diff --git a/.coveragerc b/.coveragerc index b178b09..dd39c85 100644 --- a/.coveragerc +++ b/.coveragerc @@ -1,3 +1,19 @@ +# -*- coding: utf-8 -*- +# +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# https://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + # Generated by synthtool. DO NOT EDIT! [run] branch = True diff --git a/.flake8 b/.flake8 index 0268ecc..20fe9bd 100644 --- a/.flake8 +++ b/.flake8 @@ -1,3 +1,19 @@ +# -*- coding: utf-8 -*- +# +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# https://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + # Generated by synthtool. DO NOT EDIT! [flake8] ignore = E203, E266, E501, W503 diff --git a/.github/ISSUE_TEMPLATE/bug_report.md b/.github/ISSUE_TEMPLATE/bug_report.md index 89ba4fe..7f0e505 100644 --- a/.github/ISSUE_TEMPLATE/bug_report.md +++ b/.github/ISSUE_TEMPLATE/bug_report.md @@ -11,8 +11,7 @@ Thanks for stopping by to let us know something could be better! Please run down the following list and make sure you've tried the usual "quick fixes": - Search the issues already opened: https://github.com/googleapis/python-secret-manager/issues - - Search the issues on our "catch-all" repository: https://github.com/googleapis/google-cloud-python - - Search StackOverflow: http://stackoverflow.com/questions/tagged/google-cloud-platform+python + - Search StackOverflow: https://stackoverflow.com/questions/tagged/google-cloud-platform+python If you are still having issues, please be sure to include as much information as possible: diff --git a/.repo-metadata.json b/.repo-metadata.json index 99498ea..282ec5a 100644 --- a/.repo-metadata.json +++ b/.repo-metadata.json @@ -4,7 +4,7 @@ "product_documentation": "https://cloud.google.com/secret-manager/", "client_documentation": "https://googleapis.dev/python/secretmanager/latest", "issue_tracker": "", - "release_level": "beta", + "release_level": "ga", "language": "python", "repo": "googleapis/python-secret-manager", "distribution_name": "google-cloud-secret-manager", diff --git a/CHANGELOG.md b/CHANGELOG.md index e908264..04bdcd7 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,5 +1,12 @@ # Changelog +## [1.0.0](https://www.github.com/googleapis/python-secret-manager/compare/v0.2.0...v1.0.0) (2020-05-20) + + +### Features + +* release as production/stable ([#24](https://www.github.com/googleapis/python-secret-manager/issues/24)) ([39a8cc8](https://www.github.com/googleapis/python-secret-manager/commit/39a8cc8f631569c82d1cbffc6a9bbb440d380683)) + ## [0.2.0](https://www.github.com/googleapis/python-secret-manager/compare/v0.1.1...v0.2.0) (2020-03-06) diff --git a/CONTRIBUTING.rst b/CONTRIBUTING.rst index 588ede3..bbe41dd 100644 --- a/CONTRIBUTING.rst +++ b/CONTRIBUTING.rst @@ -22,7 +22,7 @@ In order to add a feature: documentation. - The feature must work fully on the following CPython versions: 2.7, - 3.5, 3.6, and 3.7 on both UNIX and Windows. + 3.5, 3.6, 3.7 and 3.8 on both UNIX and Windows. - The feature must not add unnecessary dependencies (where "unnecessary" is of course subjective, but new dependencies should @@ -214,26 +214,18 @@ We support: - `Python 3.5`_ - `Python 3.6`_ - `Python 3.7`_ +- `Python 3.8`_ .. _Python 3.5: https://docs.python.org/3.5/ .. _Python 3.6: https://docs.python.org/3.6/ .. _Python 3.7: https://docs.python.org/3.7/ +.. _Python 3.8: https://docs.python.org/3.8/ Supported versions can be found in our ``noxfile.py`` `config`_. .. _config: https://github.com/googleapis/python-secret-manager/blob/master/noxfile.py -We explicitly decided not to support `Python 2.5`_ due to `decreased usage`_ -and lack of continuous integration `support`_. - -.. _Python 2.5: https://docs.python.org/2.5/ -.. _decreased usage: https://caremad.io/2013/10/a-look-at-pypi-downloads/ -.. _support: https://blog.travis-ci.com/2013-11-18-upcoming-build-environment-updates/ - -We have `dropped 2.6`_ as a supported version as well since Python 2.6 is no -longer supported by the core development team. - Python 2.7 support is deprecated. All code changes should maintain Python 2.7 compatibility until January 1, 2020. We also explicitly decided to support Python 3 beginning with version @@ -247,7 +239,6 @@ We also explicitly decided to support Python 3 beginning with version .. _prominent: https://docs.djangoproject.com/en/1.9/faq/install/#what-python-version-can-i-use-with-django .. _projects: http://flask.pocoo.org/docs/0.10/python3/ .. _Unicode literal support: https://www.python.org/dev/peps/pep-0414/ -.. _dropped 2.6: https://github.com/googleapis/google-cloud-python/issues/995 ********** Versioning diff --git a/MANIFEST.in b/MANIFEST.in index cd011be..68855ab 100644 --- a/MANIFEST.in +++ b/MANIFEST.in @@ -1,3 +1,19 @@ +# -*- coding: utf-8 -*- +# +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# https://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + # Generated by synthtool. DO NOT EDIT! include README.rst LICENSE recursive-include google *.json *.proto diff --git a/README.rst b/README.rst index 2124d0b..a5c268b 100644 --- a/README.rst +++ b/README.rst @@ -1,12 +1,20 @@ -Python Client for Secret Manager API (`Beta`_) -============================================== +Python Client for Secret Manager API +==================================== + +|ga| |pypi| |versions| `Secret Manager API`_: Stores, manages, and secures access to application secrets. - `Client Library Documentation`_ - `Product Documentation`_ -.. _Beta: https://github.com/googleapis/google-cloud-python/blob/master/README.rst +.. |ga| image:: https://img.shields.io/badge/support-GA-gold.svg + :target: https://github.com/googleapis/google-cloud-python/blob/master/README.rst#general-availability +.. |pypi| image:: https://img.shields.io/pypi/v/google-cloud-secret-manager.svg + :target: https://pypi.org/project/google-cloud-secret-manager/ +.. |versions| image:: https://img.shields.io/pypi/pyversions/google-cloud-secret-manager.svg + :target: https://pypi.org/project/google-cloud-secret-manager/ + .. _Secret Manager API: https://cloud.google.com/secret-manager .. _Client Library Documentation: https://googleapis.dev/python/secretmanager/latest .. _Product Documentation: https://cloud.google.com/secret-manager diff --git a/google/cloud/secretmanager_v1/gapic/secret_manager_service_client.py b/google/cloud/secretmanager_v1/gapic/secret_manager_service_client.py index 9a748d9..3c33fa7 100644 --- a/google/cloud/secretmanager_v1/gapic/secret_manager_service_client.py +++ b/google/cloud/secretmanager_v1/gapic/secret_manager_service_client.py @@ -359,6 +359,10 @@ def create_secret( parent (str): Required. The resource name of the project to associate with the ``Secret``, in the format ``projects/*``. secret_id (str): Required. This must be unique within the project. + + A secret ID is a string with a maximum length of 255 characters and can + contain uppercase and lowercase letters, numerals, and the hyphen + (``-``) and underscore (``_``) characters. secret (Union[dict, ~google.cloud.secretmanager_v1.types.Secret]): Required. A ``Secret`` with initial field values. If a dict is provided, it must be of the same form as the protobuf diff --git a/google/cloud/secretmanager_v1/proto/resources_pb2.py b/google/cloud/secretmanager_v1/proto/resources_pb2.py index 91d52dd..7659210 100644 --- a/google/cloud/secretmanager_v1/proto/resources_pb2.py +++ b/google/cloud/secretmanager_v1/proto/resources_pb2.py @@ -1,6 +1,6 @@ # -*- coding: utf-8 -*- -# Copyright 2019 Google LLC +# Copyright 2020 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. @@ -17,9 +17,6 @@ # Generated by the protocol buffer compiler. DO NOT EDIT! # source: google/cloud/secretmanager_v1/proto/resources.proto -import sys - -_b = sys.version_info[0] < 3 and (lambda x: x) or (lambda x: x.encode("latin1")) from google.protobuf import descriptor as _descriptor from google.protobuf import message as _message from google.protobuf import reflection as _reflection @@ -40,12 +37,8 @@ name="google/cloud/secretmanager_v1/proto/resources.proto", package="google.cloud.secretmanager.v1", syntax="proto3", - serialized_options=_b( - "\n!com.google.cloud.secretmanager.v1B\016ResourcesProtoP\001ZJgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1;secretmanager\370\001\001\242\002\003GSM\252\002\035Google.Cloud.SecretManager.V1\312\002\035Google\\Cloud\\SecretManager\\V1\352\002 Google::Cloud::SecretManager::V1" - ), - serialized_pb=_b( - '\n3google/cloud/secretmanager_v1/proto/resources.proto\x12\x1dgoogle.cloud.secretmanager.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1cgoogle/api/annotations.proto"\xdb\x02\n\x06Secret\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12G\n\x0breplication\x18\x02 \x01(\x0b\x32*.google.cloud.secretmanager.v1.ReplicationB\x06\xe0\x41\x05\xe0\x41\x02\x12\x34\n\x0b\x63reate_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x41\n\x06labels\x18\x04 \x03(\x0b\x32\x31.google.cloud.secretmanager.v1.Secret.LabelsEntry\x1a-\n\x0bLabelsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01:M\xea\x41J\n#secretmanager.googleapis.com/Secret\x12#projects/{project}/secrets/{secret}"\x91\x03\n\rSecretVersion\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x35\n\x0c\x64\x65stroy_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x46\n\x05state\x18\x04 \x01(\x0e\x32\x32.google.cloud.secretmanager.v1.SecretVersion.StateB\x03\xe0\x41\x03"H\n\x05State\x12\x15\n\x11STATE_UNSPECIFIED\x10\x00\x12\x0b\n\x07\x45NABLED\x10\x01\x12\x0c\n\x08\x44ISABLED\x10\x02\x12\r\n\tDESTROYED\x10\x03:n\xea\x41k\n*secretmanager.googleapis.com/SecretVersion\x12=projects/{project}/secrets/{secret}/versions/{secret_version}"\xc8\x02\n\x0bReplication\x12I\n\tautomatic\x18\x01 \x01(\x0b\x32\x34.google.cloud.secretmanager.v1.Replication.AutomaticH\x00\x12N\n\x0cuser_managed\x18\x02 \x01(\x0b\x32\x36.google.cloud.secretmanager.v1.Replication.UserManagedH\x00\x1a\x0b\n\tAutomatic\x1a\x81\x01\n\x0bUserManaged\x12U\n\x08replicas\x18\x01 \x03(\x0b\x32>.google.cloud.secretmanager.v1.Replication.UserManaged.ReplicaB\x03\xe0\x41\x02\x1a\x1b\n\x07Replica\x12\x10\n\x08location\x18\x01 \x01(\tB\r\n\x0breplication"\x1d\n\rSecretPayload\x12\x0c\n\x04\x64\x61ta\x18\x01 \x01(\x0c\x42\xed\x01\n!com.google.cloud.secretmanager.v1B\x0eResourcesProtoP\x01ZJgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1;secretmanager\xf8\x01\x01\xa2\x02\x03GSM\xaa\x02\x1dGoogle.Cloud.SecretManager.V1\xca\x02\x1dGoogle\\Cloud\\SecretManager\\V1\xea\x02 Google::Cloud::SecretManager::V1b\x06proto3' - ), + serialized_options=b"\n!com.google.cloud.secretmanager.v1B\016ResourcesProtoP\001ZJgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1;secretmanager\370\001\001\242\002\003GSM\252\002\035Google.Cloud.SecretManager.V1\312\002\035Google\\Cloud\\SecretManager\\V1\352\002 Google::Cloud::SecretManager::V1", + serialized_pb=b'\n3google/cloud/secretmanager_v1/proto/resources.proto\x12\x1dgoogle.cloud.secretmanager.