From c6559f6cf6d62290d3639ee61e506102ac085cd6 Mon Sep 17 00:00:00 2001 From: Lawrence Qiu Date: Tue, 28 Jan 2025 17:44:17 -0500 Subject: [PATCH] fix: Re-generate SecretManager v1beta1 client library (#11402) * fix: Re-generate SecretManager v1beta1 client library * chore: Fix typo `secret` -> `secrets` Co-authored-by: Blake Li * chore: Update from `secret` to `secrets` * chore: generate libraries at Tue Jan 28 21:07:48 UTC 2025 * chore: generate libraries at Tue Jan 28 21:38:55 UTC 2025 * chore: Update versions.txt * chore: update to v2.57.0-SNAPSHOT --------- Co-authored-by: Blake Li Co-authored-by: Diego Marquez Co-authored-by: cloud-java-bot --- generation_config.yaml | 2 + java-secretmanager/.OwlBot-hermetic.yaml | 10 + .../google-cloud-secretmanager-bom/pom.xml | 10 + .../google-cloud-secretmanager/pom.xml | 9 + .../v1beta1/SecretManagerServiceClient.java | 2494 ++++++++++++ .../v1beta1/SecretManagerServiceSettings.java | 387 ++ .../secretmanager/v1beta1/gapic_metadata.json | 63 + .../secretmanager/v1beta1/package-info.java | 54 + ...pcSecretManagerServiceCallableFactory.java | 115 + .../stub/GrpcSecretManagerServiceStub.java | 643 ++++ ...onSecretManagerServiceCallableFactory.java | 103 + .../HttpJsonSecretManagerServiceStub.java | 1085 ++++++ .../stub/SecretManagerServiceStub.java | 134 + .../SecretManagerServiceStubSettings.java | 847 +++++ .../reflect-config.json | 1883 +++++++++ .../v1beta1/MockSecretManagerService.java | 59 + .../v1beta1/MockSecretManagerServiceImpl.java | 378 ++ ...ecretManagerServiceClientHttpJsonTest.java | 1345 +++++++ .../SecretManagerServiceClientTest.java | 1195 ++++++ .../pom.xml | 45 + .../v1beta1/SecretManagerServiceGrpc.java | 2168 +++++++++++ java-secretmanager/pom.xml | 12 + .../clirr-ignored-differences.xml | 5 + .../pom.xml | 37 + .../v1beta1/AccessSecretVersionRequest.java | 656 ++++ .../AccessSecretVersionRequestOrBuilder.java | 57 + .../v1beta1/AccessSecretVersionResponse.java | 925 +++++ .../AccessSecretVersionResponseOrBuilder.java | 88 + .../v1beta1/AddSecretVersionRequest.java | 958 +++++ .../AddSecretVersionRequestOrBuilder.java | 98 + .../v1beta1/CreateSecretRequest.java | 1161 ++++++ .../v1beta1/CreateSecretRequestOrBuilder.java | 131 + .../v1beta1/DeleteSecretRequest.java | 647 ++++ .../v1beta1/DeleteSecretRequestOrBuilder.java | 57 + .../v1beta1/DestroySecretVersionRequest.java | 658 ++++ .../DestroySecretVersionRequestOrBuilder.java | 57 + .../v1beta1/DisableSecretVersionRequest.java | 658 ++++ .../DisableSecretVersionRequestOrBuilder.java | 57 + .../v1beta1/EnableSecretVersionRequest.java | 656 ++++ .../EnableSecretVersionRequestOrBuilder.java | 57 + .../v1beta1/GetSecretRequest.java | 640 ++++ .../v1beta1/GetSecretRequestOrBuilder.java | 55 + .../v1beta1/GetSecretVersionRequest.java | 667 ++++ .../GetSecretVersionRequestOrBuilder.java | 61 + .../v1beta1/ListSecretVersionsRequest.java | 951 +++++ .../ListSecretVersionsRequestOrBuilder.java | 101 + .../v1beta1/ListSecretVersionsResponse.java | 1262 ++++++ .../ListSecretVersionsResponseOrBuilder.java | 123 + .../v1beta1/ListSecretsRequest.java | 937 +++++ .../v1beta1/ListSecretsRequestOrBuilder.java | 99 + .../v1beta1/ListSecretsResponse.java | 1243 ++++++ .../v1beta1/ListSecretsResponseOrBuilder.java | 123 + .../secretmanager/v1beta1/ProjectName.java | 168 + .../secretmanager/v1beta1/Replication.java | 3377 +++++++++++++++++ .../v1beta1/ReplicationOrBuilder.java | 98 + .../secretmanager/v1beta1/ResourcesProto.java | 196 + .../cloud/secretmanager/v1beta1/Secret.java | 1692 +++++++++ .../secretmanager/v1beta1/SecretName.java | 191 + .../v1beta1/SecretOrBuilder.java | 244 ++ .../secretmanager/v1beta1/SecretPayload.java | 541 +++ .../v1beta1/SecretPayloadOrBuilder.java | 39 + .../secretmanager/v1beta1/SecretVersion.java | 1616 ++++++++ .../v1beta1/SecretVersionName.java | 227 ++ .../v1beta1/SecretVersionOrBuilder.java | 170 + .../secretmanager/v1beta1/ServiceProto.java | 388 ++ .../v1beta1/UpdateSecretRequest.java | 1023 +++++ .../v1beta1/UpdateSecretRequestOrBuilder.java | 105 + .../cloud/secrets/v1beta1/resources.proto | 155 + .../cloud/secrets/v1beta1/service.proto | 417 ++ .../AsyncAccessSecretVersion.java | 51 + .../SyncAccessSecretVersion.java | 48 + ...cAccessSecretVersionSecretversionname.java | 43 + .../SyncAccessSecretVersionString.java | 43 + .../AsyncAddSecretVersion.java | 53 + .../SyncAddSecretVersion.java | 49 + ...dSecretVersionSecretnameSecretpayload.java | 45 + ...ncAddSecretVersionStringSecretpayload.java | 45 + .../SyncCreateSetCredentialsProvider.java | 45 + .../create/SyncCreateSetEndpoint.java | 42 + .../SyncCreateUseHttpJsonTransport.java | 41 + .../createsecret/AsyncCreateSecret.java | 53 + .../createsecret/SyncCreateSecret.java | 49 + ...ncCreateSecretProjectnameStringSecret.java | 45 + .../SyncCreateSecretStringStringSecret.java | 45 + .../deletesecret/AsyncDeleteSecret.java | 51 + .../deletesecret/SyncDeleteSecret.java | 47 + .../SyncDeleteSecretSecretname.java | 43 + .../deletesecret/SyncDeleteSecretString.java | 43 + .../AsyncDestroySecretVersion.java | 51 + .../SyncDestroySecretVersion.java | 47 + ...DestroySecretVersionSecretversionname.java | 43 + .../SyncDestroySecretVersionString.java | 43 + .../AsyncDisableSecretVersion.java | 51 + .../SyncDisableSecretVersion.java | 47 + ...DisableSecretVersionSecretversionname.java | 43 + .../SyncDisableSecretVersionString.java | 43 + .../AsyncEnableSecretVersion.java | 51 + .../SyncEnableSecretVersion.java | 47 + ...cEnableSecretVersionSecretversionname.java | 43 + .../SyncEnableSecretVersionString.java | 43 + .../getiampolicy/AsyncGetIamPolicy.java | 53 + .../getiampolicy/SyncGetIamPolicy.java | 49 + .../getsecret/AsyncGetSecret.java | 50 + .../getsecret/SyncGetSecret.java | 47 + .../getsecret/SyncGetSecretSecretname.java | 43 + .../getsecret/SyncGetSecretString.java | 43 + .../AsyncGetSecretVersion.java | 51 + .../SyncGetSecretVersion.java | 47 + ...SyncGetSecretVersionSecretversionname.java | 43 + .../SyncGetSecretVersionString.java | 43 + .../listsecrets/AsyncListSecrets.java | 55 + .../listsecrets/AsyncListSecretsPaged.java | 63 + .../listsecrets/SyncListSecrets.java | 51 + .../SyncListSecretsProjectname.java | 45 + .../listsecrets/SyncListSecretsString.java | 45 + .../AsyncListSecretVersions.java | 55 + .../AsyncListSecretVersionsPaged.java | 63 + .../SyncListSecretVersions.java | 52 + .../SyncListSecretVersionsSecretname.java | 46 + .../SyncListSecretVersionsString.java | 46 + .../setiampolicy/AsyncSetIamPolicy.java | 54 + .../setiampolicy/SyncSetIamPolicy.java | 50 + .../AsyncTestIamPermissions.java | 53 + .../SyncTestIamPermissions.java | 49 + .../updatesecret/AsyncUpdateSecret.java | 52 + .../updatesecret/SyncUpdateSecret.java | 48 + .../SyncUpdateSecretSecretFieldmask.java | 44 + .../createsecret/SyncCreateSecret.java | 57 + .../createsecret/SyncCreateSecret.java | 57 + versions.txt | 2 + 130 files changed, 39802 insertions(+) create mode 100644 java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceClient.java create mode 100644 java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceSettings.java create mode 100644 java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/gapic_metadata.json create mode 100644 java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/package-info.java create mode 100644 java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/GrpcSecretManagerServiceCallableFactory.java create mode 100644 java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/GrpcSecretManagerServiceStub.java create mode 100644 java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/HttpJsonSecretManagerServiceCallableFactory.java create mode 100644 java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/HttpJsonSecretManagerServiceStub.java create mode 100644 java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/SecretManagerServiceStub.java create mode 100644 java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/SecretManagerServiceStubSettings.java create mode 100644 java-secretmanager/google-cloud-secretmanager/src/main/resources/META-INF/native-image/com.google.cloud.secretmanager.v1beta1/reflect-config.json create mode 100644 java-secretmanager/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/MockSecretManagerService.java create mode 100644 java-secretmanager/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/MockSecretManagerServiceImpl.java create mode 100644 java-secretmanager/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceClientHttpJsonTest.java create mode 100644 java-secretmanager/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceClientTest.java create mode 100644 java-secretmanager/grpc-google-cloud-secretmanager-v1beta1/pom.xml create mode 100644 java-secretmanager/grpc-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceGrpc.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/clirr-ignored-differences.xml create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/pom.xml create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AccessSecretVersionRequest.