Skip to content
This repository was archived by the owner on Sep 16, 2023. It is now read-only.

Commit 32286cc

Browse files
feat: added topic field to Secret (#389)
PiperOrigin-RevId: 359285402 Source-Author: Google APIs <noreply@google.com> Source-Date: Wed Feb 24 07:59:50 2021 -0800 Source-Repo: googleapis/googleapis Source-Sha: 8b3d36daaf5561496b7d4075fba4f2c52d18ca1c Source-Link: googleapis/googleapis@8b3d36d
1 parent 4ab50b6 commit 32286cc

File tree

10 files changed

+1633
-67
lines changed

10 files changed

+1633
-67
lines changed

google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClientTest.java

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -188,6 +188,7 @@ public void createSecretTest() throws Exception {
188188
.setReplication(Replication.newBuilder().build())
189189
.setCreateTime(Timestamp.newBuilder().build())
190190
.putAllLabels(new HashMap<String, String>())
191+
.addAllTopics(new ArrayList<Topic>())
191192
.build();
192193
mockSecretManagerService.addResponse(expectedResponse);
193194

@@ -235,6 +236,7 @@ public void createSecretTest2() throws Exception {
235236
.setReplication(Replication.newBuilder().build())
236237
.setCreateTime(Timestamp.newBuilder().build())
237238
.putAllLabels(new HashMap<String, String>())
239+
.addAllTopics(new ArrayList<Topic>())
238240
.build();
239241
mockSecretManagerService.addResponse(expectedResponse);
240242

@@ -370,6 +372,7 @@ public void getSecretTest() throws Exception {
370372
.setReplication(Replication.newBuilder().build())
371373
.setCreateTime(Timestamp.newBuilder().build())
372374
.putAllLabels(new HashMap<String, String>())
375+
.addAllTopics(new ArrayList<Topic>())
373376
.build();
374377
mockSecretManagerService.addResponse(expectedResponse);
375378

@@ -411,6 +414,7 @@ public void getSecretTest2() throws Exception {
411414
.setReplication(Replication.newBuilder().build())
412415
.setCreateTime(Timestamp.newBuilder().build())
413416
.putAllLabels(new HashMap<String, String>())
417+
.addAllTopics(new ArrayList<Topic>())
414418
.build();
415419
mockSecretManagerService.addResponse(expectedResponse);
416420

@@ -452,6 +456,7 @@ public void updateSecretTest() throws Exception {
452456
.setReplication(Replication.newBuilder().build())
453457
.setCreateTime(Timestamp.newBuilder().build())
454458
.putAllLabels(new HashMap<String, String>())
459+
.addAllTopics(new ArrayList<Topic>())
455460
.build();
456461
mockSecretManagerService.addResponse(expectedResponse);
457462

proto-google-cloud-secretmanager-v1/src/main/java/com/google/cloud/secretmanager/v1/ResourcesProto.java