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1cgoogle/api/annotations.proto"\xdb\x02\n\x06Secret\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12G\n\x0breplication\x18\x02 \x01(\x0b\x32*.google.cloud.secretmanager.v1.ReplicationB\x06\xe0\x41\x05\xe0\x41\x02\x12\x34\n\x0b\x63reate_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x41\n\x06labels\x18\x04 \x03(\x0b\x32\x31.google.cloud.secretmanager.v1.Secret.LabelsEntry\x1a-\n\x0bLabelsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01:M\xea\x41J\n#secretmanager.googleapis.com/Secret\x12#projects/{project}/secrets/{secret}"\x91\x03\n\rSecretVersion\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x35\n\x0c\x64\x65stroy_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x46\n\x05state\x18\x04 \x01(\x0e\x32\x32.google.cloud.secretmanager.v1.SecretVersion.StateB\x03\xe0\x41\x03"H\n\x05State\x12\x15\n\x11STATE_UNSPECIFIED\x10\x00\x12\x0b\n\x07\x45NABLED\x10\x01\x12\x0c\n\x08\x44ISABLED\x10\x02\x12\r\n\tDESTROYED\x10\x03:n\xea\x41k\n*secretmanager.googleapis.com/SecretVersion\x12=projects/{project}/secrets/{secret}/versions/{secret_version}"\xc8\x02\n\x0bReplication\x12I\n\tautomatic\x18\x01 \x01(\x0b\x32\x34.google.cloud.secretmanager.v1.Replication.AutomaticH\x00\x12N\n\x0cuser_managed\x18\x02 \x01(\x0b\x32\x36.google.cloud.secretmanager.v1.Replication.UserManagedH\x00\x1a\x0b\n\tAutomatic\x1a\x81\x01\n\x0bUserManaged\x12U\n\x08replicas\x18\x01 \x03(\x0b\x32>.google.cloud.secretmanager.v1.Replication.UserManaged.ReplicaB\x03\xe0\x41\x02\x1a\x1b\n\x07Replica\x12\x10\n\x08location\x18\x01 \x01(\tB\r\n\x0breplication"\x1d\n\rSecretPayload\x12\x0c\n\x04\x64\x61ta\x18\x01 \x01(\x0c\x42\xed\x01\n!com.google.cloud.secretmanager.v1B\x0eResourcesProtoP\x01ZJgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1;secretmanager\xf8\x01\x01\xa2\x02\x03GSM\xaa\x02\x1dGoogle.Cloud.SecretManager.V1\xca\x02\x1dGoogle\\Cloud\\SecretManager\\V1\xea\x02 Google::Cloud::SecretManager::V1b\x06proto3', dependencies=[ google_dot_api_dot_field__behavior__pb2.DESCRIPTOR, google_dot_api_dot_resource__pb2.DESCRIPTOR, @@ -102,7 +95,7 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, @@ -120,7 +113,7 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, @@ -133,7 +126,7 @@ extensions=[], nested_types=[], enum_types=[], - serialized_options=_b("8\001"), + serialized_options=b"8\001", is_extendable=False, syntax="proto3", extension_ranges=[], @@ -158,13 +151,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\003"), + serialized_options=b"\340A\003", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -182,7 +175,7 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\005\340A\002"), + serialized_options=b"\340A\005\340A\002", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -200,7 +193,7 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\003"), + serialized_options=b"\340A\003", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -225,9 +218,7 @@ extensions=[], nested_types=[_SECRET_LABELSENTRY], enum_types=[], - serialized_options=_b( - "\352AJ\n#secretmanager.googleapis.com/Secret\022#projects/{project}/secrets/{secret}" - ), + serialized_options=b"\352AJ\n#secretmanager.googleapis.com/Secret\022#projects/{project}/secrets/{secret}", is_extendable=False, syntax="proto3", extension_ranges=[], @@ -253,13 +244,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\003"), + serialized_options=b"\340A\003", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -277,7 +268,7 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\003"), + serialized_options=b"\340A\003", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -295,7 +286,7 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\003"), + serialized_options=b"\340A\003", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -313,16 +304,14 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\003"), + serialized_options=b"\340A\003", file=DESCRIPTOR, ), ], extensions=[], nested_types=[], enum_types=[_SECRETVERSION_STATE], - serialized_options=_b( - "\352Ak\n*secretmanager.googleapis.com/SecretVersion\022=projects/{project}/secrets/{secret}/versions/{secret_version}" - ), + serialized_options=b"\352Ak\n*secretmanager.googleapis.com/SecretVersion\022=projects/{project}/secrets/{secret}/versions/{secret_version}", is_extendable=False, syntax="proto3", extension_ranges=[], @@ -367,7 +356,7 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, @@ -411,7 +400,7 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\002"), + serialized_options=b"\340A\002", file=DESCRIPTOR, ) ], @@ -508,7 +497,7 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b(""), + default_value=b"", message_type=None, enum_type=None, containing_type=None, @@ -585,8 +574,8 @@ ), "DESCRIPTOR": _SECRET, "__module__": "google.cloud.secretmanager_v1.proto.resources_pb2", - "__doc__": """A [Secret][google.cloud.secretmanager.v1.Secret] is a logical secret - whose value and versions can be accessed. + "__doc__": """A [Secret][google.cloud.secretmanager.v1.Secret] is a + logical secret whose value and versions can be accessed. A [Secret][google.cloud.secretmanager.v1.Secret] is made up of zero or more [SecretVersions][google.cloud.secretmanager.v1.SecretVersion] that @@ -721,8 +710,7 @@ ), "DESCRIPTOR": _REPLICATION, "__module__": "google.cloud.secretmanager_v1.proto.resources_pb2", - "__doc__": """A policy that defines the replication configuration of - data. + "__doc__": """A policy that defines the replication configuration of data. Attributes: diff --git a/google/cloud/secretmanager_v1/proto/resources_pb2_grpc.py b/google/cloud/secretmanager_v1/proto/resources_pb2_grpc.py index 7343170..b662812 100644 --- a/google/cloud/secretmanager_v1/proto/resources_pb2_grpc.py +++ b/google/cloud/secretmanager_v1/proto/resources_pb2_grpc.py @@ -1,4 +1,4 @@ -# Copyright 2019 Google LLC +# Copyright 2020 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/google/cloud/secretmanager_v1/proto/service_pb2.py b/google/cloud/secretmanager_v1/proto/service_pb2.py index 641940d..5220b2f 100644 --- a/google/cloud/secretmanager_v1/proto/service_pb2.py +++ b/google/cloud/secretmanager_v1/proto/service_pb2.py @@ -1,6 +1,6 @@ # -*- coding: utf-8 -*- -# Copyright 2019 Google LLC +# Copyright 2020 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. @@ -17,9 +17,6 @@ # Generated by the protocol buffer compiler. DO NOT EDIT! # source: google/cloud/secretmanager_v1/proto/service.proto -import sys - -_b = sys.version_info[0] < 3 and (lambda x: x) or (lambda x: x.encode("latin1")) from google.protobuf import descriptor as _descriptor from google.protobuf import message as _message from google.protobuf import reflection as _reflection @@ -47,12 +44,8 @@ name="google/cloud/secretmanager_v1/proto/service.proto", package="google.cloud.secretmanager.v1", syntax="proto3", - serialized_options=_b( - "\n!com.google.cloud.secretmanager.v1B\014ServiceProtoP\001ZJgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1;secretmanager\370\001\001\242\002\003GSM\252\002\035Google.Cloud.SecretManager.V1\312\002\035Google\\Cloud\\SecretManager\\V1\352\002 Google::Cloud::SecretManager::V1" - ), - serialized_pb=_b( - '\n1google/cloud/secretmanager_v1/proto/service.proto\x12\x1dgoogle.cloud.secretmanager.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x33google/cloud/secretmanager_v1/proto/resources.proto\x1a\x1egoogle/iam/v1/iam_policy.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a\x1bgoogle/protobuf/empty.proto\x1a google/protobuf/field_mask.proto"\x8a\x01\n\x12ListSecretsRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01"z\n\x13ListSecretsResponse\x12\x36\n\x07secrets\x18\x01 \x03(\x0b\x32%.google.cloud.secretmanager.v1.Secret\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05"\xae\x01\n\x13\x43reateSecretRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x16\n\tsecret_id\x18\x02 \x01(\tB\x03\xe0\x41\x02\x12:\n\x06secret\x18\x03 \x01(\x0b\x32%.google.cloud.secretmanager.v1.SecretB\x03\xe0\x41\x02"\x9a\x01\n\x17\x41\x64\x64SecretVersionRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x42\n\x07payload\x18\x02 \x01(\x0b\x32,.google.cloud.secretmanager.v1.SecretPayloadB\x03\xe0\x41\x02"M\n\x10GetSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret"\x89\x01\n\x19ListSecretVersionsRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01"\x89\x01\n\x1aListSecretVersionsResponse\x12>\n\x08versions\x18\x01 \x03(\x0b\x32,.google.cloud.secretmanager.v1.SecretVersion\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05"[\n\x17GetSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"\x87\x01\n\x13UpdateSecretRequest\x12:\n\x06secret\x18\x01 \x01(\x0b\x32%.google.cloud.secretmanager.v1.SecretB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02"^\n\x1a\x41\x63\x63\x65ssSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"\x9b\x01\n\x1b\x41\x63\x63\x65ssSecretVersionResponse\x12=\n\x04name\x18\x01 \x01(\tB/\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12=\n\x07payload\x18\x02 \x01(\x0b\x32,.google.cloud.secretmanager.v1.SecretPayload"P\n\x13\x44\x65leteSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret"_\n\x1b\x44isableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"^\n\x1a\x45nableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"_\n\x1b\x44\x65stroySecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion2\xcf\x15\n\x14SecretManagerService\x12\xa6\x01\n\x0bListSecrets\x12\x31.google.cloud.secretmanager.v1.ListSecretsRequest\x1a\x32.google.cloud.secretmanager.v1.ListSecretsResponse"0\x82\xd3\xe4\x93\x02!