSecretVersion]. - + "__doc__": """Request message for [SecretManagerService.DisableSecretVersion][google + .cloud.secretmanager.v1.SecretManagerService.DisableSecretVersion]. Attributes: name: @@ -1273,9 +1304,8 @@ { "DESCRIPTOR": _ENABLESECRETVERSIONREQUEST, "__module__": "google.cloud.secretmanager_v1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.EnableSecretVersion][google.cloud.secretmanager.v1.SecretManagerService.EnableSecretVersion]. - + "__doc__": """Request message for [SecretManagerService.EnableSecretVersion][google. + cloud.secretmanager.v1.SecretManagerService.EnableSecretVersion]. Attributes: name: @@ -1294,9 +1324,8 @@ { "DESCRIPTOR": _DESTROYSECRETVERSIONREQUEST, "__module__": "google.cloud.secretmanager_v1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.DestroySecretVersion][google.cloud.secretmanager.v1.SecretManagerService.DestroySecretVersion]. - + "__doc__": """Request message for [SecretManagerService.DestroySecretVersion][google + .cloud.secretmanager.v1.SecretManagerService.DestroySecretVersion]. Attributes: name: @@ -1339,6 +1368,7 @@ file=DESCRIPTOR, index=0, serialized_options=b"\312A\034secretmanager.googleapis.com\322A.https://www.googleapis.com/auth/cloud-platform", + create_key=_descriptor._internal_create_key, serialized_start=2191, serialized_end=4958, methods=[ @@ -1350,6 +1380,7 @@ input_type=_LISTSECRETSREQUEST, output_type=_LISTSECRETSRESPONSE, serialized_options=b"\202\323\344\223\002!\022\037/v1/{parent=projects/*}/secrets\332A\006parent", + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="CreateSecret", @@ -1359,6 +1390,7 @@ input_type=_CREATESECRETREQUEST, output_type=google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2._SECRET, serialized_options=b'\202\323\344\223\002)"\037/v1/{parent=projects/*}/secrets:\006secret\332A\027parent,secret_id,secret', + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="AddSecretVersion", @@ -1368,6 +1400,7 @@ input_type=_ADDSECRETVERSIONREQUEST, output_type=google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2._SECRETVERSION, serialized_options=b'\202\323\344\223\0021",/v1/{parent=projects/*/secrets/*}:addVersion:\001*\332A\016parent,payload', + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="GetSecret", @@ -1377,6 +1410,7 @@ input_type=_GETSECRETREQUEST, output_type=google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2._SECRET, serialized_options=b"\202\323\344\223\002!\022\037/v1/{name=projects/*/secrets/*}\332A\004name", + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="UpdateSecret", @@ -1386,6 +1420,7 @@ input_type=_UPDATESECRETREQUEST, output_type=google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2._SECRET, serialized_options=b"\202\323\344\223\00202&/v1/{secret.name=projects/*/secrets/*}:\006secret\332A\022secret,update_mask", + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="DeleteSecret", @@ -1395,6 +1430,7 @@ input_type=_DELETESECRETREQUEST, output_type=google_dot_protobuf_dot_empty__pb2._EMPTY, serialized_options=b"\202\323\344\223\002!*\037/v1/{name=projects/*/secrets/*}\332A\004name", + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="ListSecretVersions", @@ -1404,6 +1440,7 @@ input_type=_LISTSECRETVERSIONSREQUEST, output_type=_LISTSECRETVERSIONSRESPONSE, serialized_options=b"\202\323\344\223\002,\022*/v1/{parent=projects/*/secrets/*}/versions\332A\006parent", + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="GetSecretVersion", @@ -1413,6 +1450,7 @@ input_type=_GETSECRETVERSIONREQUEST, output_type=google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2._SECRETVERSION, serialized_options=b"\202\323\344\223\002,\022*/v1/{name=projects/*/secrets/*/versions/*}\332A\004name", + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="AccessSecretVersion", @@ -1422,6 +1460,7 @@ input_type=_ACCESSSECRETVERSIONREQUEST, output_type=_ACCESSSECRETVERSIONRESPONSE, serialized_options=b"\202\323\344\223\0023\0221/v1/{name=projects/*/secrets/*/versions/*}:access\332A\004name", + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="DisableSecretVersion", @@ -1431,6 +1470,7 @@ input_type=_DISABLESECRETVERSIONREQUEST, output_type=google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2._SECRETVERSION, serialized_options=b'\202\323\344\223\0027"2/v1/{name=projects/*/secrets/*/versions/*}:disable:\001*\332A\004name', + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="EnableSecretVersion", @@ -1440,6 +1480,7 @@ input_type=_ENABLESECRETVERSIONREQUEST, output_type=google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2._SECRETVERSION, serialized_options=b'\202\323\344\223\0026"1/v1/{name=projects/*/secrets/*/versions/*}:enable:\001*\332A\004name', + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="DestroySecretVersion", @@ -1449,6 +1490,7 @@ input_type=_DESTROYSECRETVERSIONREQUEST, output_type=google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2._SECRETVERSION, serialized_options=b'\202\323\344\223\0027"2/v1/{name=projects/*/secrets/*/versions/*}:destroy:\001*\332A\004name', + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="SetIamPolicy", @@ -1458,6 +1500,7 @@ input_type=google_dot_iam_dot_v1_dot_iam__policy__pb2._SETIAMPOLICYREQUEST, output_type=google_dot_iam_dot_v1_dot_policy__pb2._POLICY, serialized_options=b'\202\323\344\223\0025"0/v1/{resource=projects/*/secrets/*}:setIamPolicy:\001*', + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="GetIamPolicy", @@ -1467,6 +1510,7 @@ input_type=google_dot_iam_dot_v1_dot_iam__policy__pb2._GETIAMPOLICYREQUEST, output_type=google_dot_iam_dot_v1_dot_policy__pb2._POLICY, serialized_options=b"\202\323\344\223\0022\0220/v1/{resource=projects/*/secrets/*}:getIamPolicy", + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="TestIamPermissions", @@ -1476,6 +1520,7 @@ input_type=google_dot_iam_dot_v1_dot_iam__policy__pb2._TESTIAMPERMISSIONSREQUEST, output_type=google_dot_iam_dot_v1_dot_iam__policy__pb2._TESTIAMPERMISSIONSRESPONSE, serialized_options=b'\202\323\344\223\002;"6/v1/{resource=projects/*/secrets/*}:testIamPermissions:\001*', + create_key=_descriptor._internal_create_key, ), ], ) diff --git a/google/cloud/secretmanager_v1/proto/service_pb2_grpc.py b/google/cloud/secretmanager_v1/proto/service_pb2_grpc.py index 6bc081a..75cf4f2 100644 --- a/google/cloud/secretmanager_v1/proto/service_pb2_grpc.py +++ b/google/cloud/secretmanager_v1/proto/service_pb2_grpc.py @@ -1,19 +1,5 @@ -# Copyright 2020 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - # Generated by the gRPC Python protocol compiler plugin. DO NOT EDIT! - +"""Client and server classes corresponding to protobuf-defined services.""" import grpc from google.cloud.secretmanager_v1.proto import ( @@ -29,23 +15,23 @@ class SecretManagerServiceStub(object): """`projects/*/secrets/*/versions/latest` is an alias to the `latest` - [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. + [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. - Secret Manager Service + Secret Manager Service - Manages secrets and operations using those secrets. Implements a REST - model with the following objects: + Manages secrets and operations using those secrets. Implements a REST + model with the following objects: - * [Secret][google.cloud.secretmanager.v1.Secret] - * [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] - """ + * [Secret][google.cloud.secretmanager.v1.Secret] + * [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] + """ def __init__(self, channel): """Constructor. - Args: - channel: A grpc.Channel. - """ + Args: + channel: A grpc.Channel. + """ self.ListSecrets = channel.unary_unary( "/google.cloud.secretmanager.v1.SecretManagerService/ListSecrets", request_serializer=google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_service__pb2.ListSecretsRequest.SerializeToString, @@ -125,64 +111,64 @@ def __init__(self, channel): class SecretManagerServiceServicer(object): """`projects/*/secrets/*/versions/latest` is an alias to the `latest` - [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. + [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. - Secret Manager Service + Secret Manager Service - Manages secrets and operations using those secrets. Implements a REST - model with the following objects: + Manages secrets and operations using those secrets. Implements a REST + model with the following objects: - * [Secret][google.cloud.secretmanager.v1.Secret] - * [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] - """ + * [Secret][google.cloud.secretmanager.v1.Secret] + * [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] + """ def ListSecrets(self, request, context): """Lists [Secrets][google.cloud.secretmanager.v1.Secret]. - """ + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") def CreateSecret(self, request, context): """Creates a new [Secret][google.cloud.secretmanager.v1.Secret] containing no [SecretVersions][google.cloud.secretmanager.v1.SecretVersion]. - """ + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") def AddSecretVersion(self, request, context): """Creates a new [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] containing secret data and attaches - it to an existing [Secret][google.cloud.secretmanager.v1.Secret]. - """ + it to an existing [Secret][google.cloud.secretmanager.v1.Secret]. + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") def GetSecret(self, request, context): """Gets metadata for a given [Secret][google.cloud.secretmanager.v1.Secret]. - """ + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") def UpdateSecret(self, request, context): """Updates metadata of an existing [Secret][google.cloud.secretmanager.v1.Secret]. - """ + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") def DeleteSecret(self, request, context): """Deletes a [Secret][google.cloud.secretmanager.v1.Secret]. - """ + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") def ListSecretVersions(self, request, context): """Lists [SecretVersions][google.cloud.secretmanager.v1.SecretVersion]. This call does not return secret - data. - """ + data. + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") @@ -190,9 +176,9 @@ def ListSecretVersions(self, request, context): def GetSecretVersion(self, request, context): """Gets metadata for a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. - `projects/*/secrets/*/versions/latest` is an alias to the `latest` - [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. - """ + `projects/*/secrets/*/versions/latest` is an alias to the `latest` + [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") @@ -200,9 +186,9 @@ def GetSecretVersion(self, request, context): def AccessSecretVersion(self, request, context): """Accesses a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. This call returns the secret data. - `projects/*/secrets/*/versions/latest` is an alias to the `latest` - [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. - """ + `projects/*/secrets/*/versions/latest` is an alias to the `latest` + [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") @@ -210,9 +196,9 @@ def AccessSecretVersion(self, request, context): def DisableSecretVersion(self, request, context): """Disables a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. - Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to - [DISABLED][google.cloud.secretmanager.v1.SecretVersion.State.DISABLED]. - """ + Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to + [DISABLED][google.cloud.secretmanager.v1.SecretVersion.State.DISABLED]. + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") @@ -220,9 +206,9 @@ def DisableSecretVersion(self, request, context): def EnableSecretVersion(self, request, context): """Enables a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. - Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to - [ENABLED][google.cloud.secretmanager.v1.SecretVersion.State.ENABLED]. - """ + Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to + [ENABLED][google.cloud.secretmanager.v1.SecretVersion.State.ENABLED]. + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") @@ -230,42 +216,42 @@ def EnableSecretVersion(self, request, context): def DestroySecretVersion(self, request, context): """Destroys a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. - Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to - [DESTROYED][google.cloud.secretmanager.v1.SecretVersion.State.DESTROYED] and irrevocably destroys the - secret data. - """ + Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to + [DESTROYED][google.cloud.secretmanager.v1.SecretVersion.State.DESTROYED] and irrevocably destroys the + secret data. + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") def SetIamPolicy(self, request, context): """Sets the access control policy on the specified secret. Replaces any - existing policy. + existing policy. - Permissions on [SecretVersions][google.cloud.secretmanager.v1.SecretVersion] are enforced according - to the policy set on the associated [Secret][google.cloud.secretmanager.v1.Secret]. - """ + Permissions on [SecretVersions][google.cloud.secretmanager.v1.SecretVersion] are enforced according + to the policy set on the associated [Secret][google.cloud.secretmanager.v1.Secret]. + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") def