Lines changed: 84 additions & 61 deletions
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,10 @@ public static void registerAllExtensions(com.google.protobuf.ExtensionRegistry r
7979
internal_static_google_cloud_secretmanager_v1_CustomerManagedEncryptionStatus_descriptor;
8080
static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
8181
internal_static_google_cloud_secretmanager_v1_CustomerManagedEncryptionStatus_fieldAccessorTable;
82+
static final com.google.protobuf.Descriptors.Descriptor
83+
internal_static_google_cloud_secretmanager_v1_Topic_descriptor;
84+
static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
85+
internal_static_google_cloud_secretmanager_v1_Topic_fieldAccessorTable;
8286
static final com.google.protobuf.Descriptors.Descriptor
8387
internal_static_google_cloud_secretmanager_v1_SecretPayload_descriptor;
8488
static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
@@ -97,70 +101,74 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
97101
+ "google/api/field_behavior.proto\032\031google/"
98102
+ "api/resource.proto\032\036google/protobuf/dura"
99103
+ "tion.proto\032\037google/protobuf/timestamp.pr"
100-
+ "oto\032\034google/api/annotations.proto\"\320\003\n\006Se"
104+
+ "oto\032\034google/api/annotations.proto\"\213\004\n\006Se"
101105
+ "cret\022\021\n\004name\030\001 \001(\tB\003\340A\003\022G\n\013replication\030\002"
102106
+ " \001(\0132*.google.cloud.secretmanager.v1.Rep"
103107
+ "licationB\006\340A\005\340A\002\0224\n\013create_time\030\003 \001(\0132\032."
104108
+ "google.protobuf.TimestampB\003\340A\003\022A\n\006labels"
105109
+ "\030\004 \003(\01321.google.cloud.secretmanager.v1.S"
106-
+ "ecret.LabelsEntry\0226\n\013expire_time\030\006 \001(\0132\032"
107-
+ ".google.protobuf.TimestampB\003\340A\001H\000\022-\n\003ttl"
108-
+ "\030\007 \001(\0132\031.google.protobuf.DurationB\003\340A\004H\000"
109-
+ "\032-\n\013LabelsEntry\022\013\n\003key\030\001 \001(\t\022\r\n\005value\030\002 "
110-
+ "\001(\t:\0028\001:M\352AJ\n#secretmanager.googleapis.c"
111-
+ "om/Secret\022#projects/{project}/secrets/{s"
112-
+ "ecret}B\014\n\nexpiration\"\337\003\n\rSecretVersion\022\021"
113-
+ "\n\004name\030\001 \001(\tB\003\340A\003\0224\n\013create_time\030\002 \001(\0132\032"
114-
+ ".google.protobuf.TimestampB\003\340A\003\0225\n\014destr"
115-
+ "oy_time\030\003 \001(\0132\032.google.protobuf.Timestam"
116-
+ "pB\003\340A\003\022F\n\005state\030\004 \001(\01622.google.cloud.sec"
117-
+ "retmanager.v1.SecretVersion.StateB\003\340A\003\022L"
118-
+ "\n\022replication_status\030\005 \001(\01320.google.clou"
119-
+ "d.secretmanager.v1.ReplicationStatus\"H\n\005"
120-
+ "State\022\025\n\021STATE_UNSPECIFIED\020\000\022\013\n\007ENABLED\020"
121-
+ "\001\022\014\n\010DISABLED\020\002\022\r\n\tDESTROYED\020\003:n\352Ak\n*sec"
122-
+ "retmanager.googleapis.com/SecretVersion\022"
123-
+ "=projects/{project}/secrets/{secret}/ver"
124-
+ "sions/{secret_version}\"\220\004\n\013Replication\022I"
125-
+ "\n\tautomatic\030\001 \001(\01324.google.cloud.secretm"
126-
+ "anager.v1.Replication.AutomaticH\000\022N\n\014use"
127-
+ "r_managed\030\002 \001(\01326.google.cloud.secretman"
128-
+ "ager.v1.Replication.UserManagedH\000\032o\n\tAut"
129-
+ "omatic\022b\n\033customer_managed_encryption\030\001 "
130-
+ "\001(\01328.google.cloud.secretmanager.v1.Cust"
131-
+ "omerManagedEncryptionB\003\340A\001\032\345\001\n\013UserManag"
132-
+ "ed\022U\n\010replicas\030\001 \003(\0132>.google.cloud.secr"
133-
+ "etmanager.v1.Replication.UserManaged.Rep"
134-
+ "licaB\003\340A\002\032\177\n\007Replica\022\020\n\010location\030\001 \001(\t\022b"
135-
+ "\n\033customer_managed_encryption\030\002 \001(\01328.go"
136-
+ "ogle.cloud.secretmanager.v1.CustomerMana"
137-