\x12\x1f/v1/{parent=projects/*}/secrets\xda\x41\x06parent\x12\xb4\x01\n\x0c\x43reateSecret\x12\x32.google.cloud.secretmanager.v1.CreateSecretRequest\x1a%.google.cloud.secretmanager.v1.Secret"I\x82\xd3\xe4\x93\x02)"\x1f/v1/{parent=projects/*}/secrets:\x06secret\xda\x41\x17parent,secret_id,secret\x12\xc2\x01\n\x10\x41\x64\x64SecretVersion\x12\x36.google.cloud.secretmanager.v1.AddSecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion"H\x82\xd3\xe4\x93\x02\x31",/v1/{parent=projects/*/secrets/*}:addVersion:\x01*\xda\x41\x0eparent,payload\x12\x93\x01\n\tGetSecret\x12/.google.cloud.secretmanager.v1.GetSecretRequest\x1a%.google.cloud.secretmanager.v1.Secret".\x82\xd3\xe4\x93\x02!\x12\x1f/v1/{name=projects/*/secrets/*}\xda\x41\x04name\x12\xb6\x01\n\x0cUpdateSecret\x12\x32.google.cloud.secretmanager.v1.UpdateSecretRequest\x1a%.google.cloud.secretmanager.v1.Secret"K\x82\xd3\xe4\x93\x02\x30\x32&/v1/{secret.name=projects/*/secrets/*}:\x06secret\xda\x41\x12secret,update_mask\x12\x8a\x01\n\x0c\x44\x65leteSecret\x12\x32.google.cloud.secretmanager.v1.DeleteSecretRequest\x1a\x16.google.protobuf.Empty".\x82\xd3\xe4\x93\x02!*\x1f/v1/{name=projects/*/secrets/*}\xda\x41\x04name\x12\xc6\x01\n\x12ListSecretVersions\x12\x38.google.cloud.secretmanager.v1.ListSecretVersionsRequest\x1a\x39.google.cloud.secretmanager.v1.ListSecretVersionsResponse";\x82\xd3\xe4\x93\x02,\x12*/v1/{parent=projects/*/secrets/*}/versions\xda\x41\x06parent\x12\xb3\x01\n\x10GetSecretVersion\x12\x36.google.cloud.secretmanager.v1.GetSecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion"9\x82\xd3\xe4\x93\x02,\x12*/v1/{name=projects/*/secrets/*/versions/*}\xda\x41\x04name\x12\xce\x01\n\x13\x41\x63\x63\x65ssSecretVersion\x12\x39.google.cloud.secretmanager.v1.AccessSecretVersionRequest\x1a:.google.cloud.secretmanager.v1.AccessSecretVersionResponse"@\x82\xd3\xe4\x93\x02\x33\x12\x31/v1/{name=projects/*/secrets/*/versions/*}:access\xda\x41\x04name\x12\xc6\x01\n\x14\x44isableSecretVersion\x12:.google.cloud.secretmanager.v1.DisableSecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion"D\x82\xd3\xe4\x93\x02\x37"2/v1/{name=projects/*/secrets/*/versions/*}:disable:\x01*\xda\x41\x04name\x12\xc3\x01\n\x13\x45nableSecretVersion\x12\x39.google.cloud.secretmanager.v1.EnableSecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion"C\x82\xd3\xe4\x93\x02\x36"1/v1/{name=projects/*/secrets/*/versions/*}:enable:\x01*\xda\x41\x04name\x12\xc6\x01\n\x14\x44\x65stroySecretVersion\x12:.google.cloud.secretmanager.v1.DestroySecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion"D\x82\xd3\xe4\x93\x02\x37"2/v1/{name=projects/*/secrets/*/versions/*}:destroy:\x01*\xda\x41\x04name\x12\x86\x01\n\x0cSetIamPolicy\x12".google.iam.v1.SetIamPolicyRequest\x1a\x15.google.iam.v1.Policy";\x82\xd3\xe4\x93\x02\x35"0/v1/{resource=projects/*/secrets/*}:setIamPolicy:\x01*\x12\x83\x01\n\x0cGetIamPolicy\x12".google.iam.v1.GetIamPolicyRequest\x1a\x15.google.iam.v1.Policy"8\x82\xd3\xe4\x93\x02\x32\x12\x30/v1/{resource=projects/*/secrets/*}:getIamPolicy\x12\xac\x01\n\x12TestIamPermissions\x12(.google.iam.v1.TestIamPermissionsRequest\x1a).google.iam.v1.TestIamPermissionsResponse"A\x82\xd3\xe4\x93\x02;"6/v1/{resource=projects/*/secrets/*}:testIamPermissions:\x01*\x1aP\xca\x41\x1csecretmanager.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\xeb\x01\n!com.google.cloud.secretmanager.v1B\x0cServiceProtoP\x01ZJgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1;secretmanager\xf8\x01\x01\xa2\x02\x03GSM\xaa\x02\x1dGoogle.Cloud.SecretManager.V1\xca\x02\x1dGoogle\\Cloud\\SecretManager\\V1\xea\x02 Google::Cloud::SecretManager::V1b\x06proto3' - ), + serialized_options=b"\n!com.google.cloud.secretmanager.v1B\014ServiceProtoP\001ZJgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1;secretmanager\370\001\001\242\002\003GSM\252\002\035Google.Cloud.SecretManager.V1\312\002\035Google\\Cloud\\SecretManager\\V1\352\002 Google::Cloud::SecretManager::V1", + serialized_pb=b'\n1google/cloud/secretmanager_v1/proto/service.proto\x12\x1dgoogle.cloud.secretmanager.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x33google/cloud/secretmanager_v1/proto/resources.proto\x1a\x1egoogle/iam/v1/iam_policy.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a\x1bgoogle/protobuf/empty.proto\x1a google/protobuf/field_mask.proto"\x8a\x01\n\x12ListSecretsRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01"z\n\x13ListSecretsResponse\x12\x36\n\x07secrets\x18\x01 \x03(\x0b\x32%.google.cloud.secretmanager.v1.Secret\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05"\xae\x01\n\x13\x43reateSecretRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x16\n\tsecret_id\x18\x02 \x01(\tB\x03\xe0\x41\x02\x12:\n\x06secret\x18\x03 \x01(\x0b\x32%.google.cloud.secretmanager.v1.SecretB\x03\xe0\x41\x02"\x9a\x01\n\x17\x41\x64\x64SecretVersionRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x42\n\x07payload\x18\x02 \x01(\x0b\x32,.google.cloud.secretmanager.v1.SecretPayloadB\x03\xe0\x41\x02"M\n\x10GetSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret"\x89\x01\n\x19ListSecretVersionsRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01"\x89\x01\n\x1aListSecretVersionsResponse\x12>\n\x08versions\x18\x01 \x03(\x0b\x32,.google.cloud.secretmanager.v1.SecretVersion\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05"[\n\x17GetSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"\x87\x01\n\x13UpdateSecretRequest\x12:\n\x06secret\x18\x01 \x01(\x0b\x32%.google.cloud.secretmanager.v1.SecretB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02"^\n\x1a\x41\x63\x63\x65ssSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"\x9b\x01\n\x1b\x41\x63\x63\x65ssSecretVersionResponse\x12=\n\x04name\x18\x01 \x01(\tB/\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12=\n\x07payload\x18\x02 \x01(\x0b\x32,.google.cloud.secretmanager.v1.SecretPayload"P\n\x13\x44\x65leteSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret"_\n\x1b\x44isableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"^\n\x1a\x45nableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"_\n\x1b\x44\x65stroySecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion2\xcf\x15\n\x14SecretManagerService\x12\xa6\x01\n\x0bListSecrets\x12\x31.google.cloud.secretmanager.v1.ListSecretsRequest\x1a\x32.google.cloud.secretmanager.v1.ListSecretsResponse"0\x82\xd3\xe4\x93\x02!\x12\x1f/v1/{parent=projects/*}/secrets\xda\x41\x06parent\x12\xb4\x01\n\x0c\x43reateSecret\x12\x32.google.cloud.secretmanager.v1.CreateSecretRequest\x1a%.google.cloud.secretmanager.v1.Secret"I\x82\xd3\xe4\x93\x02)"\x1f/v1/{parent=projects/*}/secrets:\x06secret\xda\x41\x17parent,secret_id,secret\x12\xc2\x01\n\x10\x41\x64\x64SecretVersion\x12\x36.google.cloud.secretmanager.v1.AddSecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion"H\x82\xd3\xe4\x93\x02\x31",/v1/{parent=projects/*/secrets/*}:addVersion:\x01*\xda\x41\x0eparent,payload\x12\x93\x01\n\tGetSecret\x12/.google.cloud.secretmanager.v1.GetSecretRequest\x1a%.google.cloud.secretmanager.v1.Secret".\x82\xd3\xe4\x93\x02!\x12\x1f/v1/{name=projects/*/secrets/*}\xda\x41\x04name\x12\xb6\x01\n\x0cUpdateSecret\x12\x32.google.cloud.secretmanager.v1.UpdateSecretRequest\x1a%.google.cloud.secretmanager.v1.Secret"K\x82\xd3\xe4\x93\x02\x30\x32&/v1/{secret.name=projects/*/secrets/*}:\x06secret\xda\x41\x12secret,update_mask\x12\x8a\x01\n\x0c\x44\x65leteSecret\x12\x32.google.cloud.secretmanager.v1.DeleteSecretRequest\x1a\x16.google.protobuf.Empty".\x82\xd3\xe4\x93\x02!*\x1f/v1/{name=projects/*/secrets/*}\xda\x41\x04name\x12\xc6\x01\n\x12ListSecretVersions\x12\x38.google.cloud.secretmanager.v1.ListSecretVersionsRequest\x1a\x39.google.cloud.secretmanager.v1.ListSecretVersionsResponse";\x82\xd3\xe4\x93\x02,\x12*/v1/{parent=projects/*/secrets/*}/versions\xda\x41\x06parent\x12\xb3\x01\n\x10GetSecretVersion\x12\x36.google.cloud.secretmanager.v1.GetSecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion"9\x82\xd3\xe4\x93\x02,\x12*/v1/{name=projects/*/secrets/*/versions/*}\xda\x41\x04name\x12\xce\x01\n\x13\x41\x63\x63\x65ssSecretVersion\x12\x39.google.cloud.secretmanager.v1.AccessSecretVersionRequest\x1a:.google.cloud.secretmanager.v1.AccessSecretVersionResponse"@\x82\xd3\xe4\x93\x02\x33\x12\x31/v1/{name=projects/*/secrets/*/versions/*}:access\xda\x41\x04name\x12\xc6\x01\n\x14\x44isableSecretVersion\x12:.google.cloud.secretmanager.v1.DisableSecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion"D\x82\xd3\xe4\x93\x02\x37"2/v1/{name=projects/*/secrets/*/versions/*}:disable:\x01*\xda\x41\x04name\x12\xc3\x01\n\x13\x45nableSecretVersion\x12\x39.google.cloud.secretmanager.v1.EnableSecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion"C\x82\xd3\xe4\x93\x02\x36"1/v1/{name=projects/*/secrets/*/versions/*}:enable:\x01*\xda\x41\x04name\x12\xc6\x01\n\x14\x44\x65stroySecretVersion\x12:.google.cloud.secretmanager.v1.DestroySecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion"D\x82\xd3\xe4\x93\x02\x37"2/v1/{name=projects/*/secrets/*/versions/*}:destroy:\x01*\xda\x41\x04name\x12\x86\x01\n\x0cSetIamPolicy\x12".google.iam.v1.SetIamPolicyRequest\x1a\x15.google.iam.v1.Policy";\x82\xd3\xe4\x93\x02\x35"0/v1/{resource=projects/*/secrets/*}:setIamPolicy:\x01*\x12\x83\x01\n\x0cGetIamPolicy\x12".google.iam.v1.GetIamPolicyRequest\x1a\x15.google.iam.v1.Policy"8\x82\xd3\xe4\x93\x02\x32\x12\x30/v1/{resource=projects/*/secrets/*}:getIamPolicy\x12\xac\x01\n\x12TestIamPermissions\x12(.google.iam.v1.TestIamPermissionsRequest\x1a).google.iam.v1.TestIamPermissionsResponse"A\x82\xd3\xe4\x93\x02;"6/v1/{resource=projects/*/secrets/*}:testIamPermissions:\x01*\x1aP\xca\x41\x1csecretmanager.