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AccessSecretVersionRequestOrBuilder.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AccessSecretVersionResponse.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AccessSecretVersionResponseOrBuilder.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AddSecretVersionRequest.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AddSecretVersionRequestOrBuilder.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/CreateSecretRequest.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/CreateSecretRequestOrBuilder.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DeleteSecretRequest.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DeleteSecretRequestOrBuilder.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DestroySecretVersionRequest.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DestroySecretVersionRequestOrBuilder.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DisableSecretVersionRequest.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DisableSecretVersionRequestOrBuilder.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/EnableSecretVersionRequest.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/EnableSecretVersionRequestOrBuilder.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/GetSecretRequest.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/GetSecretRequestOrBuilder.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/GetSecretVersionRequest.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/GetSecretVersionRequestOrBuilder.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretVersionsRequest.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretVersionsRequestOrBuilder.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretVersionsResponse.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretVersionsResponseOrBuilder.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretsRequest.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretsRequestOrBuilder.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretsResponse.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretsResponseOrBuilder.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ProjectName.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/Replication.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ReplicationOrBuilder.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ResourcesProto.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/Secret.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretName.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretOrBuilder.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretPayload.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretPayloadOrBuilder.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretVersion.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretVersionName.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretVersionOrBuilder.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ServiceProto.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/UpdateSecretRequest.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/UpdateSecretRequestOrBuilder.java create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/resources.proto create mode 100644 java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/service.proto create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/accesssecretversion/AsyncAccessSecretVersion.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/accesssecretversion/SyncAccessSecretVersion.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/accesssecretversion/SyncAccessSecretVersionSecretversionname.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/accesssecretversion/SyncAccessSecretVersionString.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/addsecretversion/AsyncAddSecretVersion.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/addsecretversion/SyncAddSecretVersion.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/addsecretversion/SyncAddSecretVersionSecretnameSecretpayload.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/addsecretversion/SyncAddSecretVersionStringSecretpayload.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/create/SyncCreateSetCredentialsProvider.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/create/SyncCreateSetEndpoint.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/create/SyncCreateUseHttpJsonTransport.