+ "gedEncryptionB\003\340A\001B\r\n\013replication\"6\n\031Cus"
138-
+ "tomerManagedEncryption\022\031\n\014kms_key_name\030\001"
139-
+ " \001(\tB\003\340A\002\"\353\004\n\021ReplicationStatus\022U\n\tautom"
140-
+ "atic\030\001 \001(\0132@.google.cloud.secretmanager."
141-
+ "v1.ReplicationStatus.AutomaticStatusH\000\022Z"
142-
+ "\n\014user_managed\030\002 \001(\0132B.google.cloud.secr"
143-
+ "etmanager.v1.ReplicationStatus.UserManag"
144-
+ "edStatusH\000\032{\n\017AutomaticStatus\022h\n\033custome"
145-
+ "r_managed_encryption\030\001 \001(\0132>.google.clou"
146-
+ "d.secretmanager.v1.CustomerManagedEncryp"
147-
+ "tionStatusB\003\340A\003\032\217\002\n\021UserManagedStatus\022g\n"
148-
+ "\010replicas\030\001 \003(\0132P.google.cloud.secretman"
149-
+ "ager.v1.ReplicationStatus.UserManagedSta"
150-
+ "tus.ReplicaStatusB\003\340A\003\032\220\001\n\rReplicaStatus"
151-
+ "\022\025\n\010location\030\001 \001(\tB\003\340A\003\022h\n\033customer_mana"
152-
+ "ged_encryption\030\002 \001(\0132>.google.cloud.secr"
153-
+ "etmanager.v1.CustomerManagedEncryptionSt"
154-
+ "atusB\003\340A\003B\024\n\022replication_status\"D\n\037Custo"
155-
+ "merManagedEncryptionStatus\022!\n\024kms_key_ve"
156-
+ "rsion_name\030\001 \001(\tB\003\340A\002\"\035\n\rSecretPayload\022\014"
157-
+ "\n\004data\030\001 \001(\014B\355\001\n!com.google.cloud.secret"
158-
+ "manager.v1B\016ResourcesProtoP\001ZJgoogle.gol"
159-
+ "ang.org/genproto/googleapis/cloud/secret"
160-
+ "manager/v1;secretmanager\370\001\001\242\002\003GSM\252\002\035Goog"
161-
+ "le.Cloud.SecretManager.V1\312\002\035Google\\Cloud"
162-
+ "\\SecretManager\\V1\352\002 Google::Cloud::Secre"
163-
+ "tManager::V1b\006proto3"
110+
+ "ecret.LabelsEntry\0229\n\006topics\030\005 \003(\0132$.goog"
111+
+ "le.cloud.secretmanager.v1.TopicB\003\340A\001\0226\n\013"
112+
+ "expire_time\030\006 \001(\0132\032.google.protobuf.Time"
113+
+ "stampB\003\340A\001H\000\022-\n\003ttl\030\007 \001(\0132\031.google.proto"
114+
+ "buf.DurationB\003\340A\004H\000\032-\n\013LabelsEntry\022\013\n\003ke"
115+
+ "y\030\001 \001(\t\022\r\n\005value\030\002 \001(\t:\0028\001:M\352AJ\n#secretm"
116+
+ "anager.googleapis.com/Secret\022#projects/{"
117+
+ "project}/secrets/{secret}B\014\n\nexpiration\""
118+
+ "\337\003\n\rSecretVersion\022\021\n\004name\030\001 \001(\tB\003\340A\003\0224\n\013"
119+
+ "create_time\030\002 \001(\0132\032.google.protobuf.Time"
120+
+ "stampB\003\340A\003\0225\n\014destroy_time\030\003 \001(\0132\032.googl"
121+
+ "e.protobuf.TimestampB\003\340A\003\022F\n\005state\030\004 \001(\016"
122+
+ "22.google.cloud.secretmanager.v1.SecretV"
123+
+ "ersion.StateB\003\340A\003\022L\n\022replication_status\030"
124+
+ "\005 \001(\01320.google.cloud.secretmanager.v1.Re"
125+
+ "plicationStatus\"H\n\005State\022\025\n\021STATE_UNSPEC"
126+
+ "IFIED\020\000\022\013\n\007ENABLED\020\001\022\014\n\010DISABLED\020\002\022\r\n\tDE"
127+
+ "STROYED\020\003:n\352Ak\n*secretmanager.googleapis"
128+
+ ".com/SecretVersion\022=projects/{project}/s"
129+
+ "ecrets/{secret}/versions/{secret_version"
130+
+ "}\"\220\004\n\013Replication\022I\n\tautomatic\030\001 \001(\01324.g"
131+
+ "oogle.cloud.secretmanager.v1.Replication"
132+
+ ".AutomaticH\000\022N\n\014user_managed\030\002 \001(\01326.goo"
133+
+ "gle.cloud.secretmanager.v1.Replication.U"
134+
+ "serManagedH\000\032o\n\tAutomatic\022b\n\033customer_ma"
135+
+ "naged_encryption\030\001 \001(\01328.google.cloud.se"
136+
+ "cretmanager.v1.CustomerManagedEncryption"
137+
+ "B\003\340A\001\032\345\001\n\013UserManaged\022U\n\010replicas\030\001 \003(\0132"
138+
+ ">.google.cloud.secretmanager.v1.Replicat"
139+
+ "ion.UserManaged.ReplicaB\003\340A\002\032\177\n\007Replica\022"
140+