GetIamPolicy(self, request, context): """Gets the access control policy for a secret. - Returns empty policy if the secret exists and does not have a policy set. - """ + Returns empty policy if the secret exists and does not have a policy set. + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") def TestIamPermissions(self, request, context): """Returns permissions that a caller has for the specified secret. - If the secret does not exist, this call returns an empty set of - permissions, not a NOT_FOUND error. + If the secret does not exist, this call returns an empty set of + permissions, not a NOT_FOUND error. - Note: This operation is designed to be used for building permission-aware - UIs and command-line tools, not for authorization checking. This operation - may "fail open" without warning. - """ + Note: This operation is designed to be used for building permission-aware + UIs and command-line tools, not for authorization checking. This operation + may "fail open" without warning. + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") @@ -353,3 +339,423 @@ def add_SecretManagerServiceServicer_to_server(servicer, server): "google.cloud.secretmanager.v1.SecretManagerService", rpc_method_handlers ) server.add_generic_rpc_handlers((generic_handler,)) + + +# This class is part of an EXPERIMENTAL API. +class SecretManagerService(object): + """`projects/*/secrets/*/versions/latest` is an alias to the `latest` + [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. + + Secret Manager Service + + Manages secrets and operations using those secrets. Implements a REST + model with the following objects: + + * [Secret][google.cloud.secretmanager.v1.Secret] + * [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] + """ + + @staticmethod + def ListSecrets( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secretmanager.v1.SecretManagerService/ListSecrets", + google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_service__pb2.ListSecretsRequest.SerializeToString, + google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_service__pb2.ListSecretsResponse.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def CreateSecret( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secretmanager.v1.SecretManagerService/CreateSecret", + google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_service__pb2.CreateSecretRequest.SerializeToString, + google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2.Secret.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def AddSecretVersion( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secretmanager.v1.SecretManagerService/AddSecretVersion", + google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_service__pb2.AddSecretVersionRequest.SerializeToString, + google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2.SecretVersion.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def GetSecret( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secretmanager.v1.SecretManagerService/GetSecret", + google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_service__pb2.GetSecretRequest.SerializeToString, + google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2.Secret.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def UpdateSecret( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secretmanager.v1.SecretManagerService/UpdateSecret", + google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_service__pb2.UpdateSecretRequest.SerializeToString, + google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2.Secret.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def DeleteSecret( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secretmanager.v1.SecretManagerService/DeleteSecret", + google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_service__pb2.DeleteSecretRequest.SerializeToString, + google_dot_protobuf_dot_empty__pb2.Empty.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def ListSecretVersions( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secretmanager.v1.SecretManagerService/ListSecretVersions", + google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_service__pb2.ListSecretVersionsRequest.SerializeToString, + google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_service__pb2.ListSecretVersionsResponse.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def GetSecretVersion( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secretmanager.v1.SecretManagerService/GetSecretVersion", + google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_service__pb2.GetSecretVersionRequest.SerializeToString, + google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2.SecretVersion.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def AccessSecretVersion( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secretmanager.v1.SecretManagerService/AccessSecretVersion", + google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_service__pb2.AccessSecretVersionRequest.SerializeToString, + google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_service__pb2.AccessSecretVersionResponse.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def DisableSecretVersion( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secretmanager.v1.SecretManagerService/DisableSecretVersion", + google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_service__pb2.DisableSecretVersionRequest.SerializeToString, + google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2.SecretVersion.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def EnableSecretVersion( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secretmanager.v1.SecretManagerService/EnableSecretVersion", + google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_service__pb2.EnableSecretVersionRequest.SerializeToString, + google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2.SecretVersion.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def DestroySecretVersion( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secretmanager.v1.SecretManagerService/DestroySecretVersion", + google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_service__pb2.DestroySecretVersionRequest.SerializeToString, + google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2.SecretVersion.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def SetIamPolicy( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secretmanager.v1.SecretManagerService/SetIamPolicy", + google_dot_iam_dot_v1_dot_iam__policy__pb2.SetIamPolicyRequest.SerializeToString, + google_dot_iam_dot_v1_dot_policy__pb2.Policy.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def GetIamPolicy( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secretmanager.v1.SecretManagerService/GetIamPolicy", + google_dot_iam_dot_v1_dot_iam__policy__pb2.GetIamPolicyRequest.SerializeToString, + google_dot_iam_dot_v1_dot_policy__pb2.Policy.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def TestIamPermissions( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secretmanager.v1.SecretManagerService/TestIamPermissions", + google_dot_iam_dot_v1_dot_iam__policy__pb2.TestIamPermissionsRequest.SerializeToString, + google_dot_iam_dot_v1_dot_iam__policy__pb2.TestIamPermissionsResponse.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) diff --git a/google/cloud/secretmanager_v1/types.py b/google/cloud/secretmanager_v1/types.py index 24eeac7..c66de11 100644 --- a/google/cloud/secretmanager_v1/types.py +++ b/google/cloud/secretmanager_v1/types.py @@ -41,7 +41,10 @@ expr_pb2, ] -_local_modules = [resources_pb2, service_pb2] +_local_modules = [ + resources_pb2, + service_pb2, +] names = [] diff --git a/google/cloud/secretmanager_v1beta1/__init__.py b/google/cloud/secretmanager_v1beta1/__init__.py index 852f32a..86fd5ac 100644 --- a/google/cloud/secretmanager_v1beta1/__init__.py +++ b/google/cloud/secretmanager_v1beta1/__init__.py @@ -26,8 +26,8 @@ if sys.version_info[:2] == (2, 7): message = ( - "A future version of this library will drop support for Python 2.7." - "More details about Python 2 support for Google Cloud Client Libraries" + "A future version of this library will drop support for Python 2.7. " + "More details about Python 2 support for Google Cloud Client Libraries " "can be found at https://cloud.google.com/python/docs/python2-sunset/" ) warnings.warn(message, DeprecationWarning) @@ -40,4 +40,8 @@ class SecretManagerServiceClient( enums = enums -__all__ = ("enums", "types", "SecretManagerServiceClient") +__all__ = ( + "enums", + "types", + "SecretManagerServiceClient", +) diff --git a/google/cloud/secretmanager_v1beta1/gapic/secret_manager_service_client.py b/google/cloud/secretmanager_v1beta1/gapic/secret_manager_service_client.py index 2f59aeb..3bb23c6 100644 --- a/google/cloud/secretmanager_v1beta1/gapic/secret_manager_service_client.py +++ b/google/cloud/secretmanager_v1beta1/gapic/secret_manager_service_client.py @@ -49,7 +49,7 @@ _GAPIC_LIBRARY_VERSION = pkg_resources.get_distribution( - "google-cloud-secret-manager" + "google-cloud-secret-manager", ).version @@ -95,14 +95,14 @@ def from_service_account_file(cls, filename, *args, **kwargs): def project_path(cls, project): """Return a fully-qualified project string.""" return google.api_core.path_template.expand( - "projects/{project}", project=project + "projects/{project}", project=project, ) @classmethod def secret_path(cls, project, secret): """Return a fully-qualified secret string.""" return google.api_core.path_template.expand( - "projects/{project}/secrets/{secret}", project=project, secret=secret + "projects/{project}/secrets/{secret}", project=project, secret=secret, ) @classmethod @@ -202,12 +202,12 @@ def __init__( self.transport = transport else: self.transport = secret_manager_service_grpc_transport.SecretManagerServiceGrpcTransport( - address=api_endpoint, channel=channel, credentials=credentials + address=api_endpoint, channel=channel, credentials=credentials, ) if client_info is None: client_info = google.api_core.gapic_v1.client_info.ClientInfo( - gapic_version=_GAPIC_LIBRARY_VERSION + gapic_version=_GAPIC_LIBRARY_VERSION, ) else: client_info.gapic_version = _GAPIC_LIBRARY_VERSION @@ -218,7 +218,7 @@ def __init__( # (Ordinarily, these are the defaults specified in the `*_config.py` # file next to this one.) self._method_configs = google.api_core.gapic_v1.config.parse_method_configs( - client_config["interfaces"][self._INTERFACE_NAME] + client_config["interfaces"][self._INTERFACE_NAME], ) # Save a dictionary of cached API call functions. @@ -301,7 +301,7 @@ def list_secrets( client_info=self._client_info, ) - request = service_pb2.ListSecretsRequest(parent=parent, page_size=page_size) + request = service_pb2.ListSecretsRequest(parent=parent, page_size=page_size,) if metadata is None: metadata = [] metadata = list(metadata) @@ -334,7 +334,7 @@ def create_secret( self, parent, secret_id, - secret=None, + secret, retry=google.api_core.gapic_v1.method.DEFAULT, timeout=google.api_core.gapic_v1.method.DEFAULT, metadata=None, @@ -352,7 +352,10 @@ def create_secret( >>> # TODO: Initialize `secret_id`: >>> secret_id = '' >>> - >>> response = client.create_secret(parent, secret_id) + >>> # TODO: Initialize `secret`: + >>> secret = {} + >>> + >>> response = client.create_secret(parent, secret_id, secret) Args: parent (str): Required. The resource name of the project to associate with the @@ -362,7 +365,7 @@ def create_secret( A secret ID is a string with a maximum length of 255 characters and can contain uppercase and lowercase letters, numerals, and the hyphen (``-``) and underscore (``_``) characters. - secret (Union[dict, ~google.cloud.secretmanager_v1beta1.types.Secret]): A ``Secret`` with initial field values. + secret (Union[dict, ~google.cloud.secretmanager_v1beta1.types.Secret]): Required. A ``Secret`` with initial field values. If a dict is provided, it must be of the same form as the protobuf message :class:`~google.cloud.secretmanager_v1beta1.types.Secret` @@ -397,7 +400,7 @@ def create_secret( ) request = service_pb2.CreateSecretRequest( - parent=parent, secret_id=secret_id, secret=secret + parent=parent, secret_id=secret_id, secret=secret, ) if metadata is None: metadata = [] @@ -477,7 +480,7 @@ def add_secret_version( client_info=self._client_info, ) - request = service_pb2.AddSecretVersionRequest(parent=parent, payload=payload) + request = service_pb2.AddSecretVersionRequest(parent=parent, payload=payload,) if metadata is None: metadata = [] metadata = list(metadata) @@ -547,7 +550,7 @@ def get_secret( client_info=self._client_info, ) - request = service_pb2.GetSecretRequest(name=name) + request = service_pb2.GetSecretRequest(name=name,) if metadata is None: metadata = [] metadata = list(metadata) @@ -629,7 +632,7 @@ def update_secret( ) request = service_pb2.UpdateSecretRequest( - secret=secret, update_mask=update_mask + secret=secret, update_mask=update_mask, ) if metadata is None: metadata = [] @@ -697,7 +700,7 @@ def delete_secret( client_info=self._client_info, ) - request = service_pb2.DeleteSecretRequest(name=name) + request = service_pb2.DeleteSecretRequest(name=name,) if metadata is None: metadata = [] metadata = list(metadata) @@ -789,7 +792,7 @@ def list_secret_versions( ) request = service_pb2.ListSecretVersionsRequest( - parent=parent, page_size=page_size + parent=parent, page_size=page_size, ) if metadata is None: metadata = [] @@ -876,7 +879,7 @@ def get_secret_version( client_info=self._client_info, ) - request = service_pb2.GetSecretVersionRequest(name=name) + request = service_pb2.GetSecretVersionRequest(name=name,) if metadata is None: metadata = [] metadata = list(metadata) @@ -949,7 +952,7 @@ def access_secret_version( client_info=self._client_info, ) - request = service_pb2.AccessSecretVersionRequest(name=name) + request = service_pb2.AccessSecretVersionRequest(name=name,) if metadata is None: metadata = [] metadata = list(metadata) @@ -1021,7 +1024,7 @@ def disable_secret_version( client_info=self._client_info, ) - request = service_pb2.DisableSecretVersionRequest(name=name) + request = service_pb2.DisableSecretVersionRequest(name=name,) if metadata is None: metadata = [] metadata = list(metadata) @@ -1093,7 +1096,7 @@ def enable_secret_version( client_info=self._client_info, ) - request = service_pb2.EnableSecretVersionRequest(name=name) + request = service_pb2.EnableSecretVersionRequest(name=name,) if metadata is None: metadata = [] metadata = list(metadata) @@ -1166,7 +1169,7 @@ def destroy_secret_version( client_info=self._client_info, ) - request = service_pb2.DestroySecretVersionRequest(name=name) + request = service_pb2.DestroySecretVersionRequest(name=name,) if metadata is None: metadata = [] metadata = list(metadata) @@ -1252,7 +1255,7 @@ def set_iam_policy( client_info=self._client_info, ) - request = iam_policy_pb2.SetIamPolicyRequest(resource=resource, policy=policy) + request = iam_policy_pb2.SetIamPolicyRequest(resource=resource, policy=policy,) if metadata is None: metadata = [] metadata = list(metadata) @@ -1331,7 +1334,7 @@ def get_iam_policy( ) request = iam_policy_pb2.GetIamPolicyRequest( - resource=resource, options=options_ + resource=resource, options=options_, ) if metadata is None: metadata = [] @@ -1418,7 +1421,7 @@ def test_iam_permissions( ) request = iam_policy_pb2.TestIamPermissionsRequest( - resource=resource, permissions=permissions + resource=resource, permissions=permissions, ) if metadata is None: metadata = [] diff --git a/google/cloud/secretmanager_v1beta1/gapic/secret_manager_service_client_config.py b/google/cloud/secretmanager_v1beta1/gapic/secret_manager_service_client_config.py index 8930009..9cb96e9 100644 --- a/google/cloud/secretmanager_v1beta1/gapic/secret_manager_service_client_config.py +++ b/google/cloud/secretmanager_v1beta1/gapic/secret_manager_service_client_config.py @@ -2,95 +2,114 @@ "interfaces": { "google.cloud.secrets.v1beta1.SecretManagerService": { "retry_codes": { - "idempotent": ["DEADLINE_EXCEEDED", "UNAVAILABLE"], - "non_idempotent": [], + "retry_policy_1_codes": ["UNAVAILABLE", "UNKNOWN"], + "no_retry_codes": [], + "no_retry_1_codes": [], }, "retry_params": { - "default": { - "initial_retry_delay_millis": 100, + "retry_policy_1_params": { + "initial_retry_delay_millis": 1000, "retry_delay_multiplier": 1.3, "max_retry_delay_millis": 60000, - "initial_rpc_timeout_millis": 20000, + "initial_rpc_timeout_millis": 60000, "rpc_timeout_multiplier": 1.0, - "max_rpc_timeout_millis": 20000, - "total_timeout_millis": 600000, - } + "max_rpc_timeout_millis": 60000, + "total_timeout_millis": 60000, + }, + "no_retry_params": { + "initial_retry_delay_millis": 0, + "retry_delay_multiplier": 0.0, + "max_retry_delay_millis": 0, + "initial_rpc_timeout_millis": 0, + "rpc_timeout_multiplier": 1.0, + "max_rpc_timeout_millis": 0, + "total_timeout_millis": 0, + }, + "no_retry_1_params": { + "initial_retry_delay_millis": 0, + "retry_delay_multiplier": 0.0, + "max_retry_delay_millis": 0, + "initial_rpc_timeout_millis": 60000, + "rpc_timeout_multiplier": 1.0, + "max_rpc_timeout_millis": 60000, + "total_timeout_millis": 60000, + }, }, "methods": { "ListSecrets": { "timeout_millis": 60000, - "retry_codes_name": "idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "CreateSecret": { "timeout_millis": 60000, - "retry_codes_name": "non_idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "AddSecretVersion": { "timeout_millis": 60000, - "retry_codes_name": "non_idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "GetSecret": { "timeout_millis": 60000, - "retry_codes_name": "idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "UpdateSecret": { "timeout_millis": 60000, - "retry_codes_name": "non_idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "DeleteSecret": { "timeout_millis": 60000, - "retry_codes_name": "non_idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "ListSecretVersions": { "timeout_millis": 60000, - "retry_codes_name": "idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "GetSecretVersion": { "timeout_millis": 60000, - "retry_codes_name": "idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "AccessSecretVersion": { "timeout_millis": 60000, - "retry_codes_name": "idempotent", - "retry_params_name": "default", + "retry_codes_name": "retry_policy_1_codes", + "retry_params_name": "retry_policy_1_params", }, "DisableSecretVersion": { "timeout_millis": 60000, - "retry_codes_name": "non_idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "EnableSecretVersion": { "timeout_millis": 60000, - "retry_codes_name": "non_idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "DestroySecretVersion": { "timeout_millis": 60000, - "retry_codes_name": "non_idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "SetIamPolicy": { "timeout_millis": 60000, - "retry_codes_name": "non_idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "GetIamPolicy": { "timeout_millis": 60000, - "retry_codes_name": "idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, "TestIamPermissions": { "timeout_millis": 60000, - "retry_codes_name": "non_idempotent", - "retry_params_name": "default", + "retry_codes_name": "no_retry_1_codes", + "retry_params_name": "no_retry_1_params", }, }, } diff --git a/google/cloud/secretmanager_v1beta1/gapic/transports/secret_manager_service_grpc_transport.py b/google/cloud/secretmanager_v1beta1/gapic/transports/secret_manager_service_grpc_transport.py index 80ad1e9..5c55caa 100644 --- a/google/cloud/secretmanager_v1beta1/gapic/transports/secret_manager_service_grpc_transport.py +++ b/google/cloud/secretmanager_v1beta1/gapic/transports/secret_manager_service_grpc_transport.py @@ -53,7 +53,7 @@ def __init__( # exception (channels come with credentials baked in already). if channel is not None and credentials is not None: raise ValueError( - "The `channel` and `credentials` arguments are mutually " "exclusive." + "The `channel` and `credentials` arguments are mutually " "exclusive.", ) # Create the channel. @@ -74,7 +74,7 @@ def __init__( self._stubs = { "secret_manager_service_stub": service_pb2_grpc.SecretManagerServiceStub( channel - ) + ), } @classmethod diff --git a/google/cloud/secretmanager_v1beta1/proto/resources_pb2.py b/google/cloud/secretmanager_v1beta1/proto/resources_pb2.py index 2299954..1601d86 100644 --- a/google/cloud/secretmanager_v1beta1/proto/resources_pb2.py +++ b/google/cloud/secretmanager_v1beta1/proto/resources_pb2.py @@ -16,7 +16,7 @@ # Generated by the protocol buffer compiler. DO NOT EDIT! # source: google/cloud/secrets_v1beta1/proto/resources.proto - +"""Generated protocol buffer code.""" from google.protobuf import descriptor as _descriptor from google.protobuf import message as _message from google.protobuf import reflection as _reflection @@ -38,6 +38,7 @@ package="google.cloud.secrets.v1beta1", syntax="proto3", serialized_options=b'\n&com.google.cloud.secretmanager.v1beta1B\016ResourcesProtoP\001ZOgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1beta1;secretmanager\370\001\001\242\002\003GSM\252\002"Google.Cloud.SecretManager.V1Beta1\312\002"Google\\Cloud\\SecretManager\\V1beta1\352\002%Google::Cloud::SecretManager::V1beta1', + create_key=_descriptor._internal_create_key, serialized_pb=b'\n2google/cloud/secrets_v1beta1/proto/resources.proto\x12\x1cgoogle.cloud.secrets.v1beta1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1cgoogle/api/annotations.proto"\xd9\x02\n\x06Secret\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x46\n\x0breplication\x18\x02 \x01(\x0b\x32).google.cloud.secrets.v1beta1.ReplicationB\x06\xe0\x41\x05\xe0\x41\x02\x12\x34\n\x0b\x63reate_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12@\n\x06labels\x18\x04 \x03(\x0b\x32\x30.google.cloud.secrets.v1beta1.Secret.LabelsEntry\x1a-\n\x0bLabelsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01:M\xea\x41J\n#secretmanager.googleapis.com/Secret\x12#projects/{project}/secrets/{secret}"\x90\x03\n\rSecretVersion\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x35\n\x0c\x64\x65stroy_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x45\n\x05state\x18\x04 \x01(\x0e\x32\x31.google.cloud.secrets.v1beta1.SecretVersion.StateB\x03\xe0\x41\x03"H\n\x05State\x12\x15\n\x11STATE_UNSPECIFIED\x10\x00\x12\x0b\n\x07\x45NABLED\x10\x01\x12\x0c\n\x08\x44ISABLED\x10\x02\x12\r\n\tDESTROYED\x10\x03:n\xea\x41k\n*secretmanager.googleapis.com/SecretVersion\x12=projects/{project}/secrets/{secret}/versions/{secret_version}"\xc5\x02\n\x0bReplication\x12H\n\tautomatic\x18\x01 \x01(\x0b\x32\x33.google.cloud.secrets.v1beta1.Replication.AutomaticH\x00\x12M\n\x0cuser_managed\x18\x02 \x01(\x0b\x32\x35.google.cloud.secrets.v1beta1.Replication.UserManagedH\x00\x1a\x0b\n\tAutomatic\x1a\x80\x01\n\x0bUserManaged\x12T\n\x08replicas\x18\x01 \x03(\x0b\x32=.google.cloud.secrets.v1beta1.Replication.UserManaged.ReplicaB\x03\xe0\x41\x02\x1a\x1b\n\x07Replica\x12\x10\n\x08location\x18\x01 \x01(\tB\r\n\x0breplication"\x1d\n\rSecretPayload\x12\x0c\n\x04\x64\x61ta\x18\x01 \x01(\x0c\x42\x86\x02\n&com.google.cloud.secretmanager.v1beta1B\x0eResourcesProtoP\x01ZOgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1beta1;secretmanager\xf8\x01\x01\xa2\x02\x03GSM\xaa\x02"Google.Cloud.SecretManager.V1Beta1\xca\x02"Google\\Cloud\\SecretManager\\V1beta1\xea\x02%Google::Cloud::SecretManager::V1beta1b\x06proto3', dependencies=[ google_dot_api_dot_field__behavior__pb2.DESCRIPTOR, @@ -53,6 +54,7 @@ full_name="google.cloud.secrets.v1beta1.SecretVersion.State", filename=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, values=[ _descriptor.EnumValueDescriptor( name="STATE_UNSPECIFIED", @@ -60,15 +62,31 @@ number=0, serialized_options=None, type=None, + create_key=_descriptor._internal_create_key, ), _descriptor.EnumValueDescriptor( - name="ENABLED", index=1, number=1, serialized_options=None, type=None + name="ENABLED", + index=1, + number=1, + serialized_options=None, + type=None, + create_key=_descriptor._internal_create_key, ), _descriptor.EnumValueDescriptor( - name="DISABLED", index=2, number=2, serialized_options=None, type=None + name="DISABLED", + index=2, + number=2, + serialized_options=None, + type=None, + create_key=_descriptor._internal_create_key, ), _descriptor.EnumValueDescriptor( - name="DESTROYED", index=3, number=3, serialized_options=None, type=None + name="DESTROYED", + index=3, + number=3, + serialized_options=None, + type=None, + create_key=_descriptor._internal_create_key, ), ], containing_type=None, @@ -85,6 +103,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="key", @@ -103,6 +122,7 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="value", @@ -121,6 +141,7 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], @@ -141,6 +162,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="name", @@ -159,6 +181,7 @@ extension_scope=None, serialized_options=b"\340A\003", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="replication", @@ -177,6 +200,7 @@ extension_scope=None, serialized_options=b"\340A\005\340A\002", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="create_time", @@ -195,6 +219,7 @@ extension_scope=None, serialized_options=b"\340A\003", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="labels", @@ -213,10 +238,11 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], - nested_types=[_SECRET_LABELSENTRY], + nested_types=[_SECRET_LABELSENTRY,], enum_types=[], serialized_options=b"\352AJ\n#secretmanager.googleapis.com/Secret\022#projects/{project}/secrets/{secret}", is_extendable=False, @@ -234,6 +260,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="name", @@ -252,6 +279,7 @@ extension_scope=None, serialized_options=b"\340A\003", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="create_time", @@ -270,6 +298,7 @@ extension_scope=None, serialized_options=b"\340A\003", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="destroy_time", @@ -288,6 +317,7 @@ extension_scope=None, serialized_options=b"\340A\003", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="state", @@ -306,11 +336,12 @@ extension_scope=None, serialized_options=b"\340A\003", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], nested_types=[], - enum_types=[_SECRETVERSION_STATE], + enum_types=[_SECRETVERSION_STATE,], serialized_options=b"\352Ak\n*secretmanager.googleapis.com/SecretVersion\022=projects/{project}/secrets/{secret}/versions/{secret_version}", is_extendable=False, syntax="proto3", @@ -327,6 +358,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[], extensions=[], nested_types=[], @@ -346,6 +378,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="location", @@ -364,7 +397,8 