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/createsecret/AsyncCreateSecret.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/createsecret/SyncCreateSecret.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/createsecret/SyncCreateSecretProjectnameStringSecret.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/createsecret/SyncCreateSecretStringStringSecret.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/deletesecret/AsyncDeleteSecret.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/deletesecret/SyncDeleteSecret.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/deletesecret/SyncDeleteSecretSecretname.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/deletesecret/SyncDeleteSecretString.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/destroysecretversion/AsyncDestroySecretVersion.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/destroysecretversion/SyncDestroySecretVersion.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/destroysecretversion/SyncDestroySecretVersionSecretversionname.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/destroysecretversion/SyncDestroySecretVersionString.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/disablesecretversion/AsyncDisableSecretVersion.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/disablesecretversion/SyncDisableSecretVersion.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/disablesecretversion/SyncDisableSecretVersionSecretversionname.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/disablesecretversion/SyncDisableSecretVersionString.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/enablesecretversion/AsyncEnableSecretVersion.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/enablesecretversion/SyncEnableSecretVersion.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/enablesecretversion/SyncEnableSecretVersionSecretversionname.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/enablesecretversion/SyncEnableSecretVersionString.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getiampolicy/AsyncGetIamPolicy.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getiampolicy/SyncGetIamPolicy.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecret/AsyncGetSecret.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecret/SyncGetSecret.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecret/SyncGetSecretSecretname.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecret/SyncGetSecretString.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecretversion/AsyncGetSecretVersion.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecretversion/SyncGetSecretVersion.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecretversion/SyncGetSecretVersionSecretversionname.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecretversion/SyncGetSecretVersionString.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecrets/AsyncListSecrets.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecrets/AsyncListSecretsPaged.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecrets/SyncListSecrets.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecrets/SyncListSecretsProjectname.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecrets/SyncListSecretsString.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecretversions/AsyncListSecretVersions.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecretversions/AsyncListSecretVersionsPaged.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecretversions/SyncListSecretVersions.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecretversions/SyncListSecretVersionsSecretname.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecretversions/SyncListSecretVersionsString.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/setiampolicy/AsyncSetIamPolicy.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/setiampolicy/SyncSetIamPolicy.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/testiampermissions/AsyncTestIamPermissions.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/testiampermissions/SyncTestIamPermissions.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/updatesecret/AsyncUpdateSecret.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/updatesecret/SyncUpdateSecret.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/updatesecret/SyncUpdateSecretSecretFieldmask.