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\xeb\x01\n!com.google.cloud.secretmanager.v1B\x0cServiceProtoP\x01ZJgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1;secretmanager\xf8\x01\x01\xa2\x02\x03GSM\xaa\x02\x1dGoogle.Cloud.SecretManager.V1\xca\x02\x1dGoogle\\Cloud\\SecretManager\\V1\xea\x02 Google::Cloud::SecretManager::V1b\x06proto3', dependencies=[ google_dot_api_dot_annotations__pb2.DESCRIPTOR, google_dot_api_dot_client__pb2.DESCRIPTOR, @@ -83,15 +76,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\340A\002\372A-\n+cloudresourcemanager.googleapis.com/Project" - ), + serialized_options=b"\340A\002\372A-\n+cloudresourcemanager.googleapis.com/Project", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -109,7 +100,7 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\001"), + serialized_options=b"\340A\001", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -121,13 +112,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\001"), + serialized_options=b"\340A\001", file=DESCRIPTOR, ), ], @@ -178,7 +169,7 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, @@ -235,15 +226,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\340A\002\372A-\n+cloudresourcemanager.googleapis.com/Project" - ), + serialized_options=b"\340A\002\372A-\n+cloudresourcemanager.googleapis.com/Project", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -255,13 +244,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\002"), + serialized_options=b"\340A\002", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -279,7 +268,7 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\002"), + serialized_options=b"\340A\002", file=DESCRIPTOR, ), ], @@ -312,15 +301,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\340A\002\372A%\n#secretmanager.googleapis.com/Secret" - ), + serialized_options=b"\340A\002\372A%\n#secretmanager.googleapis.com/Secret", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -338,7 +325,7 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\002"), + serialized_options=b"\340A\002", file=DESCRIPTOR, ), ], @@ -371,15 +358,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\340A\002\372A%\n#secretmanager.googleapis.com/Secret" - ), + serialized_options=b"\340A\002\372A%\n#secretmanager.googleapis.com/Secret", file=DESCRIPTOR, ) ], @@ -412,15 +397,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\340A\002\372A%\n#secretmanager.googleapis.com/Secret" - ), + serialized_options=b"\340A\002\372A%\n#secretmanager.googleapis.com/Secret", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -438,7 +421,7 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\001"), + serialized_options=b"\340A\001", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -450,13 +433,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\001"), + serialized_options=b"\340A\001", file=DESCRIPTOR, ), ], @@ -507,7 +490,7 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, @@ -564,15 +547,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion" - ), + serialized_options=b"\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, ) ], @@ -611,7 +592,7 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\002"), + serialized_options=b"\340A\002", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -629,7 +610,7 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\002"), + serialized_options=b"\340A\002", file=DESCRIPTOR, ), ], @@ -662,15 +643,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion" - ), + serialized_options=b"\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, ) ], @@ -703,15 +682,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\372A,\n*secretmanager.googleapis.com/SecretVersion" - ), + serialized_options=b"\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -762,15 +739,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\340A\002\372A%\n#secretmanager.googleapis.com/Secret" - ), + serialized_options=b"\340A\002\372A%\n#secretmanager.googleapis.com/Secret", file=DESCRIPTOR, ) ], @@ -803,15 +778,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion" - ), + serialized_options=b"\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, ) ], @@ -844,15 +817,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion" - ), + serialized_options=b"\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, ) ], @@ -885,15 +856,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion" - ), + serialized_options=b"\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, ) ], @@ -1046,7 +1015,10 @@ the [Secret][google.cloud.secretmanager.v1.Secret], in the format ``projects/*``. secret_id: - Required. This must be unique within the project. + Required. This must be unique within the project. A secret ID + is a string with a maximum length of 255 characters and can + contain uppercase and lowercase letters, numerals, and the + hyphen (``-``) and underscore (``_``) characters. secret: Required. A [Secret][google.cloud.secretmanager.v1.Secret] with initial field values. @@ -1366,9 +1338,7 @@ full_name="google.cloud.secretmanager.v1.SecretManagerService", file=DESCRIPTOR, index=0, - serialized_options=_b( - "\312A\034secretmanager.googleapis.com\322A.https://www.googleapis.com/auth/cloud-platform" - ), + serialized_options=b"\312A\034secretmanager.googleapis.com\322A.https://www.googleapis.com/auth/cloud-platform", serialized_start=2191, serialized_end=4958, methods=[ @@ -1379,9 +1349,7 @@ containing_service=None, input_type=_LISTSECRETSREQUEST, output_type=_LISTSECRETSRESPONSE, - serialized_options=_b( - "\202\323\344\223\002!\022\037/v1/{parent=projects/*}/secrets\332A\006parent" - ), + serialized_options=b"\202\323\344\223\002!\022\037/v1/{parent=projects/*}/secrets\332A\006parent", ), _descriptor.MethodDescriptor( name="CreateSecret", @@ -1390,9 +1358,7 @@ containing_service=None, input_type=_CREATESECRETREQUEST, output_type=google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2._SECRET, - serialized_options=_b( - '\202\323\344\223\002)"\037/v1/{parent=projects/*}/secrets:\006secret\332A\027parent,secret_id,secret' - ), + serialized_options=b'\202\323\344\223\002)"\037/v1/{parent=projects/*}/secrets:\006secret\332A\027parent,secret_id,secret', ), _descriptor.MethodDescriptor( name="AddSecretVersion", @@ -1401,9 +1367,7 @@ containing_service=None, input_type=_ADDSECRETVERSIONREQUEST, output_type=google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2._SECRETVERSION, - serialized_options=_b( - '\202\323\344\223\0021",/v1/{parent=projects/*/secrets/*}:addVersion:\001*\332A\016parent,payload' - ), + serialized_options=b'\202\323\344\223\0021",/v1/{parent=projects/*/secrets/*}:addVersion:\001*\332A\016parent,payload', ), _descriptor.MethodDescriptor( name="GetSecret", @@ -1412,9 +1376,7 @@ containing_service=None, input_type=_GETSECRETREQUEST, output_type=google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2._SECRET, - serialized_options=_b( - "\202\323\344\223\002!\022\037/v1/{name=projects/*/secrets/*}\332A\004name" - ), + serialized_options=b"\202\323\344\223\002!\022\037/v1/{name=projects/*/secrets/*}\332A\004name", ), _descriptor.MethodDescriptor( name="UpdateSecret", @@ -1423,9 +1385,7 @@ containing_service=None, input_type=_UPDATESECRETREQUEST, output_type=google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2._SECRET, - serialized_options=_b( - "\202\323\344\223\00202&/v1/{secret.name=projects/*/secrets/*}:\006secret\332A\022secret,update_mask" - ), + serialized_options=b"\202\323\344\223\00202&/v1/{secret.name=projects/*/secrets/*}:\006secret\332A\022secret,update_mask", ), _descriptor.MethodDescriptor( name="DeleteSecret", @@ -1434,9 +1394,7 @@ containing_service=None, input_type=_DELETESECRETREQUEST, output_type=google_dot_protobuf_dot_empty__pb2._EMPTY, - serialized_options=_b( - "\202\323\344\223\002!*\037/v1/{name=projects/*/secrets/*}\332A\004name" - ), + serialized_options=b"\202\323\344\223\002!*\037/v1/{name=projects/*/secrets/*}\332A\004name", ), _descriptor.MethodDescriptor( name="ListSecretVersions", @@ -1445,9 +1403,7 @@ containing_service=None, input_type=_LISTSECRETVERSIONSREQUEST, output_type=_LISTSECRETVERSIONSRESPONSE, - serialized_options=_b( - "\202\323\344\223\002,\022*/v1/{parent=projects/*/secrets/*}/versions\332A\006parent" - ), + serialized_options=b"\202\323\344\223\002,\022*/v1/{parent=projects/*/secrets/*}/versions\332A\006parent", ), _descriptor.MethodDescriptor( name="GetSecretVersion", @@ -1456,9 +1412,7 @@ containing_service=None, input_type=_GETSECRETVERSIONREQUEST, output_type=google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2._SECRETVERSION, - serialized_options=_b( - "\202\323\344\223\002,\022*/v1/{name=projects/*/secrets/*/versions/*}\332A\004name" - ), + serialized_options=b"\202\323\344\223\002,\022*/v1/{name=projects/*/secrets/*/versions/*}\332A\004name", ), _descriptor.MethodDescriptor( name="AccessSecretVersion", @@ -1467,9 +1421,7 @@ containing_service=None, input_type=_ACCESSSECRETVERSIONREQUEST, output_type=_ACCESSSECRETVERSIONRESPONSE, - serialized_options=_b( - "\202\323\344\223\0023\0221/v1/{name=projects/*/secrets/*/versions/*}:access\332A\004name" - ), + serialized_options=b"\202\323\344\223\0023\0221/v1/{name=projects/*/secrets/*/versions/*}:access\332A\004name", ), _descriptor.MethodDescriptor( name="DisableSecretVersion", @@ -1478,9 +1430,7 @@ containing_service=None, input_type=_DISABLESECRETVERSIONREQUEST, output_type=google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2._SECRETVERSION, - serialized_options=_b( - '\202\323\344\223\0027"2/v1/{name=projects/*/secrets/*/versions/*}:disable:\001*\332A\004name' - ), + serialized_options=b'\202\323\344\223\0027"2/v1/{name=projects/*/secrets/*/versions/*}:disable:\001*\332A\004name', ), _descriptor.MethodDescriptor( name="EnableSecretVersion", @@ -1489,9 +1439,7 @@ containing_service=None, input_type=_ENABLESECRETVERSIONREQUEST, output_type=google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2._SECRETVERSION, - serialized_options=_b( - '\202\323\344\223\0026"1/v1/{name=projects/*/secrets/*/versions/*}:enable:\001*\332A\004name' - ), + serialized_options=b'\202\323\344\223\0026"1/v1/{name=projects/*/secrets/*/versions/*}:enable:\001*\332A\004name', ), _descriptor.MethodDescriptor( name="DestroySecretVersion", @@ -1500,9 +1448,7 @@ containing_service=None, input_type=_DESTROYSECRETVERSIONREQUEST, output_type=google_dot_cloud_dot_secretmanager__v1_dot_proto_dot_resources__pb2._SECRETVERSION, - serialized_options=_b( - '\202\323\344\223\0027"2/v1/{name=projects/*/secrets/*/versions/*}:destroy:\001*\332A\004name' - ), + serialized_options=b'\202\323\344\223\0027"2/v1/{name=projects/*/secrets/*/versions/*}:destroy:\001*\332A\004name', ), _descriptor.MethodDescriptor( name="SetIamPolicy", @@ -1511,9 +1457,7 @@ containing_service=None, input_type=google_dot_iam_dot_v1_dot_iam__policy__pb2._SETIAMPOLICYREQUEST, output_type=google_dot_iam_dot_v1_dot_policy__pb2._POLICY, - serialized_options=_b( - '\202\323\344\223\0025"0/v1/{resource=projects/*/secrets/*}:setIamPolicy:\001*' - ), + serialized_options=b'\202\323\344\223\0025"0/v1/{resource=projects/*/secrets/*}:setIamPolicy:\001*', ), _descriptor.MethodDescriptor( name="GetIamPolicy", @@ -1522,9 +1466,7 @@ containing_service=None, input_type=google_dot_iam_dot_v1_dot_iam__policy__pb2._GETIAMPOLICYREQUEST, output_type=google_dot_iam_dot_v1_dot_policy__pb2._POLICY, - serialized_options=_b( - "\202\323\344\223\0022\0220/v1/{resource=projects/*/secrets/*}:getIamPolicy" - ), + serialized_options=b"\202\323\344\223\0022\0220/v1/{resource=projects/*/secrets/*}:getIamPolicy", ), _descriptor.MethodDescriptor( name="TestIamPermissions", @@ -1533,9 +1475,7 @@ containing_service=None, input_type=google_dot_iam_dot_v1_dot_iam__policy__pb2._TESTIAMPERMISSIONSREQUEST, output_type=google_dot_iam_dot_v1_dot_iam__policy__pb2._TESTIAMPERMISSIONSRESPONSE, - serialized_options=_b( - '\202\323\344\223\002;"6/v1/{resource=projects/*/secrets/*}:testIamPermissions:\001*' - ), + serialized_options=b'\202\323\344\223\002;"6/v1/{resource=projects/*/secrets/*}:testIamPermissions:\001*', ), ], ) diff --git a/google/cloud/secretmanager_v1/proto/service_pb2_grpc.py b/google/cloud/secretmanager_v1/proto/service_pb2_grpc.py index 60dbd55..6bc081a 100644 --- a/google/cloud/secretmanager_v1/proto/service_pb2_grpc.py +++ b/google/cloud/secretmanager_v1/proto/service_pb2_grpc.py @@ -1,4 +1,4 @@ -# Copyright 2019 Google LLC +# Copyright 2020 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/google/cloud/secretmanager_v1beta1/gapic/secret_manager_service_client.py b/google/cloud/secretmanager_v1beta1/gapic/secret_manager_service_client.py index e3378f6..2f59aeb 100644 --- a/google/cloud/secretmanager_v1beta1/gapic/secret_manager_service_client.py +++ b/google/cloud/secretmanager_v1beta1/gapic/secret_manager_service_client.py @@ -358,6 +358,10 @@ def create_secret( parent (str): Required. The resource name of the project to associate with the ``Secret``, in the format ``projects/*``. secret_id (str): Required. This must be unique within the project. + + A secret ID is a string with a maximum length of 255 characters and can + contain uppercase and lowercase letters, numerals, and the hyphen + (``-``) and underscore (``_``) characters. secret (Union[dict, ~google.cloud.secretmanager_v1beta1.types.Secret]): A ``Secret`` with initial field values. If a dict is provided, it must be of the same form as the protobuf diff --git a/google/cloud/secretmanager_v1beta1/proto/resources_pb2.py b/google/cloud/secretmanager_v1beta1/proto/resources_pb2.py index 752c152..2299954 100644 --- a/google/cloud/secretmanager_v1beta1/proto/resources_pb2.py +++ b/google/cloud/secretmanager_v1beta1/proto/resources_pb2.py @@ -1,6 +1,6 @@ # -*- coding: utf-8 -*- -# Copyright 2019 Google LLC +# Copyright 2020 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. @@ -17,9 +17,6 @@ # Generated by the protocol buffer compiler. DO NOT EDIT! # source: google/cloud/secrets_v1beta1/proto/resources.proto -import sys - -_b = sys.version_info[0] < 3 and (lambda x: x) or (lambda x: x.encode("latin1")) from google.protobuf import descriptor as _descriptor from google.protobuf import message as _message from google.protobuf import reflection as _reflection @@ -40,12 +37,8 @@ name="google/cloud/secrets_v1beta1/proto/resources.proto", package="google.cloud.secrets.v1beta1", syntax="proto3", - serialized_options=_b( - '\n&com.google.cloud.secretmanager.v1beta1B\016ResourcesProtoP\001ZOgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1beta1;secretmanager\370\001\001\242\002\003GSM\252\002"Google.Cloud.SecretManager.V1Beta1\312\002"Google\\Cloud\\SecretManager\\V1beta1\352\002%Google::Cloud::SecretManager::V1beta1' - ), - serialized_pb=_b( - '\n2google/cloud/secrets_v1beta1/proto/resources.proto\x12\x1cgoogle.cloud.secrets.v1beta1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1cgoogle/api/annotations.proto"\xd9\x02\n\x06Secret\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x46\n\x0breplication\x18\x02 \x01(\x0b\x32).google.cloud.secrets.v1beta1.ReplicationB\x06\xe0\x41\x05\xe0\x41\x02\x12\x34\n\x0b\x63reate_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12@\n\x06labels\x18\x04 \x03(\x0b\x32\x30.google.cloud.secrets.v1beta1.Secret.LabelsEntry\x1a-\n\x0bLabelsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01:M\xea\x41J\n#secretmanager.googleapis.com/Secret\x12#projects/{project}/secrets/{secret}"\x90\x03\n\rSecretVersion\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x35\n\x0c\x64\x65stroy_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x45\n\x05state\x18\x04 \x01(\x0e\x32\x31.google.cloud.secrets.v1beta1.SecretVersion.StateB\x03\xe0\x41\x03"H\n\x05State\x12\x15\n\x11STATE_UNSPECIFIED\x10\x00\x12\x0b\n\x07\x45NABLED\x10\x01\x12\x0c\n\x08\x44ISABLED\x10\x02\x12\r\n\tDESTROYED\x10\x03:n\xea\x41k\n*secretmanager.googleapis.com/SecretVersion\x12=projects/{project}/secrets/{secret}/versions/{secret_version}"\xc5\x02\n\x0bReplication\x12H\n\tautomatic\x18\x01 \x01(\x0b\x32\x33.google.cloud.secrets.v1beta1.Replication.AutomaticH\x00\x12M\n\x0cuser_managed\x18\x02 \x01(\x0b\x32\x35.google.cloud.secrets.v1beta1.Replication.UserManagedH\x00\x1a\x0b\n\tAutomatic\x1a\x80\x01\n\x0bUserManaged\x12T\n\x08replicas\x18\x01 \x03(\x0b\x32=.google.cloud.secrets.v1beta1.Replication.UserManaged.ReplicaB\x03\xe0\x41\x02\x1a\x1b\n\x07Replica\x12\x10\n\x08location\x18\x01 \x01(\tB\r\n\x0breplication"\x1d\n\rSecretPayload\x12\x0c\n\x04\x64\x61ta\x18\x01 \x01(\x0c\x42\x86\x02\n&com.google.cloud.secretmanager.v1beta1B\x0eResourcesProtoP\x01ZOgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1beta1;secretmanager\xf8\x01\x01\xa2\x02\x03GSM\xaa\x02"Google.Cloud.SecretManager.V1Beta1\xca\x02"Google\\Cloud\\SecretManager\\V1beta1\xea\x02%Google::Cloud::SecretManager::V1beta1b\x06proto3' - ), + serialized_options=b'\n&com.google.cloud.secretmanager.v1beta1B\016ResourcesProtoP\001ZOgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1beta1;secretmanager\370\001\001\242\002\003GSM\252\002"Google.Cloud.SecretManager.V1Beta1\312\002"Google\\Cloud\\SecretManager\\V1beta1\352\002%Google::Cloud::SecretManager::V1beta1', + serialized_pb=b'\n2google/cloud/secrets_v1beta1/proto/resources.proto\x12\x1cgoogle.cloud.secrets.v1beta1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1cgoogle/api/annotations.proto"\xd9\x02\n\x06Secret\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x46\n\x0breplication\x18\x02 \x01(\x0b\x32).google.cloud.secrets.v1beta1.ReplicationB\x06\xe0\x41\x05\xe0\x41\x02\x12\x34\n\x0b\x63reate_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12@\n\x06labels\x18\x04 \x03(\x0b\x32\x30.google.cloud.secrets.v1beta1.Secret.LabelsEntry\x1a-\n\x0bLabelsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01:M\xea\x41J\n#secretmanager.googleapis.com/Secret\x12#projects/{project}/secrets/{secret}"\x90\x03\n\rSecretVersion\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x35\n\x0c\x64\x65stroy_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x45\n\x05state\x18\x04 \x01(\x0e\x32\x31.google.cloud.secrets.v1beta1.SecretVersion.StateB\x03\xe0\x41\x03"H\n\x05State\x12\x15\n\x11STATE_UNSPECIFIED\x10\x00\x12\x0b\n\x07\x45NABLED\x10\x01\x12\x0c\n\x08\x44ISABLED\x10\x02\x12\r\n\tDESTROYED\x10\x03:n\xea\x41k\n*secretmanager.googleapis.com/SecretVersion\x12=projects/{project}/secrets/{secret}/versions/{secret_version}"\xc5\x02\n\x0bReplication\x12H\n\tautomatic\x18\x01 \x01(\x0b\x32\x33.google.cloud.secrets.v1beta1.Replication.AutomaticH\x00\x12M\n\x0cuser_managed\x18\x02 \x01(\x0b\x32\x35.google.cloud.secrets.v1beta1.Replication.UserManagedH\x00\x1a\x0b\n\tAutomatic\x1a\x80\x01\n\x0bUserManaged\x12T\n\x08replicas\x18\x01 \x03(\x0b\x32=.google.cloud.secrets.v1beta1.Replication.UserManaged.ReplicaB\x03\xe0\x41\x02\x1a\x1b\n\x07Replica\x12\x10\n\x08location\x18\x01 \x01(\tB\r\n\x0breplication"\x1d\n\rSecretPayload\x12\x0c\n\x04\x64\x61ta\x18\x01 \x01(\x0c\x42\x86\x02\n&com.google.cloud.secretmanager.v1beta1B\x0eResourcesProtoP\x01ZOgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1beta1;secretmanager\xf8\x01\x01\xa2\x02\x03GSM\xaa\x02"Google.Cloud.SecretManager.V1Beta1\xca\x02"Google\\Cloud\\SecretManager\\V1beta1\xea\x02%Google::Cloud::SecretManager::V1beta1b\x06proto3', dependencies=[ google_dot_api_dot_field__behavior__pb2.DESCRIPTOR, google_dot_api_dot_resource__pb2.DESCRIPTOR, @@ -102,7 +95,7 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, @@ -120,7 +113,7 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, @@ -133,7 +126,7 @@ extensions=[], nested_types=[], enum_types=[], - serialized_options=_b("8\001"), + serialized_options=b"8\001", is_extendable=False, syntax="proto3", extension_ranges=[], @@ -158,13 +151,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\003"), + serialized_options=b"\340A\003", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -182,7 +175,7 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\005\340A\002"), + serialized_options=b"\340A\005\340A\002", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -200,7 +193,7 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\003"), + serialized_options=b"\340A\003", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -225,9 +218,7 @@ extensions=[], nested_types=[_SECRET_LABELSENTRY], enum_types=[], - serialized_options=_b( - "\352AJ\n#secretmanager.googleapis.com/Secret\022#projects/{project}/secrets/{secret}" - ), + serialized_options=b"\352AJ\n#secretmanager.googleapis.com/Secret\022#projects/{project}/secrets/{secret}", is_extendable=False, syntax="proto3", extension_ranges=[], @@ -253,13 +244,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\003"), + serialized_options=b"\340A\003", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -277,7 +268,7 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\003"), + serialized_options=b"\340A\003", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -295,7 +286,7 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\003"), + serialized_options=b"\340A\003", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -313,16 +304,14 