+ "\020\n\010location\030\001 \001(\t\022b\n\033customer_managed_en"
141+
+ "cryption\030\002 \001(\01328.google.cloud.secretmana"
142+
+ "ger.v1.CustomerManagedEncryptionB\003\340A\001B\r\n"
143+
+ "\013replication\"6\n\031CustomerManagedEncryptio"
144+
+ "n\022\031\n\014kms_key_name\030\001 \001(\tB\003\340A\002\"\353\004\n\021Replica"
145+
+ "tionStatus\022U\n\tautomatic\030\001 \001(\0132@.google.c"
146+
+ "loud.secretmanager.v1.ReplicationStatus."
147+
+ "AutomaticStatusH\000\022Z\n\014user_managed\030\002 \001(\0132"
148+
+ "B.google.cloud.secretmanager.v1.Replicat"
149+
+ "ionStatus.UserManagedStatusH\000\032{\n\017Automat"
150+
+ "icStatus\022h\n\033customer_managed_encryption\030"
151+
+ "\001 \001(\0132>.google.cloud.secretmanager.v1.Cu"
152+
+ "stomerManagedEncryptionStatusB\003\340A\003\032\217\002\n\021U"
153+
+ "serManagedStatus\022g\n\010replicas\030\001 \003(\0132P.goo"
154+
+ "gle.cloud.secretmanager.v1.ReplicationSt"
155+
+ "atus.UserManagedStatus.ReplicaStatusB\003\340A"
156+
+ "\003\032\220\001\n\rReplicaStatus\022\025\n\010location\030\001 \001(\tB\003\340"
157+
+ "A\003\022h\n\033customer_managed_encryption\030\002 \001(\0132"
158+
+ ">.google.cloud.secretmanager.v1.Customer"
159+
+ "ManagedEncryptionStatusB\003\340A\003B\024\n\022replicat"
160+
+ "ion_status\"D\n\037CustomerManagedEncryptionS"
161+
+ "tatus\022!\n\024kms_key_version_name\030\001 \001(\tB\003\340A\002"
162+
+ "\"_\n\005Topic\022\021\n\004name\030\001 \001(\tB\003\340A\002:C\352A@\n\033pubsu"
163+
+ "b.googleapis.com/Topic\022!projects/{projec"
164+
+ "t}/topics/{topic}\"\035\n\rSecretPayload\022\014\n\004da"
165+
+ "ta\030\001 \001(\014B\355\001\n!com.google.cloud.secretmana"
166+
+ "ger.v1B\016ResourcesProtoP\001ZJgoogle.golang."
167+
+ "org/genproto/googleapis/cloud/secretmana"
168+
+ "ger/v1;secretmanager\370\001\001\242\002\003GSM\252\002\035Google.C"
169+
+ "loud.SecretManager.V1\312\002\035Google\\Cloud\\Sec"
170+
+ "retManager\\V1\352\002 Google::Cloud::SecretMan"
171+
+ "ager::V1b\006proto3"
164172
};
165173
descriptor =
166174
com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom(
@@ -178,7 +186,14 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
178186
new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable(
179187
internal_static_google_cloud_secretmanager_v1_Secret_descriptor,
180188
new java.lang.String[] {
181-
"Name", "Replication", "CreateTime", "Labels", "ExpireTime", "Ttl", "Expiration",
189+
"Name",
190+
"Replication",
191+
"CreateTime",
192+
"Labels",
193+
"Topics",
194+
"ExpireTime",
195+
"Ttl",
196+
"Expiration",
182197
});
183198
internal_static_google_cloud_secretmanager_v1_Secret_LabelsEntry_descriptor =
184199
internal_static_google_cloud_secretmanager_v1_Secret_descriptor.getNestedTypes().get(0);
@@ -288,8 +303,16 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
288303
new java.lang.String[] {
289304
"KmsKeyVersionName",
290305
});
291-
internal_static_google_cloud_secretmanager_v1_SecretPayload_descriptor =
306+
internal_static_google_cloud_secretmanager_v1_Topic_descriptor =
292307
getDescriptor().getMessageTypes().get(6);
308+
internal_static_google_cloud_secretmanager_v1_Topic_fieldAccessorTable =
309+
new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable(
310+
internal_static_google_cloud_secretmanager_v1_Topic_descriptor,
311+
new java.lang.String[] {
312+
"Name",
313+
});
314+
internal_static_google_cloud_secretmanager_v1_SecretPayload_descriptor =
315+
getDescriptor().getMessageTypes().get(7);
293316
internal_static_google_cloud_secretmanager_v1_SecretPayload_fieldAccessorTable =
294317
new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable(
295318
internal_static_google_cloud_secretmanager_v1_SecretPayload_descriptor,

0 commit comments

Comments
 (0)