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, - ) + create_key=_descriptor._internal_create_key, + ), ], extensions=[], nested_types=[], @@ -384,6 +418,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="replicas", @@ -402,10 +437,11 @@ extension_scope=None, serialized_options=b"\340A\002", file=DESCRIPTOR, - ) + create_key=_descriptor._internal_create_key, + ), ], extensions=[], - nested_types=[_REPLICATION_USERMANAGED_REPLICA], + nested_types=[_REPLICATION_USERMANAGED_REPLICA,], enum_types=[], serialized_options=None, is_extendable=False, @@ -422,6 +458,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="automatic", @@ -440,6 +477,7 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="user_managed", @@ -458,10 +496,11 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], - nested_types=[_REPLICATION_AUTOMATIC, _REPLICATION_USERMANAGED], + nested_types=[_REPLICATION_AUTOMATIC, _REPLICATION_USERMANAGED,], enum_types=[], serialized_options=None, is_extendable=False, @@ -473,8 +512,9 @@ full_name="google.cloud.secrets.v1beta1.Replication.replication", index=0, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[], - ) + ), ], serialized_start=959, serialized_end=1284, @@ -487,6 +527,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="data", @@ -505,7 +546,8 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, - ) + create_key=_descriptor._internal_create_key, + ), ], extensions=[], nested_types=[], @@ -574,14 +616,12 @@ ), "DESCRIPTOR": _SECRET, "__module__": "google.cloud.secrets_v1beta1.proto.resources_pb2", - "__doc__": """A [Secret][google.cloud.secrets.v1beta1.Secret] is a - logical secret whose value and versions can be accessed. - - A [Secret][google.cloud.secrets.v1beta1.Secret] is made up of zero or + "__doc__": """A [Secret][google.cloud.secrets.v1beta1.Secret] is a logical secret + whose value and versions can be accessed. A + [Secret][google.cloud.secrets.v1beta1.Secret] is made up of zero or more [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] that represent the secret data. - Attributes: name: Output only. The resource name of the @@ -621,7 +661,6 @@ "__module__": "google.cloud.secrets_v1beta1.proto.resources_pb2", "__doc__": """A secret version resource in the Secret Manager API. - Attributes: name: Output only. The resource name of the @@ -663,9 +702,7 @@ "__module__": "google.cloud.secrets_v1beta1.proto.resources_pb2", "__doc__": """A replication policy that replicates the [Secret][google.cloud.secrets.v1beta1.Secret] payload without any - restrictions. - - """, + restrictions.""", # @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.Replication.Automatic) }, ), @@ -682,7 +719,6 @@ "__doc__": """Represents a Replica for this [Secret][google.cloud.secrets.v1beta1.Secret]. - Attributes: location: The canonical IDs of the location to replicate data. For @@ -694,9 +730,8 @@ "DESCRIPTOR": _REPLICATION_USERMANAGED, "__module__": "google.cloud.secrets_v1beta1.proto.resources_pb2", "__doc__": """A replication policy that replicates the - [Secret][google.cloud.secrets.v1beta1.Secret] payload into the locations - specified in [Secret.replication.user_managed.replicas][] - + [Secret][google.cloud.secrets.v1beta1.Secret] payload into the + locations specified in [Secret.replication.user_managed.replicas][] Attributes: replicas: @@ -709,9 +744,7 @@ ), "DESCRIPTOR": _REPLICATION, "__module__": "google.cloud.secrets_v1beta1.proto.resources_pb2", - "__doc__": """A policy that defines the replication configuration of - data. - + "__doc__": """A policy that defines the replication configuration of data. Attributes: replication: @@ -737,11 +770,10 @@ { "DESCRIPTOR": _SECRETPAYLOAD, "__module__": "google.cloud.secrets_v1beta1.proto.resources_pb2", - "__doc__": """A secret payload resource in the Secret Manager API. This - contains the sensitive secret data that is associated with a + "__doc__": """A secret payload resource in the Secret Manager API. This contains the + sensitive secret data that is associated with a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. - Attributes: data: The secret data. Must be no larger than 64KiB. diff --git a/google/cloud/secretmanager_v1beta1/proto/resources_pb2_grpc.py b/google/cloud/secretmanager_v1beta1/proto/resources_pb2_grpc.py index b662812..8a93939 100644 --- a/google/cloud/secretmanager_v1beta1/proto/resources_pb2_grpc.py +++ b/google/cloud/secretmanager_v1beta1/proto/resources_pb2_grpc.py @@ -1,17 +1,3 @@ -# Copyright 2020 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - # Generated by the gRPC Python protocol compiler plugin. DO NOT EDIT! - +"""Client and server classes corresponding to protobuf-defined services.""" import grpc diff --git a/google/cloud/secretmanager_v1beta1/proto/service_pb2.py b/google/cloud/secretmanager_v1beta1/proto/service_pb2.py index ff5d5ee..a5d027d 100644 --- a/google/cloud/secretmanager_v1beta1/proto/service_pb2.py +++ b/google/cloud/secretmanager_v1beta1/proto/service_pb2.py @@ -16,7 +16,7 @@ # Generated by the protocol buffer compiler. DO NOT EDIT! # source: google/cloud/secrets_v1beta1/proto/service.proto - +"""Generated protocol buffer code.""" from google.protobuf import descriptor as _descriptor from google.protobuf import message as _message from google.protobuf import reflection as _reflection @@ -45,7 +45,8 @@ package="google.cloud.secrets.v1beta1", syntax="proto3", serialized_options=b'\n&com.google.cloud.secretmanager.v1beta1B\014ServiceProtoP\001ZOgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1beta1;secretmanager\370\001\001\242\002\003GSM\252\002"Google.Cloud.SecretManager.V1Beta1\312\002"Google\\Cloud\\SecretManager\\V1beta1\352\002%Google::Cloud::SecretManager::V1beta1', - serialized_pb=b'\n0google/cloud/secrets_v1beta1/proto/service.proto\x12\x1cgoogle.cloud.secrets.v1beta1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x32google/cloud/secrets_v1beta1/proto/resources.proto\x1a\x1egoogle/iam/v1/iam_policy.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a\x1bgoogle/protobuf/empty.proto\x1a google/protobuf/field_mask.proto"\x8a\x01\n\x12ListSecretsRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01"y\n\x13ListSecretsResponse\x12\x35\n\x07secrets\x18\x01 \x03(\x0b\x32$.google.cloud.secrets.v1beta1.Secret\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05"\xa8\x01\n\x13\x43reateSecretRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x16\n\tsecret_id\x18\x02 \x01(\tB\x03\xe0\x41\x02\x12\x34\n\x06secret\x18\x03 \x01(\x0b\x32$.google.cloud.secrets.v1beta1.Secret"\x99\x01\n\x17\x41\x64\x64SecretVersionRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x41\n\x07payload\x18\x02 \x01(\x0b\x32+.google.cloud.secrets.v1beta1.SecretPayloadB\x03\xe0\x41\x02"M\n\x10GetSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret"\x89\x01\n\x19ListSecretVersionsRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01"\x88\x01\n\x1aListSecretVersionsResponse\x12=\n\x08versions\x18\x01 \x03(\x0b\x32+.google.cloud.secrets.v1beta1.SecretVersion\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05"[\n\x17GetSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"\x86\x01\n\x13UpdateSecretRequest\x12\x39\n\x06secret\x18\x01 \x01(\x0b\x32$.google.cloud.secrets.v1beta1.SecretB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02"^\n\x1a\x41\x63\x63\x65ssSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"\x9a\x01\n\x1b\x41\x63\x63\x65ssSecretVersionResponse\x12=\n\x04name\x18\x01 \x01(\tB/\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12<\n\x07payload\x18\x02 \x01(\x0b\x32+.google.cloud.secrets.v1beta1.SecretPayload"P\n\x13\x44\x65leteSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret"_\n\x1b\x44isableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"^\n\x1a\x45nableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"_\n\x1b\x44\x65stroySecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion2\x83\x16\n\x14SecretManagerService\x12\xa9\x01\n\x0bListSecrets\x12\x30.google.cloud.secrets.v1beta1.ListSecretsRequest\x1a\x31.google.cloud.secrets.v1beta1.ListSecretsResponse"5\x82\xd3\xe4\x93\x02&\x12$/v1beta1/{parent=projects/*}/secrets\xda\x41\x06parent\x12\xb7\x01\n\x0c\x43reateSecret\x12\x31.google.cloud.secrets.v1beta1.CreateSecretRequest\x1a$.google.cloud.secrets.v1beta1.Secret"N\x82\xd3\xe4\x93\x02."$/v1beta1/{parent=projects/*}/secrets:\x06secret\xda\x41\x17parent,secret_id,secret\x12\xc5\x01\n\x10\x41\x64\x64SecretVersion\x12\x35.google.cloud.secrets.v1beta1.AddSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion"M\x82\xd3\xe4\x93\x02\x36"1/v1beta1/{parent=projects/*/secrets/*}:addVersion:\x01*\xda\x41\x0eparent,payload\x12\x96\x01\n\tGetSecret\x12..google.cloud.secrets.v1beta1.GetSecretRequest\x1a$.google.cloud.secrets.v1beta1.Secret"3\x82\xd3\xe4\x93\x02&\x12$/v1beta1/{name=projects/*/secrets/*}\xda\x41\x04name\x12\xb9\x01\n\x0cUpdateSecret\x12\x31.google.cloud.secrets.v1beta1.UpdateSecretRequest\x1a$.google.cloud.secrets.v1beta1.Secret"P\x82\xd3\xe4\x93\x02\x35\x32+/v1beta1/{secret.name=projects/*/secrets/*}:\x06secret\xda\x41\x12secret,update_mask\x12\x8e\x01\n\x0c\x44\x65leteSecret\x12\x31.google.cloud.secrets.v1beta1.DeleteSecretRequest\x1a\x16.google.protobuf.Empty"3\x82\xd3\xe4\x93\x02&*$/v1beta1/{name=projects/*/secrets/*}\xda\x41\x04name\x12\xc9\x01\n\x12ListSecretVersions\x12\x37.google.cloud.secrets.v1beta1.ListSecretVersionsRequest\x1a\x38.google.cloud.secrets.v1beta1.ListSecretVersionsResponse"@\x82\xd3\xe4\x93\x02\x31\x12//v1beta1/{parent=projects/*/secrets/*}/versions\xda\x41\x06parent\x12\xb6\x01\n\x10GetSecretVersion\x12\x35.google.cloud.secrets.v1beta1.GetSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion">\x82\xd3\xe4\x93\x02\x31\x12//v1beta1/{name=projects/*/secrets/*/versions/*}\xda\x41\x04name\x12\xd1\x01\n\x13\x41\x63\x63\x65ssSecretVersion\x12\x38.google.cloud.secrets.v1beta1.AccessSecretVersionRequest\x1a\x39.google.cloud.secrets.v1beta1.AccessSecretVersionResponse"E\x82\xd3\xe4\x93\x02\x38\x12\x36/v1beta1/{name=projects/*/secrets/*/versions/*}:access\xda\x41\x04name\x12\xc9\x01\n\x14\x44isableSecretVersion\x12\x39.google.cloud.secrets.v1beta1.DisableSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion"I\x82\xd3\xe4\x93\x02<"7/v1beta1/{name=projects/*/secrets/*/versions/*}:disable:\x01*\xda\x41\x04name\x12\xc6\x01\n\x13\x45nableSecretVersion\x12\x38.google.cloud.secrets.v1beta1.EnableSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion"H\x82\xd3\xe4\x93\x02;"6/v1beta1/{name=projects/*/secrets/*/versions/*}:enable:\x01*\xda\x41\x04name\x12\xc9\x01\n\x14\x44\x65stroySecretVersion\x12\x39.google.cloud.secrets.v1beta1.DestroySecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion"I\x82\xd3\xe4\x93\x02<"7/v1beta1/{name=projects/*/secrets/*/versions/*}:destroy:\x01*\xda\x41\x04name\x12\x8b\x01\n\x0cSetIamPolicy\x12".google.iam.v1.SetIamPolicyRequest\x1a\x15.google.iam.v1.Policy"@\x82\xd3\xe4\x93\x02:"5/v1beta1/{resource=projects/*/secrets/*}:setIamPolicy:\x01*\x12\x88\x01\n\x0cGetIamPolicy\x12".google.iam.v1.GetIamPolicyRequest\x1a\x15.google.iam.v1.Policy"=\x82\xd3\xe4\x93\x02\x37\x12\x35/v1beta1/{resource=projects/*/secrets/*}:getIamPolicy\x12\xb1\x01\n\x12TestIamPermissions\x12(.google.iam.v1.TestIamPermissionsRequest\x1a).google.iam.v1.TestIamPermissionsResponse"F\x82\xd3\xe4\x93\x02@";/v1beta1/{resource=projects/*/secrets/*}:testIamPermissions:\x01*\x1aP\xca\x41\x1csecretmanager.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\x84\x02\n&com.google.cloud.secretmanager.v1beta1B\x0cServiceProtoP\x01ZOgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1beta1;secretmanager\xf8\x01\x01\xa2\x02\x03GSM\xaa\x02"Google.Cloud.SecretManager.V1Beta1\xca\x02"Google\\Cloud\\SecretManager\\V1beta1\xea\x02%Google::Cloud::SecretManager::V1beta1b\x06proto3', + create_key=_descriptor._internal_create_key, + serialized_pb=b'\n0google/cloud/secrets_v1beta1/proto/service.proto\x12\x1cgoogle.cloud.secrets.v1beta1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x32google/cloud/secrets_v1beta1/proto/resources.proto\x1a\x1egoogle/iam/v1/iam_policy.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a\x1bgoogle/protobuf/empty.proto\x1a google/protobuf/field_mask.proto"\x8a\x01\n\x12ListSecretsRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01"y\n\x13ListSecretsResponse\x12\x35\n\x07secrets\x18\x01 \x03(\x0b\x32$.google.cloud.secrets.v1beta1.Secret\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05"\xad\x01\n\x13\x43reateSecretRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x16\n\tsecret_id\x18\x02 \x01(\tB\x03\xe0\x41\x02\x12\x39\n\x06secret\x18\x03 \x01(\x0b\x32$.google.cloud.secrets.v1beta1.SecretB\x03\xe0\x41\x02"\x99\x01\n\x17\x41\x64\x64SecretVersionRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x41\n\x07payload\x18\x02 \x01(\x0b\x32+.google.cloud.secrets.v1beta1.SecretPayloadB\x03\xe0\x41\x02"M\n\x10GetSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret"\x89\x01\n\x19ListSecretVersionsRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01"\x88\x01\n\x1aListSecretVersionsResponse\x12=\n\x08versions\x18\x01 \x03(\x0b\x32+.google.cloud.secrets.v1beta1.SecretVersion\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05"[\n\x17GetSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"\x86\x01\n\x13UpdateSecretRequest\x12\x39\n\x06secret\x18\x01 \x01(\x0b\x32$.google.cloud.secrets.v1beta1.SecretB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02"^\n\x1a\x41\x63\x63\x65ssSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"\x9a\x01\n\x1b\x41\x63\x63\x65ssSecretVersionResponse\x12=\n\x04name\x18\x01 \x01(\tB/\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12<\n\x07payload\x18\x02 \x01(\x0b\x32+.google.cloud.secrets.v1beta1.SecretPayload"P\n\x13\x44\x65leteSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret"_\n\x1b\x44isableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"^\n\x1a\x45nableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"_\n\x1b\x44\x65stroySecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion2\x83\x16\n\x14SecretManagerService\x12\xa9\x01\n\x0bListSecrets\x12\x30.google.cloud.secrets.v1beta1.ListSecretsRequest\x1a\x31.google.cloud.secrets.v1beta1.ListSecretsResponse"5\x82\xd3\xe4\x93\x02&\x12$/v1beta1/{parent=projects/*}/secrets\xda\x41\x06parent\x12\xb7\x01\n\x0c\x43reateSecret\x12\x31.google.cloud.secrets.v1beta1.CreateSecretRequest\x1a$.google.cloud.secrets.v1beta1.Secret"N\x82\xd3\xe4\x93\x02."