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\003"), + serialized_options=b"\340A\003", file=DESCRIPTOR, ), ], extensions=[], nested_types=[], enum_types=[_SECRETVERSION_STATE], - serialized_options=_b( - "\352Ak\n*secretmanager.googleapis.com/SecretVersion\022=projects/{project}/secrets/{secret}/versions/{secret_version}" - ), + serialized_options=b"\352Ak\n*secretmanager.googleapis.com/SecretVersion\022=projects/{project}/secrets/{secret}/versions/{secret_version}", is_extendable=False, syntax="proto3", extension_ranges=[], @@ -367,7 +356,7 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, @@ -411,7 +400,7 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\002"), + serialized_options=b"\340A\002", file=DESCRIPTOR, ) ], @@ -508,7 +497,7 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b(""), + default_value=b"", message_type=None, enum_type=None, containing_type=None, @@ -585,8 +574,8 @@ ), "DESCRIPTOR": _SECRET, "__module__": "google.cloud.secrets_v1beta1.proto.resources_pb2", - "__doc__": """A [Secret][google.cloud.secrets.v1beta1.Secret] is a logical secret - whose value and versions can be accessed. + "__doc__": """A [Secret][google.cloud.secrets.v1beta1.Secret] is a + logical secret whose value and versions can be accessed. A [Secret][google.cloud.secrets.v1beta1.Secret] is made up of zero or more [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] that diff --git a/google/cloud/secretmanager_v1beta1/proto/resources_pb2_grpc.py b/google/cloud/secretmanager_v1beta1/proto/resources_pb2_grpc.py index 7343170..b662812 100644 --- a/google/cloud/secretmanager_v1beta1/proto/resources_pb2_grpc.py +++ b/google/cloud/secretmanager_v1beta1/proto/resources_pb2_grpc.py @@ -1,4 +1,4 @@ -# Copyright 2019 Google LLC +# Copyright 2020 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/google/cloud/secretmanager_v1beta1/proto/service_pb2.py b/google/cloud/secretmanager_v1beta1/proto/service_pb2.py index 981b7c0..ff5d5ee 100644 --- a/google/cloud/secretmanager_v1beta1/proto/service_pb2.py +++ b/google/cloud/secretmanager_v1beta1/proto/service_pb2.py @@ -1,6 +1,6 @@ # -*- coding: utf-8 -*- -# Copyright 2019 Google LLC +# Copyright 2020 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. @@ -17,9 +17,6 @@ # Generated by the protocol buffer compiler. DO NOT EDIT! # source: google/cloud/secrets_v1beta1/proto/service.proto -import sys - -_b = sys.version_info[0] < 3 and (lambda x: x) or (lambda x: x.encode("latin1")) from google.protobuf import descriptor as _descriptor from google.protobuf import message as _message from google.protobuf import reflection as _reflection @@ -47,12 +44,8 @@ name="google/cloud/secrets_v1beta1/proto/service.proto", package="google.cloud.secrets.v1beta1", syntax="proto3", - serialized_options=_b( - '\n&com.google.cloud.secretmanager.v1beta1B\014ServiceProtoP\001ZOgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1beta1;secretmanager\370\001\001\242\002\003GSM\252\002"Google.Cloud.SecretManager.V1Beta1\312\002"Google\\Cloud\\SecretManager\\V1beta1\352\002%Google::Cloud::SecretManager::V1beta1' - ), - serialized_pb=_b( - '\n0google/cloud/secrets_v1beta1/proto/service.proto\x12\x1cgoogle.cloud.secrets.v1beta1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x32google/cloud/secrets_v1beta1/proto/resources.proto\x1a\x1egoogle/iam/v1/iam_policy.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a\x1bgoogle/protobuf/empty.proto\x1a google/protobuf/field_mask.proto"\x8a\x01\n\x12ListSecretsRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01"y\n\x13ListSecretsResponse\x12\x35\n\x07secrets\x18\x01 \x03(\x0b\x32$.google.cloud.secrets.v1beta1.Secret\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05"\xa8\x01\n\x13\x43reateSecretRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x16\n\tsecret_id\x18\x02 \x01(\tB\x03\xe0\x41\x02\x12\x34\n\x06secret\x18\x03 \x01(\x0b\x32$.google.cloud.secrets.v1beta1.Secret"\x99\x01\n\x17\x41\x64\x64SecretVersionRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x41\n\x07payload\x18\x02 \x01(\x0b\x32+.google.cloud.secrets.v1beta1.SecretPayloadB\x03\xe0\x41\x02"M\n\x10GetSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret"\x89\x01\n\x19ListSecretVersionsRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01"\x88\x01\n\x1aListSecretVersionsResponse\x12=\n\x08versions\x18\x01 \x03(\x0b\x32+.google.cloud.secrets.v1beta1.SecretVersion\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05"[\n\x17GetSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"\x86\x01\n\x13UpdateSecretRequest\x12\x39\n\x06secret\x18\x01 \x01(\x0b\x32$.google.cloud.secrets.v1beta1.SecretB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02"^\n\x1a\x41\x63\x63\x65ssSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"\x9a\x01\n\x1b\x41\x63\x63\x65ssSecretVersionResponse\x12=\n\x04name\x18\x01 \x01(\tB/\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12<\n\x07payload\x18\x02 \x01(\x0b\x32+.google.cloud.secrets.v1beta1.SecretPayload"P\n\x13\x44\x65leteSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret"_\n\x1b\x44isableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"^\n\x1a\x45nableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"_\n\x1b\x44\x65stroySecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion2\x83\x16\n\x14SecretManagerService\x12\xa9\x01\n\x0bListSecrets\x12\x30.google.cloud.secrets.v1beta1.ListSecretsRequest\x1a\x31.google.cloud.secrets.v1beta1.ListSecretsResponse"5\x82\xd3\xe4\x93\x02&\x12$/v1beta1/{parent=projects/*}/secrets\xda\x41\x06parent\x12\xb7\x01\n\x0c\x43reateSecret\x12\x31.google.cloud.secrets.v1beta1.CreateSecretRequest\x1a$.google.cloud.secrets.v1beta1.Secret"N\x82\xd3\xe4\x93\x02."$/v1beta1/{parent=projects/*}/secrets:\x06secret\xda\x41\x17parent,secret_id,secret\x12\xc5\x01\n\x10\x41\x64\x64SecretVersion\x12\x35.google.cloud.secrets.v1beta1.AddSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion"M\x82\xd3\xe4\x93\x02\x36"1/v1beta1/{parent=projects/*/secrets/*}:addVersion:\x01*\xda\x41\x0eparent,payload\x12\x96\x01\n\tGetSecret\x12..google.cloud.secrets.v1beta1.GetSecretRequest\x1a$.google.cloud.secrets.v1beta1.Secret"3\x82\xd3\xe4\x93\x02&\x12$/v1beta1/{name=projects/*/secrets/*}\xda\x41\x04name\x12\xb9\x01\n\x0cUpdateSecret\x12\x31.google.cloud.secrets.v1beta1.UpdateSecretRequest\x1a$.google.cloud.secrets.v1beta1.Secret"P\x82\xd3\xe4\x93\x02\x35\x32+/v1beta1/{secret.name=projects/*/secrets/*}:\x06secret\xda\x41\x12secret,update_mask\x12\x8e\x01\n\x0c\x44\x65leteSecret\x12\x31.google.cloud.secrets.v1beta1.DeleteSecretRequest\x1a\x16.google.protobuf.Empty"3\x82\xd3\xe4\x93\x02&*$/v1beta1/{name=projects/*/secrets/*}\xda\x41\x04name\x12\xc9\x01\n\x12ListSecretVersions\x12\x37.google.cloud.secrets.v1beta1.ListSecretVersionsRequest\x1a\x38.google.cloud.secrets.v1beta1.ListSecretVersionsResponse"@\x82\xd3\xe4\x93\x02\x31\x12//v1beta1/{parent=projects/*/secrets/*}/versions\xda\x41\x06parent\x12\xb6\x01\n\x10GetSecretVersion\x12\x35.google.cloud.secrets.v1beta1.GetSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion">\x82\xd3\xe4\x93\x02\x31\x12//v1beta1/{name=projects/*/secrets/*/versions/*}\xda\x41\x04name\x12\xd1\x01\n\x13\x41\x63\x63\x65ssSecretVersion\x12\x38.google.cloud.secrets.v1beta1.AccessSecretVersionRequest\x1a\x39.google.cloud.secrets.v1beta1.AccessSecretVersionResponse"E\x82\xd3\xe4\x93\x02\x38\x12\x36/v1beta1/{name=projects/*/secrets/*/versions/*}:access\xda\x41\x04name\x12\xc9\x01\n\x14\x44isableSecretVersion\x12\x39.google.cloud.secrets.v1beta1.DisableSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion"I\x82\xd3\xe4\x93\x02<"7/v1beta1/{name=projects/*/secrets/*/versions/*}:disable:\x01*\xda\x41\x04name\x12\xc6\x01\n\x13\x45nableSecretVersion\x12\x38.google.cloud.secrets.v1beta1.EnableSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion"H\x82\xd3\xe4\x93\x02;"6/v1beta1/{name=projects/*/secrets/*/versions/*}:enable:\x01*\xda\x41\x04name\x12\xc9\x01\n\x14\x44\x65stroySecretVersion\x12\x39.google.cloud.secrets.v1beta1.DestroySecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion"I\x82\xd3\xe4\x93\x02<"7/v1beta1/{name=projects/*/secrets/*/versions/*}:destroy:\x01*\xda\x41\x04name\x12\x8b\x01\n\x0cSetIamPolicy\x12".google.iam.v1.SetIamPolicyRequest\x1a\x15.google.iam.v1.Policy"@\x82\xd3\xe4\x93\x02:"5/v1beta1/{resource=projects/*/secrets/*}:setIamPolicy:\x01*\x12\x88\x01\n\x0cGetIamPolicy\x12".google.iam.v1.GetIamPolicyRequest\x1a\x15.google.iam.v1.Policy"=\x82\xd3\xe4\x93\x02\x37\x12\x35/v1beta1/{resource=projects/*/secrets/*}:getIamPolicy\x12\xb1\x01\n\x12TestIamPermissions\x12(.google.iam.v1.TestIamPermissionsRequest\x1a).google.iam.v1.TestIamPermissionsResponse"F\x82\xd3\xe4\x93\x02@";/v1beta1/{resource=projects/*/secrets/*}:testIamPermissions:\x01*\x1aP\xca\x41\x1csecretmanager.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\x84\x02\n&com.google.cloud.secretmanager.v1beta1B\x0cServiceProtoP\x01ZOgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1beta1;secretmanager\xf8\x01\x01\xa2\x02\x03GSM\xaa\x02"Google.Cloud.SecretManager.V1Beta1\xca\x02"Google\\Cloud\\SecretManager\\V1beta1\xea\x02%Google::Cloud::SecretManager::V1beta1b\x06proto3' - ), + serialized_options=b'\n&com.google.cloud.secretmanager.v1beta1B\014ServiceProtoP\001ZOgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1beta1;secretmanager\370\001\001\242\002\003GSM\252\002"Google.Cloud.SecretManager.V1Beta1\312\002"Google\\Cloud\\SecretManager\\V1beta1\352\002%Google::Cloud::SecretManager::V1beta1', + serialized_pb=b'\n0google/cloud/secrets_v1beta1/proto/service.proto\x12\x1cgoogle.cloud.secrets.v1beta1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x32google/cloud/secrets_v1beta1/proto/resources.proto\x1a\x1egoogle/iam/v1/iam_policy.