$/v1beta1/{parent=projects/*}/secrets:\x06secret\xda\x41\x17parent,secret_id,secret\x12\xc5\x01\n\x10\x41\x64\x64SecretVersion\x12\x35.google.cloud.secrets.v1beta1.AddSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion"M\x82\xd3\xe4\x93\x02\x36"1/v1beta1/{parent=projects/*/secrets/*}:addVersion:\x01*\xda\x41\x0eparent,payload\x12\x96\x01\n\tGetSecret\x12..google.cloud.secrets.v1beta1.GetSecretRequest\x1a$.google.cloud.secrets.v1beta1.Secret"3\x82\xd3\xe4\x93\x02&\x12$/v1beta1/{name=projects/*/secrets/*}\xda\x41\x04name\x12\xb9\x01\n\x0cUpdateSecret\x12\x31.google.cloud.secrets.v1beta1.UpdateSecretRequest\x1a$.google.cloud.secrets.v1beta1.Secret"P\x82\xd3\xe4\x93\x02\x35\x32+/v1beta1/{secret.name=projects/*/secrets/*}:\x06secret\xda\x41\x12secret,update_mask\x12\x8e\x01\n\x0c\x44\x65leteSecret\x12\x31.google.cloud.secrets.v1beta1.DeleteSecretRequest\x1a\x16.google.protobuf.Empty"3\x82\xd3\xe4\x93\x02&*$/v1beta1/{name=projects/*/secrets/*}\xda\x41\x04name\x12\xc9\x01\n\x12ListSecretVersions\x12\x37.google.cloud.secrets.v1beta1.ListSecretVersionsRequest\x1a\x38.google.cloud.secrets.v1beta1.ListSecretVersionsResponse"@\x82\xd3\xe4\x93\x02\x31\x12//v1beta1/{parent=projects/*/secrets/*}/versions\xda\x41\x06parent\x12\xb6\x01\n\x10GetSecretVersion\x12\x35.google.cloud.secrets.v1beta1.GetSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion">\x82\xd3\xe4\x93\x02\x31\x12//v1beta1/{name=projects/*/secrets/*/versions/*}\xda\x41\x04name\x12\xd1\x01\n\x13\x41\x63\x63\x65ssSecretVersion\x12\x38.google.cloud.secrets.v1beta1.AccessSecretVersionRequest\x1a\x39.google.cloud.secrets.v1beta1.AccessSecretVersionResponse"E\x82\xd3\xe4\x93\x02\x38\x12\x36/v1beta1/{name=projects/*/secrets/*/versions/*}:access\xda\x41\x04name\x12\xc9\x01\n\x14\x44isableSecretVersion\x12\x39.google.cloud.secrets.v1beta1.DisableSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion"I\x82\xd3\xe4\x93\x02<"7/v1beta1/{name=projects/*/secrets/*/versions/*}:disable:\x01*\xda\x41\x04name\x12\xc6\x01\n\x13\x45nableSecretVersion\x12\x38.google.cloud.secrets.v1beta1.EnableSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion"H\x82\xd3\xe4\x93\x02;"6/v1beta1/{name=projects/*/secrets/*/versions/*}:enable:\x01*\xda\x41\x04name\x12\xc9\x01\n\x14\x44\x65stroySecretVersion\x12\x39.google.cloud.secrets.v1beta1.DestroySecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion"I\x82\xd3\xe4\x93\x02<"7/v1beta1/{name=projects/*/secrets/*/versions/*}:destroy:\x01*\xda\x41\x04name\x12\x8b\x01\n\x0cSetIamPolicy\x12".google.iam.v1.SetIamPolicyRequest\x1a\x15.google.iam.v1.Policy"@\x82\xd3\xe4\x93\x02:"5/v1beta1/{resource=projects/*/secrets/*}:setIamPolicy:\x01*\x12\x88\x01\n\x0cGetIamPolicy\x12".google.iam.v1.GetIamPolicyRequest\x1a\x15.google.iam.v1.Policy"=\x82\xd3\xe4\x93\x02\x37\x12\x35/v1beta1/{resource=projects/*/secrets/*}:getIamPolicy\x12\xb1\x01\n\x12TestIamPermissions\x12(.google.iam.v1.TestIamPermissionsRequest\x1a).google.iam.v1.TestIamPermissionsResponse"F\x82\xd3\xe4\x93\x02@";/v1beta1/{resource=projects/*/secrets/*}:testIamPermissions:\x01*\x1aP\xca\x41\x1csecretmanager.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\x84\x02\n&com.google.cloud.secretmanager.v1beta1B\x0cServiceProtoP\x01ZOgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1beta1;secretmanager\xf8\x01\x01\xa2\x02\x03GSM\xaa\x02"Google.Cloud.SecretManager.V1Beta1\xca\x02"Google\\Cloud\\SecretManager\\V1beta1\xea\x02%Google::Cloud::SecretManager::V1beta1b\x06proto3', dependencies=[ google_dot_api_dot_annotations__pb2.DESCRIPTOR, google_dot_api_dot_client__pb2.DESCRIPTOR, @@ -66,6 +67,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="parent", @@ -84,6 +86,7 @@ extension_scope=None, serialized_options=b"\340A\002\372A-\n+cloudresourcemanager.googleapis.com/Project", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="page_size", @@ -102,6 +105,7 @@ extension_scope=None, serialized_options=b"\340A\001", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="page_token", @@ -120,6 +124,7 @@ extension_scope=None, serialized_options=b"\340A\001", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], @@ -141,6 +146,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="secrets", @@ -159,6 +165,7 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="next_page_token", @@ -177,6 +184,7 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="total_size", @@ -195,6 +203,7 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], @@ -216,6 +225,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="parent", @@ -234,6 +244,7 @@ extension_scope=None, serialized_options=b"\340A\002\372A-\n+cloudresourcemanager.googleapis.com/Project", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="secret_id", @@ -252,6 +263,7 @@ extension_scope=None, serialized_options=b"\340A\002", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="secret", @@ -268,8 +280,9 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=None, + serialized_options=b"\340A\002", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], @@ -281,7 +294,7 @@ extension_ranges=[], oneofs=[], serialized_start=637, - serialized_end=805, + serialized_end=810, ) @@ -291,6 +304,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="parent", @@ -309,6 +323,7 @@ extension_scope=None, serialized_options=b"\340A\002\372A%\n#secretmanager.googleapis.com/Secret", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="payload", @@ -327,6 +342,7 @@ extension_scope=None, serialized_options=b"\340A\002", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], @@ -337,8 +353,8 @@ syntax="proto3", extension_ranges=[], oneofs=[], - serialized_start=808, - serialized_end=961, + serialized_start=813, + serialized_end=966, ) @@ -348,6 +364,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="name", @@ -366,7 +383,8 @@ extension_scope=None, serialized_options=b"\340A\002\372A%\n#secretmanager.googleapis.com/Secret", file=DESCRIPTOR, - ) + create_key=_descriptor._internal_create_key, + ), ], extensions=[], nested_types=[], @@ -376,8 +394,8 @@ syntax="proto3", extension_ranges=[], oneofs=[], - serialized_start=963, - serialized_end=1040, + serialized_start=968, + serialized_end=1045, ) @@ -387,6 +405,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="parent", @@ -405,6 +424,7 @@ extension_scope=None, serialized_options=b"\340A\002\372A%\n#secretmanager.googleapis.com/Secret", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="page_size", @@ -423,6 +443,7 @@ extension_scope=None, serialized_options=b"\340A\001", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="page_token", @@ -441,6 +462,7 @@ extension_scope=None, serialized_options=b"\340A\001", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], @@ -451,8 +473,8 @@ syntax="proto3", extension_ranges=[], oneofs=[], - serialized_start=1043, - serialized_end=1180, + serialized_start=1048, + serialized_end=1185, ) @@ -462,6 +484,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="versions", @@ -480,6 +503,7 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="next_page_token", @@ -498,6 +522,7 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="total_size", @@ -516,6 +541,7 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], @@ -526,8 +552,8 @@ syntax="proto3", extension_ranges=[], oneofs=[], - serialized_start=1183, - serialized_end=1319, + serialized_start=1188, + serialized_end=1324, ) @@ -537,6 +563,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="name", @@ -555,7 +582,8 @@ extension_scope=None, serialized_options=b"\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, - ) + create_key=_descriptor._internal_create_key, + ), ], extensions=[], nested_types=[], @@ -565,8 +593,8 @@ syntax="proto3", extension_ranges=[], oneofs=[], - serialized_start=1321, - serialized_end=1412, + serialized_start=1326, + serialized_end=1417, ) @@ -576,6 +604,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="secret", @@ -594,6 +623,7 @@ extension_scope=None, serialized_options=b"\340A\002", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="update_mask", @@ -612,6 +642,7 @@ extension_scope=None, serialized_options=b"\340A\002", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], @@ -622,8 +653,8 @@ syntax="proto3", extension_ranges=[], oneofs=[], - serialized_start=1415, - serialized_end=1549, + serialized_start=1420, + serialized_end=1554, ) @@ -633,6 +664,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="name", @@ -651,7 +683,8 @@ extension_scope=None, serialized_options=b"\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, - ) + create_key=_descriptor._internal_create_key, + ), ], extensions=[], nested_types=[], @@ -661,8 +694,8 @@ syntax="proto3", extension_ranges=[], oneofs=[], - serialized_start=1551, - serialized_end=1645, + serialized_start=1556, + serialized_end=1650, ) @@ -672,6 +705,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="name", @@ -690,6 +724,7 @@ extension_scope=None, serialized_options=b"\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), _descriptor.FieldDescriptor( name="payload", @@ -708,6 +743,7 @@ extension_scope=None, serialized_options=None, file=DESCRIPTOR, + create_key=_descriptor._internal_create_key, ), ], extensions=[], @@ -718,8 +754,8 @@ syntax="proto3", extension_ranges=[], oneofs=[], - serialized_start=1648, - serialized_end=1802, + serialized_start=1653, + serialized_end=1807, ) @@ -729,6 +765,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="name", @@ -747,7 +784,8 @@ extension_scope=None, serialized_options=b"\340A\002\372A%\n#secretmanager.googleapis.com/Secret", file=DESCRIPTOR, - ) + create_key=_descriptor._internal_create_key, + ), ], extensions=[], nested_types=[], @@ -757,8 +795,8 @@ syntax="proto3", extension_ranges=[], oneofs=[], - serialized_start=1804, - serialized_end=1884, + serialized_start=1809, + serialized_end=1889, ) @@ -768,6 +806,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="name", @@ -786,7 +825,8 @@ extension_scope=None, serialized_options=b"\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, - ) + create_key=_descriptor._internal_create_key, + ), ], extensions=[], nested_types=[], @@ -796,8 +836,8 @@ syntax="proto3", extension_ranges=[], oneofs=[], - serialized_start=1886, - serialized_end=1981, + serialized_start=1891, + serialized_end=1986, ) @@ -807,6 +847,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="name", @@ -825,7 +866,8 @@ extension_scope=None, serialized_options=b"\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, - ) + create_key=_descriptor._internal_create_key, + ), ], extensions=[], nested_types=[], @@ -835,8 +877,8 @@ syntax="proto3", extension_ranges=[], oneofs=[], - serialized_start=1983, - serialized_end=2077, + serialized_start=1988, + serialized_end=2082, ) @@ -846,6 +888,7 @@ filename=None, file=DESCRIPTOR, containing_type=None, + create_key=_descriptor._internal_create_key, fields=[ _descriptor.FieldDescriptor( name="name", @@ -864,7 +907,8 @@ extension_scope=None, serialized_options=b"\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, - ) + create_key=_descriptor._internal_create_key, + ), ], extensions=[], nested_types=[], @@ -874,8 +918,8 @@ syntax="proto3", extension_ranges=[], oneofs=[], - serialized_start=2079, - serialized_end=2174, + serialized_start=2084, + serialized_end=2179, ) _LISTSECRETSRESPONSE.fields_by_name[ @@ -948,9 +992,8 @@ { "DESCRIPTOR": _LISTSECRETSREQUEST, "__module__": "google.cloud.secrets_v1beta1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets]. - + "__doc__": """Request message for [SecretManagerService.ListSecrets][google.cloud.se + crets.v1beta1.SecretManagerService.ListSecrets]. Attributes: parent: @@ -978,9 +1021,8 @@ { "DESCRIPTOR": _LISTSECRETSRESPONSE, "__module__": "google.cloud.secrets_v1beta1.proto.service_pb2", - "__doc__": """Response message for - [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets]. - + "__doc__": """Response message for [SecretManagerService.ListSecrets][google.cloud.s + ecrets.v1beta1.SecretManagerService.ListSecrets]. Attributes: secrets: @@ -1005,9 +1047,8 @@ { "DESCRIPTOR": _CREATESECRETREQUEST, "__module__": "google.cloud.secrets_v1beta1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.CreateSecret][google.cloud.secrets.v1beta1.SecretManagerService.CreateSecret]. - + "__doc__": """Request message for [SecretManagerService.CreateSecret][google.cloud.s + ecrets.v1beta1.SecretManagerService.CreateSecret]. Attributes: parent: @@ -1020,8 +1061,8 @@ contain uppercase and lowercase letters, numerals, and the hyphen (``-``) and underscore (``_``) characters. secret: - A [Secret][google.cloud.secrets.v1beta1.Secret] with initial - field values. + Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with + initial field values. """, # @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.CreateSecretRequest) }, @@ -1034,9 +1075,8 @@ { "DESCRIPTOR": _ADDSECRETVERSIONREQUEST, "__module__": "google.cloud.secrets_v1beta1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.AddSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AddSecretVersion]. - + "__doc__": """Request message for [SecretManagerService.AddSecretVersion][google.clo + ud.secrets.v1beta1.SecretManagerService.AddSecretVersion]. Attributes: parent: @@ -1060,9 +1100,8 @@ { "DESCRIPTOR": _GETSECRETREQUEST, "__module__": "google.cloud.secrets_v1beta1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.GetSecret][google.cloud.secrets.v1beta1.SecretManagerService.GetSecret]. - + "__doc__": """Request message for [SecretManagerService.GetSecret][google.cloud.secr + ets.v1beta1.SecretManagerService.GetSecret]. Attributes: name: @@ -1081,9 +1120,8 @@ { "DESCRIPTOR": _LISTSECRETVERSIONSREQUEST, "__module__": "google.cloud.secrets_v1beta1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions]. - + "__doc__": """Request message for [SecretManagerService.ListSecretVersions][google.c + loud.secrets.v1beta1.SecretManagerService.ListSecretVersions]. Attributes: parent: @@ -1112,9 +1150,8 @@ { "DESCRIPTOR": _LISTSECRETVERSIONSRESPONSE, "__module__": "google.cloud.secrets_v1beta1.proto.service_pb2", - "__doc__": """Response message for - [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions]. - + "__doc__": """Response message for [SecretManagerService.ListSecretVersions][google. + cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions]. Attributes: versions: @@ -1141,9 +1178,8 @@ { "DESCRIPTOR": _GETSECRETVERSIONREQUEST, "__module__": "google.cloud.secrets_v1beta1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.GetSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.GetSecretVersion]. - + "__doc__": """Request message for [SecretManagerService.GetSecretVersion][google.clo + ud.secrets.v1beta1.SecretManagerService.GetSecretVersion]. Attributes: name: @@ -1165,9 +1201,8 @@ { "DESCRIPTOR": _UPDATESECRETREQUEST, "__module__": "google.cloud.secrets_v1beta1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.UpdateSecret][google.cloud.secrets.v1beta1.SecretManagerService.UpdateSecret]. - + "__doc__": """Request message for [SecretManagerService.UpdateSecret][google.cloud.s + ecrets.v1beta1.SecretManagerService.UpdateSecret]. Attributes: secret: @@ -1187,9 +1222,8 @@ { "DESCRIPTOR": _ACCESSSECRETVERSIONREQUEST, "__module__": "google.cloud.secrets_v1beta1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion]. - + "__doc__": """Request message for [SecretManagerService.AccessSecretVersion][google. + cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion]. Attributes: name: @@ -1208,9 +1242,8 @@ { "DESCRIPTOR": _ACCESSSECRETVERSIONRESPONSE, "__module__": "google.cloud.secrets_v1beta1.proto.service_pb2", - "__doc__": """Response message for - [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion]. - + "__doc__": """Response message for [SecretManagerService.AccessSecretVersion][google + .cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion]. Attributes: name: @@ -1231,9 +1264,8 @@ { "DESCRIPTOR": _DELETESECRETREQUEST, "__module__": "google.cloud.secrets_v1beta1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.DeleteSecret][google.cloud.secrets.v1beta1.SecretManagerService.DeleteSecret]. - + "__doc__": """Request message for [SecretManagerService.DeleteSecret][google.cloud.s + ecrets.v1beta1.SecretManagerService.DeleteSecret]. Attributes: name: @@ -1252,9 +1284,8 @@ { "DESCRIPTOR": _DISABLESECRETVERSIONREQUEST, "__module__": "google.cloud.secrets_v1beta1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.DisableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DisableSecretVersion]. - + "__doc__": """Request message for [SecretManagerService.DisableSecretVersion][google + .cloud.secrets.v1beta1.SecretManagerService.DisableSecretVersion]. Attributes: name: @@ -1273,9 +1304,8 @@ { "DESCRIPTOR": _ENABLESECRETVERSIONREQUEST, "__module__": "google.cloud.secrets_v1beta1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.EnableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.EnableSecretVersion]. - + "__doc__": """Request message for [SecretManagerService.EnableSecretVersion][google. + cloud.secrets.v1beta1.SecretManagerService.EnableSecretVersion]. Attributes: name: @@ -1294,9 +1324,8 @@ { "DESCRIPTOR": _DESTROYSECRETVERSIONREQUEST, "__module__": "google.cloud.secrets_v1beta1.proto.service_pb2", - "__doc__": """Request message for - [SecretManagerService.DestroySecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DestroySecretVersion]. - + "__doc__": """Request message for [SecretManagerService.DestroySecretVersion][google + .cloud.secrets.v1beta1.SecretManagerService.DestroySecretVersion]. Attributes: name: @@ -1316,6 +1345,7 @@ _LISTSECRETSREQUEST.fields_by_name["page_token"]._options = None _CREATESECRETREQUEST.fields_by_name["parent"]._options = None _CREATESECRETREQUEST.fields_by_name["secret_id"]._options = None +_CREATESECRETREQUEST.fields_by_name["secret"]._options = None _ADDSECRETVERSIONREQUEST.fields_by_name["parent"]._options = None _ADDSECRETVERSIONREQUEST.fields_by_name["payload"]._options = None _GETSECRETREQUEST.fields_by_name["name"]._options = None @@ -1338,8 +1368,9 @@ file=DESCRIPTOR, index=0, serialized_options=b"\312A\034secretmanager.googleapis.com\322A.https://www.googleapis.com/auth/cloud-platform", - serialized_start=2177, - serialized_end=4996, + create_key=_descriptor._internal_create_key, + serialized_start=2182, + serialized_end=5001, methods=[ _descriptor.MethodDescriptor( name="ListSecrets", @@ -1349,6 +1380,7 @@ input_type=_LISTSECRETSREQUEST, output_type=_LISTSECRETSRESPONSE, serialized_options=b"\202\323\344\223\002&\022$/v1beta1/{parent=projects/*}/secrets\332A\006parent", + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="CreateSecret", @@ -1358,6 +1390,7 @@ input_type=_CREATESECRETREQUEST, output_type=google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2._SECRET, serialized_options=b'\202\323\344\223\002."$/v1beta1/{parent=projects/*}/secrets:\006secret\332A\027parent,secret_id,secret', + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="AddSecretVersion", @@ -1367,6 +1400,7 @@ input_type=_ADDSECRETVERSIONREQUEST, output_type=google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2._SECRETVERSION, serialized_options=b'\202\323\344\223\0026"1/v1beta1/{parent=projects/*/secrets/*}:addVersion:\001*\332A\016parent,payload', + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="GetSecret", @@ -1376,6 +1410,7 @@ input_type=_GETSECRETREQUEST, output_type=google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2._SECRET, serialized_options=b"\202\323\344\223\002&\022$/v1beta1/{name=projects/*/secrets/*}\332A\004name", + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="UpdateSecret", @@ -1385,6 +1420,7 @@ input_type=_UPDATESECRETREQUEST, output_type=google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2._SECRET, serialized_options=b"\202\323\344\223\00252+/v1beta1/{secret.name=projects/*/secrets/*}:\006secret\332A\022secret,update_mask", + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="DeleteSecret", @@ -1394,6 +1430,7 @@ input_type=_DELETESECRETREQUEST, output_type=google_dot_protobuf_dot_empty__pb2._EMPTY, serialized_options=b"\202\323\344\223\002&*$/v1beta1/{name=projects/*/secrets/*}\332A\004name", + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="ListSecretVersions", @@ -1403,6 +1440,7 @@ input_type=_LISTSECRETVERSIONSREQUEST, output_type=_LISTSECRETVERSIONSRESPONSE, serialized_options=b"\202\323\344\223\0021\022//v1beta1/{parent=projects/*/secrets/*}/versions\332A\006parent", + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="GetSecretVersion", @@ -1412,6 +1450,7 @@ input_type=_GETSECRETVERSIONREQUEST, output_type=google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2._SECRETVERSION, serialized_options=b"\202\323\344\223\0021\022//v1beta1/{name=projects/*/secrets/*/versions/*}\332A\004name", + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="AccessSecretVersion", @@ -1421,6 +1460,7 @@ input_type=_ACCESSSECRETVERSIONREQUEST, output_type=_ACCESSSECRETVERSIONRESPONSE, serialized_options=b"\202\323\344\223\0028\0226/v1beta1/{name=projects/*/secrets/*/versions/*}:access\332A\004name", + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="DisableSecretVersion", @@ -1430,6 +1470,7 @@ input_type=_DISABLESECRETVERSIONREQUEST, output_type=google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2._SECRETVERSION, serialized_options=b'\202\323\344\223\002<"7/v1beta1/{name=projects/*/secrets/*/versions/*}:disable:\001*\332A\004name', + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="EnableSecretVersion", @@ -1439,6 +1480,7 @@ input_type=_ENABLESECRETVERSIONREQUEST, output_type=google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2._SECRETVERSION, serialized_options=b'\202\323\344\223\002;"6/v1beta1/{name=projects/*/secrets/*/versions/*}:enable:\001*\332A\004name', + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="DestroySecretVersion", @@ -1448,6 +1490,7 @@ input_type=_DESTROYSECRETVERSIONREQUEST, output_type=google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2._SECRETVERSION, serialized_options=b'\202\323\344\223\002<"7/v1beta1/{name=projects/*/secrets/*/versions/*}:destroy:\001*\332A\004name', + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="SetIamPolicy", @@ -1457,6 +1500,7 @@ input_type=google_dot_iam_dot_v1_dot_iam__policy__pb2._SETIAMPOLICYREQUEST, output_type=google_dot_iam_dot_v1_dot_policy__pb2._POLICY, serialized_options=b'\202\323\344\223\002:"5/v1beta1/{resource=projects/*/secrets/*}:setIamPolicy:\001*', + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="GetIamPolicy", @@ -1466,6 +1510,7 @@ input_type=google_dot_iam_dot_v1_dot_iam__policy__pb2._GETIAMPOLICYREQUEST, output_type=google_dot_iam_dot_v1_dot_policy__pb2._POLICY, serialized_options=b"\202\323\344\223\0027\0225/v1beta1/{resource=projects/*/secrets/*}:getIamPolicy", + create_key=_descriptor._internal_create_key, ), _descriptor.MethodDescriptor( name="TestIamPermissions", @@ -1475,6 +1520,7 @@ input_type=google_dot_iam_dot_v1_dot_iam__policy__pb2._TESTIAMPERMISSIONSREQUEST, output_type=google_dot_iam_dot_v1_dot_iam__policy__pb2._TESTIAMPERMISSIONSRESPONSE, serialized_options=b'\202\323\344\223\002@";/v1beta1/{resource=projects/*/secrets/*}:testIamPermissions:\001*', + create_key=_descriptor._internal_create_key, ), ], ) diff --git a/google/cloud/secretmanager_v1beta1/proto/service_pb2_grpc.py b/google/cloud/secretmanager_v1beta1/proto/service_pb2_grpc.py index 3754aa8..c339203 100644 --- a/google/cloud/secretmanager_v1beta1/proto/service_pb2_grpc.py +++ b/google/cloud/secretmanager_v1beta1/proto/service_pb2_grpc.py @@ -1,19 +1,5 @@ -# Copyright 2020 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - # Generated by the gRPC Python protocol compiler plugin. DO NOT EDIT! - +"""Client and server classes corresponding to protobuf-defined services.""" import grpc from google.cloud.secretmanager_v1beta1.proto import ( @@ -29,23 +15,23 @@ class SecretManagerServiceStub(object): """`projects/*/secrets/*/versions/latest` is an alias to the `latest` - [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. - Secret Manager Service + Secret Manager Service - Manages secrets and operations using those secrets. Implements a REST - model with the following objects: + Manages secrets and operations using those secrets. Implements a REST + model with the following objects: - * [Secret][google.cloud.secrets.v1beta1.Secret] - * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] - """ + * [Secret][google.cloud.secrets.v1beta1.Secret] + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] + """ def __init__(self, channel): """Constructor. - Args: - channel: A grpc.Channel. - """ + Args: + channel: A grpc.Channel. + """ self.ListSecrets = channel.unary_unary( "/google.cloud.secrets.v1beta1.SecretManagerService/ListSecrets", request_serializer=google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_service__pb2.ListSecretsRequest.SerializeToString, @@ -125,64 +111,64 @@ def __init__(self, channel): class SecretManagerServiceServicer(object): """`projects/*/secrets/*/versions/latest` is an alias to the `latest` - [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. - Secret Manager Service + Secret Manager Service - Manages secrets and operations using those secrets. Implements a REST - model with the following objects: + Manages secrets and operations using those secrets. Implements a REST + model with the following objects: - * [Secret][google.cloud.secrets.v1beta1.Secret] - * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] - """ + * [Secret][google.cloud.secrets.v1beta1.Secret] + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] + """ def ListSecrets(self, request, context): """Lists [Secrets][google.cloud.secrets.v1beta1.Secret]. - """ + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") def CreateSecret(self, request, context): """Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. - """ + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") def AddSecretVersion(self, request, context): """Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret data and attaches - it to an existing [Secret][google.cloud.secrets.v1beta1.Secret]. - """ + it to an existing [Secret][google.cloud.secrets.v1beta1.Secret]. + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") def GetSecret(self, request, context): """Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret]. - """ + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") def UpdateSecret(self, request, context): """Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret]. - """ + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") def DeleteSecret(self, request, context): """Deletes a [Secret][google.cloud.secrets.v1beta1.Secret]. - """ + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") def ListSecretVersions(self, request, context): """Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return secret - data. - """ + data. + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") @@ -190,9 +176,9 @@ def ListSecretVersions(self, request, context): def GetSecretVersion(self, request, context): """Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. - `projects/*/secrets/*/versions/latest` is an alias to the `latest` - [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. - """ + `projects/*/secrets/*/versions/latest` is an alias to the `latest` + [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") @@ -200,9 +186,9 @@ def GetSecretVersion(self, request, context): def AccessSecretVersion(self, request, context): """Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the secret data. - `projects/*/secrets/*/versions/latest` is an alias to the `latest` - [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. - """ + `projects/*/secrets/*/versions/latest` is an alias to the `latest` + [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") @@ -210,9 +196,9 @@ def AccessSecretVersion(self, request, context): def DisableSecretVersion(self, request, context): """Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. - Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to - [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED]. - """ + Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED]. + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") @@ -220,9 +206,9 @@ def DisableSecretVersion(self, request, context): def EnableSecretVersion(self, request, context): """Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. - Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to - [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED]. - """ + Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED]. + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") @@ -230,42 +216,42 @@ def EnableSecretVersion(self, request, context): def DestroySecretVersion(self, request, context): """Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. - Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to - [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably destroys the - secret data. - """ + Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably destroys the + secret data. + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") def SetIamPolicy(self, request, context): """Sets the access control policy on the specified secret. Replaces any - existing policy. + existing policy. - Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced according - to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret]. - """ + Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced according + to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret]. + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") def GetIamPolicy(self, request, context): """Gets the access control policy for a secret. - Returns empty policy if the secret exists and does not have a policy set. - """ + Returns empty policy if the secret exists and does not have a policy set. + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") def TestIamPermissions(self, request, context): """Returns permissions that a caller has for the specified secret. - If the secret does not exist, this call returns an empty set of - permissions, not a NOT_FOUND error. + If the secret does not exist, this call returns an empty set of + permissions, not a NOT_FOUND error. - Note: This operation is designed to be used for building permission-aware - UIs and command-line tools, not for authorization checking. This operation - may "fail open" without warning. - """ + Note: This operation is designed to be used for building permission-aware + UIs and command-line tools, not for authorization checking. This operation + may "fail open" without warning. + """ context.set_code(grpc.StatusCode.UNIMPLEMENTED) context.set_details("Method not implemented!") raise NotImplementedError("Method not implemented!") @@ -353,3 +339,423 @@ def add_SecretManagerServiceServicer_to_server(servicer, server): "google.cloud.secrets.v1beta1.SecretManagerService", rpc_method_handlers ) server.add_generic_rpc_handlers((generic_handler,)) + + +# This class is part of an EXPERIMENTAL API. +class SecretManagerService(object): + """`projects/*/secrets/*/versions/latest` is an alias to the `latest` + [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + + Secret Manager Service + + Manages secrets and operations using those secrets. Implements a REST + model with the following objects: + + * [Secret][google.cloud.secrets.v1beta1.Secret] + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] + """ + + @staticmethod + def ListSecrets( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secrets.v1beta1.SecretManagerService/ListSecrets", + google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_service__pb2.ListSecretsRequest.SerializeToString, + google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_service__pb2.ListSecretsResponse.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def CreateSecret( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secrets.v1beta1.SecretManagerService/CreateSecret", + google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_service__pb2.CreateSecretRequest.SerializeToString, + google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2.Secret.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def AddSecretVersion( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secrets.v1beta1.SecretManagerService/AddSecretVersion", + google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_service__pb2.AddSecretVersionRequest.SerializeToString, + google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2.SecretVersion.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def GetSecret( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secrets.v1beta1.SecretManagerService/GetSecret", + google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_service__pb2.GetSecretRequest.SerializeToString, + google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2.Secret.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def UpdateSecret( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secrets.v1beta1.SecretManagerService/UpdateSecret", + google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_service__pb2.UpdateSecretRequest.SerializeToString, + google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2.Secret.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def DeleteSecret( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secrets.v1beta1.SecretManagerService/DeleteSecret", + google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_service__pb2.DeleteSecretRequest.SerializeToString, + google_dot_protobuf_dot_empty__pb2.Empty.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def ListSecretVersions( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secrets.v1beta1.SecretManagerService/ListSecretVersions", + google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_service__pb2.ListSecretVersionsRequest.SerializeToString, + google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_service__pb2.ListSecretVersionsResponse.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def GetSecretVersion( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secrets.v1beta1.SecretManagerService/GetSecretVersion", + google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_service__pb2.GetSecretVersionRequest.SerializeToString, + google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2.SecretVersion.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def AccessSecretVersion( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secrets.v1beta1.SecretManagerService/AccessSecretVersion", + google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_service__pb2.AccessSecretVersionRequest.SerializeToString, + google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_service__pb2.AccessSecretVersionResponse.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def DisableSecretVersion( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secrets.v1beta1.SecretManagerService/DisableSecretVersion", + google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_service__pb2.DisableSecretVersionRequest.SerializeToString, + google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2.SecretVersion.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def EnableSecretVersion( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secrets.v1beta1.SecretManagerService/EnableSecretVersion", + google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_service__pb2.EnableSecretVersionRequest.SerializeToString, + google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2.SecretVersion.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def DestroySecretVersion( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secrets.v1beta1.SecretManagerService/DestroySecretVersion", + google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_service__pb2.DestroySecretVersionRequest.SerializeToString, + google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2.SecretVersion.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def SetIamPolicy( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secrets.v1beta1.SecretManagerService/SetIamPolicy", + google_dot_iam_dot_v1_dot_iam__policy__pb2.SetIamPolicyRequest.SerializeToString, + google_dot_iam_dot_v1_dot_policy__pb2.Policy.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def GetIamPolicy( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secrets.v1beta1.SecretManagerService/GetIamPolicy", + google_dot_iam_dot_v1_dot_iam__policy__pb2.GetIamPolicyRequest.SerializeToString, + google_dot_iam_dot_v1_dot_policy__pb2.Policy.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) + + @staticmethod + def TestIamPermissions( + request, + target, + options=(), + channel_credentials=None, + call_credentials=None, + compression=None, + wait_for_ready=None, + timeout=None, + metadata=None, + ): + return grpc.experimental.unary_unary( + request, + target, + "/google.cloud.secrets.v1beta1.SecretManagerService/TestIamPermissions", + google_dot_iam_dot_v1_dot_iam__policy__pb2.TestIamPermissionsRequest.SerializeToString, + google_dot_iam_dot_v1_dot_iam__policy__pb2.TestIamPermissionsResponse.FromString, + options, + channel_credentials, + call_credentials, + compression, + wait_for_ready, + timeout, + metadata, + ) diff --git a/google/cloud/secretmanager_v1beta1/types.py b/google/cloud/secretmanager_v1beta1/types.py index 7a368f2..118d804 100644 --- a/google/cloud/secretmanager_v1beta1/types.py +++ b/google/cloud/secretmanager_v1beta1/types.py @@ -41,7 +41,10 @@ expr_pb2, ] -_local_modules = [resources_pb2, service_pb2] +_local_modules = [ + resources_pb2, + service_pb2, +] names = [] diff --git a/noxfile.py b/noxfile.py index 58a88f4..35fd99b 100644 --- a/noxfile.py +++ b/noxfile.py @@ -23,14 +23,15 @@ import nox -BLACK_VERSION = "black==19.3b0" +BLACK_VERSION = "black==19.10b0" BLACK_PATHS = ["docs", "google", "tests", "noxfile.py", "setup.py"] -if os.path.exists("samples"): - BLACK_PATHS.append("samples") +DEFAULT_PYTHON_VERSION = "3.8" +SYSTEM_TEST_PYTHON_VERSIONS = ["2.7", "3.8"] +UNIT_TEST_PYTHON_VERSIONS = ["2.7", "3.5", "3.6", "3.7", "3.8"] -@nox.session(python="3.7") +@nox.session(python=DEFAULT_PYTHON_VERSION) def lint(session): """Run linters. @@ -38,7 +39,9 @@ def lint(session): serious code quality issues. """ session.install("flake8", BLACK_VERSION) - session.run("black", "--check", *BLACK_PATHS) + session.run( + "black", "--check", *BLACK_PATHS, + ) session.run("flake8", "google", "tests") @@ -53,10 +56,12 @@ def blacken(session): check the state of the `gcp_ubuntu_config` we use for that Kokoro run. """ session.install(BLACK_VERSION) - session.run("black", *BLACK_PATHS) + session.run( + "black", *BLACK_PATHS, + ) -@nox.session(python="3.7") +@nox.session(python=DEFAULT_PYTHON_VERSION) def lint_setup_py(session): """Verify that setup.py is valid (including RST check).""" session.install("docutils", "pygments") @@ -84,13 +89,13 @@ def default(session): ) -@nox.session(python=["2.7", "3.5", "3.6", "3.7", "3.8"]) +@nox.session(python=UNIT_TEST_PYTHON_VERSIONS) def unit(session): """Run the unit test suite.""" default(session) -@nox.session(python=["2.7", "3.7"]) +@nox.session(python=SYSTEM_TEST_PYTHON_VERSIONS) def system(session): """Run the system test suite.""" system_test_path = os.path.join("tests", "system.py") @@ -110,7 +115,9 @@ def system(session): # Install all test dependencies, then install this package into the # virtualenv's dist-packages. - session.install("mock", "pytest", "google-cloud-testutils") + session.install( + "mock", "pytest", "google-cloud-testutils", + ) session.install("-e", ".") # Run py.test against the system tests. @@ -120,7 +127,7 @@ def system(session): session.run("py.test", "--quiet", system_test_folder_path, *session.posargs) -@nox.session(python="3.7") +@nox.session(python=DEFAULT_PYTHON_VERSION) def cover(session): """Run the final coverage report. @@ -133,7 +140,7 @@ def cover(session): session.run("coverage", "erase") -@nox.session(python="3.7") +@nox.session(python=DEFAULT_PYTHON_VERSION) def docs(session): """Build the docs for this library.""" diff --git a/scripts/decrypt-secrets.sh b/scripts/decrypt-secrets.sh new file mode 100755 index 0000000..ff599eb --- /dev/null +++ b/scripts/decrypt-secrets.sh @@ -0,0 +1,33 @@ +#!/bin/bash + +# Copyright 2015 Google Inc. All rights reserved. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )" +ROOT=$( dirname "$DIR" ) + +# Work from the project root. +cd $ROOT + +# Use SECRET_MANAGER_PROJECT if set, fallback to cloud-devrel-kokoro-resources. +PROJECT_ID="${SECRET_MANAGER_PROJECT:-cloud-devrel-kokoro-resources}" + +gcloud secrets versions access latest --secret="python-docs-samples-test-env" \ + > testing/test-env.sh +gcloud secrets versions access latest \ + --secret="python-docs-samples-service-account" \ + > testing/service-account.json +gcloud secrets versions access latest \ + --secret="python-docs-samples-client-secrets" \ + > testing/client-secrets.json \ No newline at end of file diff --git a/scripts/readme-gen/readme_gen.py b/scripts/readme-gen/readme_gen.py new file mode 100644 index 0000000..d309d6e --- /dev/null +++ b/scripts/readme-gen/readme_gen.py @@ -0,0 +1,66 @@ +#!/usr/bin/env python + +# Copyright 2016 Google Inc +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +"""Generates READMEs using configuration defined in yaml.""" + +import argparse +import io +import os +import subprocess + +import jinja2 +import yaml + + +jinja_env = jinja2.Environment( + trim_blocks=True, + loader=jinja2.FileSystemLoader( + os.path.abspath(os.path.join(os.path.dirname(__file__), 'templates')))) + +README_TMPL = jinja_env.get_template('README.tmpl.rst') + + +def get_help(file): + return subprocess.check_output(['python', file, '--help']).decode() + + +def main(): + parser = argparse.ArgumentParser() + parser.add_argument('source') + parser.add_argument('--destination', default='README.rst') + + args = parser.parse_args() + + source = os.path.abspath(args.source) + root = os.path.dirname(source) + destination = os.path.join(root, args.destination) + + jinja_env.globals['get_help'] = get_help + + with io.open(source, 'r') as f: + config = yaml.load(f) + + # This allows get_help to execute in the right directory. + os.chdir(root) + + output = README_TMPL.render(config) + + with io.open(destination, 'w') as f: + f.write(output) + + +if __name__ == '__main__': + main() diff --git a/scripts/readme-gen/templates/README.tmpl.rst b/scripts/readme-gen/templates/README.tmpl.rst new file mode 100644 index 0000000..4fd2397 --- /dev/null +++ b/scripts/readme-gen/templates/README.tmpl.rst @@ -0,0 +1,87 @@ +{# The following line is a lie. BUT! Once jinja2 is done with it, it will + become truth! #} +.. This file is automatically generated. Do not edit this file directly. + +{{product.name}} Python Samples +=============================================================================== + +.. image:: https://gstatic.com/cloudssh/images/open-btn.png + :target: https://console.cloud.google.com/cloudshell/open?git_repo=https://github.com/GoogleCloudPlatform/python-docs-samples&page=editor&open_in_editor={{folder}}/README.rst + + +This directory contains samples for {{product.name}}. {{product.description}} + +{{description}} + +.. _{{product.name}}: {{product.url}} + +{% if required_api_url %} +To run the sample, you need to enable the API at: {{required_api_url}} +{% endif %} + +{% if required_role %} +To run the sample, you need to have `{{required_role}}` role. +{% endif %} + +{{other_required_steps}} + +{% if setup %} +Setup +------------------------------------------------------------------------------- + +{% for section in setup %} + +{% include section + '.tmpl.rst' %} + +{% endfor %} +{% endif %} + +{% if samples %} +Samples +------------------------------------------------------------------------------- + +{% for sample in samples %} +{{sample.name}} ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + +{% if not sample.hide_cloudshell_button %} +.. image:: https://gstatic.com/cloudssh/images/open-btn.png + :target: https://console.cloud.google.com/cloudshell/open?git_repo=https://github.com/GoogleCloudPlatform/python-docs-samples&page=editor&open_in_editor={{folder}}/{{sample.file}},{{folder}}/README.rst +{% endif %} + + +{{sample.description}} + +To run this sample: + +.. code-block:: bash + + $ python {{sample.file}} +{% if sample.show_help %} + + {{get_help(sample.file)|indent}} +{% endif %} + + +{% endfor %} +{% endif %} + +{% if cloud_client_library %} + +The client library +------------------------------------------------------------------------------- + +This sample uses the `Google Cloud Client Library for Python`_. +You can read the documentation for more details on API usage and use GitHub +to `browse the source`_ and `report issues`_. + +.. _Google Cloud Client Library for Python: + https://googlecloudplatform.github.io/google-cloud-python/ +.. _browse the source: + https://github.com/GoogleCloudPlatform/google-cloud-python +.. _report issues: + https://github.com/GoogleCloudPlatform/google-cloud-python/issues + +{% endif %} + +.. _Google Cloud SDK: https://cloud.google.com/sdk/ \ No newline at end of file diff --git a/scripts/readme-gen/templates/auth.tmpl.rst b/scripts/readme-gen/templates/auth.tmpl.rst new file mode 100644 index 0000000..1446b94 --- /dev/null +++ b/scripts/readme-gen/templates/auth.tmpl.rst @@ -0,0 +1,9 @@ +Authentication +++++++++++++++ + +This sample requires you to have authentication setup. Refer to the +`Authentication Getting Started Guide`_ for instructions on setting up +credentials for applications. + +.. _Authentication Getting Started Guide: + https://cloud.google.com/docs/authentication/getting-started diff --git a/scripts/readme-gen/templates/auth_api_key.tmpl.rst b/scripts/readme-gen/templates/auth_api_key.tmpl.rst new file mode 100644 index 0000000..11957ce --- /dev/null +++ b/scripts/readme-gen/templates/auth_api_key.tmpl.rst @@ -0,0 +1,14 @@ +Authentication +++++++++++++++ + +Authentication for this service is done via an `API Key`_. To obtain an API +Key: + +1. Open the `Cloud Platform Console`_ +2. Make sure that billing is enabled for your project. +3. From the **Credentials** page, create a new **API Key** or use an existing + one for your project. + +.. _API Key: + https://developers.google.com/api-client-library/python/guide/aaa_apikeys +.. _Cloud Console: https://console.cloud.google.com/project?_ diff --git a/scripts/readme-gen/templates/install_deps.tmpl.rst b/scripts/readme-gen/templates/install_deps.tmpl.rst new file mode 100644 index 0000000..a0406db --- /dev/null +++ b/scripts/readme-gen/templates/install_deps.tmpl.rst @@ -0,0 +1,29 @@ +Install Dependencies +++++++++++++++++++++ + +#. Clone python-docs-samples and change directory to the sample directory you want to use. + + .. code-block:: bash + + $ git clone https://github.com/GoogleCloudPlatform/python-docs-samples.git + +#. Install `pip`_ and `virtualenv`_ if you do not already have them. You may want to refer to the `Python Development Environment Setup Guide`_ for Google Cloud Platform for instructions. + + .. _Python Development Environment Setup Guide: + https://cloud.google.com/python/setup + +#. Create a virtualenv. Samples are compatible with Python 2.7 and 3.4+. + + .. code-block:: bash + + $ virtualenv env + $ source env/bin/activate + +#. Install the dependencies needed to run the samples. + + .. code-block:: bash + + $ pip install -r requirements.txt + +.. _pip: https://pip.pypa.io/ +.. _virtualenv: https://virtualenv.pypa.io/ diff --git a/scripts/readme-gen/templates/install_portaudio.tmpl.rst b/scripts/readme-gen/templates/install_portaudio.tmpl.rst new file mode 100644 index 0000000..5ea33d1 --- /dev/null +++ b/scripts/readme-gen/templates/install_portaudio.tmpl.rst @@ -0,0 +1,35 @@ +Install PortAudio ++++++++++++++++++ + +Install `PortAudio`_. This is required by the `PyAudio`_ library to stream +audio from your computer's microphone. PyAudio depends on PortAudio for cross-platform compatibility, and is installed differently depending on the +platform. + +* For Mac OS X, you can use `Homebrew`_:: + + brew install portaudio + + **Note**: if you encounter an error when running `pip install` that indicates + it can't find `portaudio.h`, try running `pip install` with the following + flags:: + + pip install --global-option='build_ext' \ + --global-option='-I/usr/local/include' \ + --global-option='-L/usr/local/lib' \ + pyaudio + +* For Debian / Ubuntu Linux:: + + apt-get install portaudio19-dev python-all-dev + +* Windows may work without having to install PortAudio explicitly (it will get + installed with PyAudio). + +For more details, see the `PyAudio installation`_ page. + + +.. _PyAudio: https://people.csail.mit.edu/hubert/pyaudio/ +.. _PortAudio: http://www.portaudio.com/ +.. _PyAudio installation: + https://people.csail.mit.edu/hubert/pyaudio/#downloads +.. _Homebrew: http://brew.sh diff --git a/synth.metadata b/synth.metadata index 2ccf92c..b346985 100644 --- a/synth.metadata +++ b/synth.metadata @@ -3,23 +3,30 @@ { "git": { "name": ".", - "remote": "git@github.com:googleapis/python-secret-manager.git", - "sha": "4934d064dbacc6743a16e3e99adc84359ab002e8" + "remote": "https://github.com/googleapis/python-secret-manager.git", + "sha": "54dca6c3d8943a6455fe0d68c094683ed1e32f3e" } }, { "git": { "name": "googleapis", "remote": "https://github.com/googleapis/googleapis.git", - "sha": "756b174de4a122461993c1c583345533d819936d", - "internalRef": "308824110" + "sha": "b882b8e6bfcd708042ff00f7adc67ce750817dd0", + "internalRef": "318028816" } }, { "git": { "name": "synthtool", "remote": "https://github.com/googleapis/synthtool.git", - "sha": "01b6f23d24b27878b48667ce597876d66b59780e" + "sha": "2a29860e484695a07aa8670f9e750bfeeb308a43" + } + }, + { + "git": { + "name": "synthtool", + "remote": "https://github.com/googleapis/synthtool.git", + "sha": "2a29860e484695a07aa8670f9e750bfeeb308a43" } } ], diff --git a/synth.py b/synth.py index 853dbad..7c72c51 100644 --- a/synth.py +++ b/synth.py @@ -100,5 +100,7 @@ # ---------------------------------------------------------------------------- templated_files = common.py_library(cov_level=75) s.move(templated_files) +# TODO(busunkim): Use latest sphinx after microgenerator transition +s.replace("noxfile.py", """['"]sphinx['"]""", '"sphinx<3.0.0"') s.shell.run(["nox", "-s", "blacken"], hide_output=False) diff --git a/testing/.gitignore b/testing/.gitignore new file mode 100644 index 0000000..b05fbd6 --- /dev/null +++ b/testing/.gitignore @@ -0,0 +1,3 @@ +test-env.sh +service-account.json +client-secrets.json \ No newline at end of file diff --git a/tests/unit/gapic/v1beta1/test_secret_manager_service_client_v1beta1.py b/tests/unit/gapic/v1beta1/test_secret_manager_service_client_v1beta1.py index 4586422..bbbb352 100644 --- a/tests/unit/gapic/v1beta1/test_secret_manager_service_client_v1beta1.py +++ b/tests/unit/gapic/v1beta1/test_secret_manager_service_client_v1beta1.py @@ -129,13 +129,14 @@ def test_create_secret(self): # Setup Request parent = client.project_path("[PROJECT]") secret_id = "secretId-739547894" + secret = {} - response = client.create_secret(parent, secret_id) + response = client.create_secret(parent, secret_id, secret) assert expected_response == response assert len(channel.requests) == 1 expected_request = service_pb2.CreateSecretRequest( - parent=parent, secret_id=secret_id + parent=parent, secret_id=secret_id, secret=secret ) actual_request = channel.requests[0][1] assert expected_request == actual_request @@ -151,9 +152,10 @@ def test_create_secret_exception(self): # Setup request parent = client.project_path("[PROJECT]") secret_id = "secretId-739547894" + secret = {} with pytest.raises(CustomException): - client.create_secret(parent, secret_id) + client.create_secret(parent, secret_id, secret) def test_add_secret_version(self): # Setup Expected Response