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a\x1bgoogle/protobuf/empty.proto\x1a google/protobuf/field_mask.proto"\x8a\x01\n\x12ListSecretsRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01"y\n\x13ListSecretsResponse\x12\x35\n\x07secrets\x18\x01 \x03(\x0b\x32$.google.cloud.secrets.v1beta1.Secret\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05"\xa8\x01\n\x13\x43reateSecretRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x16\n\tsecret_id\x18\x02 \x01(\tB\x03\xe0\x41\x02\x12\x34\n\x06secret\x18\x03 \x01(\x0b\x32$.google.cloud.secrets.v1beta1.Secret"\x99\x01\n\x17\x41\x64\x64SecretVersionRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x41\n\x07payload\x18\x02 \x01(\x0b\x32+.google.cloud.secrets.v1beta1.SecretPayloadB\x03\xe0\x41\x02"M\n\x10GetSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret"\x89\x01\n\x19ListSecretVersionsRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01"\x88\x01\n\x1aListSecretVersionsResponse\x12=\n\x08versions\x18\x01 \x03(\x0b\x32+.google.cloud.secrets.v1beta1.SecretVersion\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05"[\n\x17GetSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"\x86\x01\n\x13UpdateSecretRequest\x12\x39\n\x06secret\x18\x01 \x01(\x0b\x32$.google.cloud.secrets.v1beta1.SecretB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02"^\n\x1a\x41\x63\x63\x65ssSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"\x9a\x01\n\x1b\x41\x63\x63\x65ssSecretVersionResponse\x12=\n\x04name\x18\x01 \x01(\tB/\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12<\n\x07payload\x18\x02 \x01(\x0b\x32+.google.cloud.secrets.v1beta1.SecretPayload"P\n\x13\x44\x65leteSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret"_\n\x1b\x44isableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"^\n\x1a\x45nableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion"_\n\x1b\x44\x65stroySecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion2\x83\x16\n\x14SecretManagerService\x12\xa9\x01\n\x0bListSecrets\x12\x30.google.cloud.secrets.v1beta1.ListSecretsRequest\x1a\x31.google.cloud.secrets.v1beta1.ListSecretsResponse"5\x82\xd3\xe4\x93\x02&\x12$/v1beta1/{parent=projects/*}/secrets\xda\x41\x06parent\x12\xb7\x01\n\x0c\x43reateSecret\x12\x31.google.cloud.secrets.v1beta1.CreateSecretRequest\x1a$.google.cloud.secrets.v1beta1.Secret"N\x82\xd3\xe4\x93\x02."$/v1beta1/{parent=projects/*}/secrets:\x06secret\xda\x41\x17parent,secret_id,secret\x12\xc5\x01\n\x10\x41\x64\x64SecretVersion\x12\x35.google.cloud.secrets.v1beta1.AddSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion"M\x82\xd3\xe4\x93\x02\x36"1/v1beta1/{parent=projects/*/secrets/*}:addVersion:\x01*\xda\x41\x0eparent,payload\x12\x96\x01\n\tGetSecret\x12..google.cloud.secrets.v1beta1.GetSecretRequest\x1a$.google.cloud.secrets.v1beta1.Secret"3\x82\xd3\xe4\x93\x02&\x12$/v1beta1/{name=projects/*/secrets/*}\xda\x41\x04name\x12\xb9\x01\n\x0cUpdateSecret\x12\x31.google.cloud.secrets.v1beta1.UpdateSecretRequest\x1a$.google.cloud.secrets.v1beta1.Secret"P\x82\xd3\xe4\x93\x02\x35\x32+/v1beta1/{secret.name=projects/*/secrets/*}:\x06secret\xda\x41\x12secret,update_mask\x12\x8e\x01\n\x0c\x44\x65leteSecret\x12\x31.google.cloud.secrets.v1beta1.DeleteSecretRequest\x1a\x16.google.protobuf.Empty"3\x82\xd3\xe4\x93\x02&*$/v1beta1/{name=projects/*/secrets/*}\xda\x41\x04name\x12\xc9\x01\n\x12ListSecretVersions\x12\x37.google.cloud.secrets.v1beta1.ListSecretVersionsRequest\x1a\x38.google.cloud.secrets.v1beta1.ListSecretVersionsResponse"@\x82\xd3\xe4\x93\x02\x31\x12//v1beta1/{parent=projects/*/secrets/*}/versions\xda\x41\x06parent\x12\xb6\x01\n\x10GetSecretVersion\x12\x35.google.cloud.secrets.v1beta1.GetSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion">\x82\xd3\xe4\x93\x02\x31\x12//v1beta1/{name=projects/*/secrets/*/versions/*}\xda\x41\x04name\x12\xd1\x01\n\x13\x41\x63\x63\x65ssSecretVersion\x12\x38.google.cloud.secrets.v1beta1.AccessSecretVersionRequest\x1a\x39.google.cloud.secrets.v1beta1.AccessSecretVersionResponse"E\x82\xd3\xe4\x93\x02\x38\x12\x36/v1beta1/{name=projects/*/secrets/*/versions/*}:access\xda\x41\x04name\x12\xc9\x01\n\x14\x44isableSecretVersion\x12\x39.google.cloud.secrets.v1beta1.DisableSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion"I\x82\xd3\xe4\x93\x02<"7/v1beta1/{name=projects/*/secrets/*/versions/*}:disable:\x01*\xda\x41\x04name\x12\xc6\x01\n\x13\x45nableSecretVersion\x12\x38.google.cloud.secrets.v1beta1.EnableSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion"H\x82\xd3\xe4\x93\x02;"6/v1beta1/{name=projects/*/secrets/*/versions/*}:enable:\x01*\xda\x41\x04name\x12\xc9\x01\n\x14\x44\x65stroySecretVersion\x12\x39.google.cloud.secrets.v1beta1.DestroySecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion"I\x82\xd3\xe4\x93\x02<"7/v1beta1/{name=projects/*/secrets/*/versions/*}:destroy:\x01*\xda\x41\x04name\x12\x8b\x01\n\x0cSetIamPolicy\x12".google.iam.v1.SetIamPolicyRequest\x1a\x15.google.iam.v1.Policy"@\x82\xd3\xe4\x93\x02:"5/v1beta1/{resource=projects/*/secrets/*}:setIamPolicy:\x01*\x12\x88\x01\n\x0cGetIamPolicy\x12".google.iam.v1.GetIamPolicyRequest\x1a\x15.google.iam.v1.Policy"=\x82\xd3\xe4\x93\x02\x37\x12\x35/v1beta1/{resource=projects/*/secrets/*}:getIamPolicy\x12\xb1\x01\n\x12TestIamPermissions\x12(.google.iam.v1.TestIamPermissionsRequest\x1a).google.iam.v1.TestIamPermissionsResponse"F\x82\xd3\xe4\x93\x02@";/v1beta1/{resource=projects/*/secrets/*}:testIamPermissions:\x01*\x1aP\xca\x41\x1csecretmanager.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\x84\x02\n&com.google.cloud.secretmanager.v1beta1B\x0cServiceProtoP\x01ZOgoogle.golang.org/genproto/googleapis/cloud/secretmanager/v1beta1;secretmanager\xf8\x01\x01\xa2\x02\x03GSM\xaa\x02"Google.Cloud.SecretManager.V1Beta1\xca\x02"Google\\Cloud\\SecretManager\\V1beta1\xea\x02%Google::Cloud::SecretManager::V1beta1b\x06proto3', dependencies=[ google_dot_api_dot_annotations__pb2.DESCRIPTOR, google_dot_api_dot_client__pb2.DESCRIPTOR, @@ -83,15 +76,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\340A\002\372A-\n+cloudresourcemanager.googleapis.com/Project" - ), + serialized_options=b"\340A\002\372A-\n+cloudresourcemanager.googleapis.com/Project", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -109,7 +100,7 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\001"), + serialized_options=b"\340A\001", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -121,13 +112,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\001"), + serialized_options=b"\340A\001", file=DESCRIPTOR, ), ], @@ -178,7 +169,7 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, @@ -235,15 +226,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\340A\002\372A-\n+cloudresourcemanager.googleapis.com/Project" - ), + serialized_options=b"\340A\002\372A-\n+cloudresourcemanager.googleapis.com/Project", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -255,13 +244,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\002"), + serialized_options=b"\340A\002", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -312,15 +301,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\340A\002\372A%\n#secretmanager.googleapis.com/Secret" - ), + serialized_options=b"\340A\002\372A%\n#secretmanager.googleapis.com/Secret", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -338,7 +325,7 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\002"), + serialized_options=b"\340A\002", file=DESCRIPTOR, ), ], @@ -371,15 +358,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\340A\002\372A%\n#secretmanager.googleapis.com/Secret" - ), + serialized_options=b"\340A\002\372A%\n#secretmanager.googleapis.com/Secret", file=DESCRIPTOR, ) ], @@ -412,15 +397,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\340A\002\372A%\n#secretmanager.googleapis.com/Secret" - ), + serialized_options=b"\340A\002\372A%\n#secretmanager.googleapis.com/Secret", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -438,7 +421,7 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\001"), + serialized_options=b"\340A\001", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -450,13 +433,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\001"), + serialized_options=b"\340A\001", file=DESCRIPTOR, ), ], @@ -507,7 +490,7 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, @@ -564,15 +547,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion" - ), + serialized_options=b"\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, ) ], @@ -611,7 +592,7 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\002"), + serialized_options=b"\340A\002", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -629,7 +610,7 @@ containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b("\340A\002"), + serialized_options=b"\340A\002", file=DESCRIPTOR, ), ], @@ -662,15 +643,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion" - ), + serialized_options=b"\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, ) ], @@ -703,15 +682,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\372A,\n*secretmanager.googleapis.com/SecretVersion" - ), + serialized_options=b"\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, ), _descriptor.FieldDescriptor( @@ -762,15 +739,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\340A\002\372A%\n#secretmanager.googleapis.com/Secret" - ), + serialized_options=b"\340A\002\372A%\n#secretmanager.googleapis.com/Secret", file=DESCRIPTOR, ) ], @@ -803,15 +778,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion" - ), + serialized_options=b"\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, ) ], @@ -844,15 +817,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion" - ), + serialized_options=b"\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, ) ], @@ -885,15 +856,13 @@ cpp_type=9, label=1, has_default_value=False, - default_value=_b("").decode("utf-8"), + default_value=b"".decode("utf-8"), message_type=None, enum_type=None, containing_type=None, is_extension=False, extension_scope=None, - serialized_options=_b( - "\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion" - ), + serialized_options=b"\340A\002\372A,\n*secretmanager.googleapis.com/SecretVersion", file=DESCRIPTOR, ) ], @@ -1046,7 +1015,10 @@ the [Secret][google.cloud.secrets.v1beta1.Secret], in the format ``projects/*``. secret_id: - Required. This must be unique within the project. + Required. This must be unique within the project. A secret ID + is a string with a maximum length of 255 characters and can + contain uppercase and lowercase letters, numerals, and the + hyphen (``-``) and underscore (``_``) characters. secret: A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values. @@ -1365,9 +1337,7 @@ full_name="google.cloud.secrets.v1beta1.SecretManagerService", file=DESCRIPTOR, index=0, - serialized_options=_b( - "\312A\034secretmanager.googleapis.com\322A.https://www.googleapis.com/auth/cloud-platform" - ), + serialized_options=b"\312A\034secretmanager.googleapis.com\322A.https://www.googleapis.com/auth/cloud-platform", serialized_start=2177, serialized_end=4996, methods=[ @@ -1378,9 +1348,7 @@ containing_service=None, input_type=_LISTSECRETSREQUEST, output_type=_LISTSECRETSRESPONSE, - serialized_options=_b( - "\202\323\344\223\002&\022$/v1beta1/{parent=projects/*}/secrets\332A\006parent" - ), + serialized_options=b"\202\323\344\223\002&\022$/v1beta1/{parent=projects/*}/secrets\332A\006parent", ), _descriptor.MethodDescriptor( name="CreateSecret", @@ -1389,9 +1357,7 @@ containing_service=None, input_type=_CREATESECRETREQUEST, output_type=google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2._SECRET, - serialized_options=_b( - '\202\323\344\223\002."$/v1beta1/{parent=projects/*}/secrets:\006secret\332A\027parent,secret_id,secret' - ), + serialized_options=b'\202\323\344\223\002."$/v1beta1/{parent=projects/*}/secrets:\006secret\332A\027parent,secret_id,secret', ), _descriptor.MethodDescriptor( name="AddSecretVersion", @@ -1400,9 +1366,7 @@ containing_service=None, input_type=_ADDSECRETVERSIONREQUEST, output_type=google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2._SECRETVERSION, - serialized_options=_b( - '\202\323\344\223\0026"1/v1beta1/{parent=projects/*/secrets/*}:addVersion:\001*\332A\016parent,payload' - ), + serialized_options=b'\202\323\344\223\0026"1/v1beta1/{parent=projects/*/secrets/*}:addVersion:\001*\332A\016parent,payload', ), _descriptor.MethodDescriptor( name="GetSecret", @@ -1411,9 +1375,7 @@ containing_service=None, input_type=_GETSECRETREQUEST, output_type=google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2._SECRET, - serialized_options=_b( - "\202\323\344\223\002&\022$/v1beta1/{name=projects/*/secrets/*}\332A\004name" - ), + serialized_options=b"\202\323\344\223\002&\022$/v1beta1/{name=projects/*/secrets/*}\332A\004name", ), _descriptor.MethodDescriptor( name="UpdateSecret", @@ -1422,9 +1384,7 @@ containing_service=None, input_type=_UPDATESECRETREQUEST, output_type=google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2._SECRET, - serialized_options=_b( - "\202\323\344\223\00252+/v1beta1/{secret.name=projects/*/secrets/*}:\006secret\332A\022secret,update_mask" - ), + serialized_options=b"\202\323\344\223\00252+/v1beta1/{secret.name=projects/*/secrets/*}:\006secret\332A\022secret,update_mask", ), _descriptor.MethodDescriptor( name="DeleteSecret", @@ -1433,9 +1393,7 @@ containing_service=None, input_type=_DELETESECRETREQUEST, output_type=google_dot_protobuf_dot_empty__pb2._EMPTY, - serialized_options=_b( - "\202\323\344\223\002&*$/v1beta1/{name=projects/*/secrets/*}\332A\004name" - ), + serialized_options=b"\202\323\344\223\002&*$/v1beta1/{name=projects/*/secrets/*}\332A\004name", ), _descriptor.MethodDescriptor( name="ListSecretVersions", @@ -1444,9 +1402,7 @@ containing_service=None, input_type=_LISTSECRETVERSIONSREQUEST, output_type=_LISTSECRETVERSIONSRESPONSE, - serialized_options=_b( - "\202\323\344\223\0021\022//v1beta1/{parent=projects/*/secrets/*}/versions\332A\006parent" - ), + serialized_options=b"\202\323\344\223\0021\022//v1beta1/{parent=projects/*/secrets/*}/versions\332A\006parent", ), _descriptor.MethodDescriptor( name="GetSecretVersion", @@ -1455,9 +1411,7 @@ containing_service=None, input_type=_GETSECRETVERSIONREQUEST, output_type=google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2._SECRETVERSION, - serialized_options=_b( - "\202\323\344\223\0021\022//v1beta1/{name=projects/*/secrets/*/versions/*}\332A\004name" - ), + serialized_options=b"\202\323\344\223\0021\022//v1beta1/{name=projects/*/secrets/*/versions/*}\332A\004name", ), _descriptor.MethodDescriptor( name="AccessSecretVersion", @@ -1466,9 +1420,7 @@ containing_service=None, input_type=_ACCESSSECRETVERSIONREQUEST, output_type=_ACCESSSECRETVERSIONRESPONSE, - serialized_options=_b( - "\202\323\344\223\0028\0226/v1beta1/{name=projects/*/secrets/*/versions/*}:access\332A\004name" - ), + serialized_options=b"\202\323\344\223\0028\0226/v1beta1/{name=projects/*/secrets/*/versions/*}:access\332A\004name", ), _descriptor.MethodDescriptor( name="DisableSecretVersion", @@ -1477,9 +1429,7 @@ containing_service=None, input_type=_DISABLESECRETVERSIONREQUEST, output_type=google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2._SECRETVERSION, - serialized_options=_b( - '\202\323\344\223\002<"7/v1beta1/{name=projects/*/secrets/*/versions/*}:disable:\001*\332A\004name' - ), + serialized_options=b'\202\323\344\223\002<"7/v1beta1/{name=projects/*/secrets/*/versions/*}:disable:\001*\332A\004name', ), _descriptor.MethodDescriptor( name="EnableSecretVersion", @@ -1488,9 +1438,7 @@ containing_service=None, input_type=_ENABLESECRETVERSIONREQUEST, output_type=google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2._SECRETVERSION, - serialized_options=_b( - '\202\323\344\223\002;"6/v1beta1/{name=projects/*/secrets/*/versions/*}:enable:\001*\332A\004name' - ), + serialized_options=b'\202\323\344\223\002;"6/v1beta1/{name=projects/*/secrets/*/versions/*}:enable:\001*\332A\004name', ), _descriptor.MethodDescriptor( name="DestroySecretVersion", @@ -1499,9 +1447,7 @@ containing_service=None, input_type=_DESTROYSECRETVERSIONREQUEST, output_type=google_dot_cloud_dot_secrets__v1beta1_dot_proto_dot_resources__pb2._SECRETVERSION, - serialized_options=_b( - '\202\323\344\223\002<"7/v1beta1/{name=projects/*/secrets/*/versions/*}:destroy:\001*\332A\004name' - ), + serialized_options=b'\202\323\344\223\002<"7/v1beta1/{name=projects/*/secrets/*/versions/*}:destroy:\001*\332A\004name', ), _descriptor.MethodDescriptor( name="SetIamPolicy", @@ -1510,9 +1456,7 @@ containing_service=None, input_type=google_dot_iam_dot_v1_dot_iam__policy__pb2._SETIAMPOLICYREQUEST, output_type=google_dot_iam_dot_v1_dot_policy__pb2._POLICY, - serialized_options=_b( - '\202\323\344\223\002:"5/v1beta1/{resource=projects/*/secrets/*}:setIamPolicy:\001*' - ), + serialized_options=b'\202\323\344\223\002:"5/v1beta1/{resource=projects/*/secrets/*}:setIamPolicy:\001*', ), _descriptor.MethodDescriptor( name="GetIamPolicy", @@ -1521,9 +1465,7 @@ containing_service=None, input_type=google_dot_iam_dot_v1_dot_iam__policy__pb2._GETIAMPOLICYREQUEST, output_type=google_dot_iam_dot_v1_dot_policy__pb2._POLICY, - serialized_options=_b( - "\202\323\344\223\0027\0225/v1beta1/{resource=projects/*/secrets/*}:getIamPolicy" - ), + serialized_options=b"\202\323\344\223\0027\0225/v1beta1/{resource=projects/*/secrets/*}:getIamPolicy", ), _descriptor.MethodDescriptor( name="TestIamPermissions", @@ -1532,9 +1474,7 @@ containing_service=None, input_type=google_dot_iam_dot_v1_dot_iam__policy__pb2._TESTIAMPERMISSIONSREQUEST, output_type=google_dot_iam_dot_v1_dot_iam__policy__pb2._TESTIAMPERMISSIONSRESPONSE, - serialized_options=_b( - '\202\323\344\223\002@";/v1beta1/{resource=projects/*/secrets/*}:testIamPermissions:\001*' - ), + serialized_options=b'\202\323\344\223\002@";/v1beta1/{resource=projects/*/secrets/*}:testIamPermissions:\001*', ), ], ) diff --git a/google/cloud/secretmanager_v1beta1/proto/service_pb2_grpc.py b/google/cloud/secretmanager_v1beta1/proto/service_pb2_grpc.py index 9f69a60..3754aa8 100644 --- a/google/cloud/secretmanager_v1beta1/proto/service_pb2_grpc.py +++ b/google/cloud/secretmanager_v1beta1/proto/service_pb2_grpc.py @@ -1,4 +1,4 @@ -# Copyright 2019 Google LLC +# Copyright 2020 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/noxfile.py b/noxfile.py index 4f9e109..58a88f4 100644 --- a/noxfile.py +++ b/noxfile.py @@ -110,8 +110,7 @@ def system(session): # Install all test dependencies, then install this package into the # virtualenv's dist-packages. - session.install("mock", "pytest") - + session.install("mock", "pytest", "google-cloud-testutils") session.install("-e", ".") # Run py.test against the system tests. @@ -139,7 +138,7 @@ def docs(session): """Build the docs for this library.""" session.install("-e", ".") - session.install("sphinx", "alabaster", "recommonmark") + session.install("sphinx<3.0.0", "alabaster", "recommonmark") shutil.rmtree(os.path.join("docs", "_build"), ignore_errors=True) session.run( diff --git a/setup.cfg b/setup.cfg index 3bd5555..c3a2b39 100644 --- a/setup.cfg +++ b/setup.cfg @@ -1,3 +1,19 @@ +# -*- coding: utf-8 -*- +# +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# https://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + # Generated by synthtool. DO NOT EDIT! [bdist_wheel] universal = 1 diff --git a/setup.py b/setup.py index 8b914d0..f2af037 100644 --- a/setup.py +++ b/setup.py @@ -22,8 +22,8 @@ name = "google-cloud-secret-manager" description = "Secret Manager API API client library" -version = "0.2.0" -release_status = "Development Status :: 4 - Beta" +version = "1.0.0" +release_status = "Development Status :: 5 - Production/Stable" dependencies = [ "google-api-core[grpc] >= 1.14.0, < 2.0.0dev", "grpc-google-iam-v1 >= 0.12.3, < 0.13dev", diff --git a/synth.metadata b/synth.metadata index 2887c23..2ccf92c 100644 --- a/synth.metadata +++ b/synth.metadata @@ -1,26 +1,25 @@ { - "updateTime": "2020-02-26T00:46:15.817841Z", "sources": [ { "git": { "name": ".", "remote": "git@github.com:googleapis/python-secret-manager.git", - "sha": "bbc389e0e13c10dd8ffd969ea845bffa61f717e1" + "sha": "4934d064dbacc6743a16e3e99adc84359ab002e8" } }, { "git": { "name": "googleapis", "remote": "https://github.com/googleapis/googleapis.git", - "sha": "0aba1900ffef672ec5f0da677cf590ee5686e13b", - "internalRef": "297204568" + "sha": "756b174de4a122461993c1c583345533d819936d", + "internalRef": "308824110" } }, { - "template": { - "name": "python_library", - "origin": "synthtool.gcp", - "version": "2020.2.4" + "git": { + "name": "synthtool", + "remote": "https://github.com/googleapis/synthtool.git", + "sha": "01b6f23d24b27878b48667ce597876d66b59780e" } } ], diff --git a/synth.py b/synth.py index 646559d..853dbad 100644 --- a/synth.py +++ b/synth.py @@ -28,15 +28,15 @@ versions = [ # v1beta1 has a special config path so it must be passed explicitly - ("v1beta1", "/google/cloud/secrets/v1beta1"), - ("v1", None), + ("v1beta1", "//google/cloud/secrets/v1beta1:secretmanager-v1beta1-py"), + ("v1", "//google/cloud/secretmanager/v1:secretmanager-v1-py"), ] -for version, proto_path in versions: +for version, bazel_target in versions: library = gapic.py_library( - "secretmanager", - version, - proto_path=proto_path, + service="secretmanager", + version=version, + bazel_target=bazel_target, ) s.move(