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservicesettings/createsecret/SyncCreateSecret.java create mode 100644 java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/stub/secretmanagerservicestubsettings/createsecret/SyncCreateSecret.java diff --git a/generation_config.yaml b/generation_config.yaml index d5aa0de618cf..60e15c62ae18 100644 --- a/generation_config.yaml +++ b/generation_config.yaml @@ -1903,6 +1903,8 @@ libraries: GAPICs: - proto_path: google/cloud/secretmanager/v1 - proto_path: google/cloud/secretmanager/v1beta2 + # v1beta1's version is in a different proto path from the rest + - proto_path: google/cloud/secrets/v1beta1 - api_shortname: securesourcemanager name_pretty: Secure Source Manager API diff --git a/java-secretmanager/.OwlBot-hermetic.yaml b/java-secretmanager/.OwlBot-hermetic.yaml index 246d43d91220..ff10158479a3 100644 --- a/java-secretmanager/.OwlBot-hermetic.yaml +++ b/java-secretmanager/.OwlBot-hermetic.yaml @@ -25,6 +25,16 @@ deep-preserve-regex: deep-copy-regex: +# The first four configurations are for v1beta1 configured in /google/cloud/secrets/{version} +- source: "/google/cloud/secrets/(v\\d.*)/.*-java/proto-google-.*/src" + dest: "/owl-bot-staging/java-secretmanager/$1/proto-google-cloud-secretmanager-$1/src" +- source: "/google/cloud/secrets/(v\\d.*)/.*-java/grpc-google-.*/src" + dest: "/owl-bot-staging/java-secretmanager/$1/grpc-google-cloud-secretmanager-$1/src" +- source: "/google/cloud/secrets/(v\\d.*)/.*-java/gapic-google-.*/src" + dest: "/owl-bot-staging/java-secretmanager/$1/google-cloud-secretmanager/src" +- source: "/google/cloud/secrets/(v\\d.*)/.*-java/samples/snippets/generated" + dest: "/owl-bot-staging/java-secretmanager/$1/samples/snippets/generated" +# The next four configurations are for all others versions configured in /google/cloud/secretmanager/{version} - source: "/google/cloud/secretmanager/(v\\d.*)/.*-java/proto-google-.*/src" dest: "/owl-bot-staging/java-secretmanager/$1/proto-google-cloud-secretmanager-$1/src" - source: "/google/cloud/secretmanager/(v\\d.*)/.*-java/grpc-google-.*/src" diff --git a/java-secretmanager/google-cloud-secretmanager-bom/pom.xml b/java-secretmanager/google-cloud-secretmanager-bom/pom.xml index 6aac699477c2..dedc973489fc 100644 --- a/java-secretmanager/google-cloud-secretmanager-bom/pom.xml +++ b/java-secretmanager/google-cloud-secretmanager-bom/pom.xml @@ -35,6 +35,11 @@ grpc-google-cloud-secretmanager-v1beta2 2.57.0-SNAPSHOT + + com.google.api.grpc + grpc-google-cloud-secretmanager-v1beta1 + 2.57.0-SNAPSHOT + com.google.api.grpc proto-google-cloud-secretmanager-v1 @@ -45,6 +50,11 @@ proto-google-cloud-secretmanager-v1beta2 2.57.0-SNAPSHOT + + com.google.api.grpc + proto-google-cloud-secretmanager-v1beta1 + 2.57.0-SNAPSHOT + diff --git a/java-secretmanager/google-cloud-secretmanager/pom.xml b/java-secretmanager/google-cloud-secretmanager/pom.xml index 18aacb6eff04..563222c26934 100644 --- a/java-secretmanager/google-cloud-secretmanager/pom.xml +++ b/java-secretmanager/google-cloud-secretmanager/pom.xml @@ -40,6 +40,10 @@ com.google.api.grpc proto-google-common-protos + + com.google.api.grpc + proto-google-cloud-secretmanager-v1beta1 + com.google.api.grpc proto-google-cloud-secretmanager-v1beta2 @@ -79,6 +83,11 @@ + + com.google.api.grpc + grpc-google-cloud-secretmanager-v1beta1 + test + junit diff --git a/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceClient.java b/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceClient.java new file mode 100644 index 000000000000..a11d53179337 --- /dev/null +++ b/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceClient.java @@ -0,0 +1,2494 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1; + +import com.google.api.core.ApiFuture; +import com.google.api.core.ApiFutures; +import com.google.api.core.BetaApi; +import com.google.api.gax.core.BackgroundResource; +import com.google.api.gax.paging.AbstractFixedSizeCollection; +import com.google.api.gax.paging.AbstractPage; +import com.google.api.gax.paging.AbstractPagedListResponse; +import com.google.api.gax.rpc.PageContext; +import com.google.api.gax.rpc.UnaryCallable; +import com.google.cloud.secretmanager.v1beta1.stub.SecretManagerServiceStub; +import com.google.cloud.secretmanager.v1beta1.stub.SecretManagerServiceStubSettings; +import com.google.common.util.concurrent.MoreExecutors; +import com.google.iam.v1.GetIamPolicyRequest; +import com.google.iam.v1.Policy; +import com.google.iam.v1.SetIamPolicyRequest; +import com.google.iam.v1.TestIamPermissionsRequest; +import com.google.iam.v1.TestIamPermissionsResponse; +import com.google.protobuf.Empty; +import com.google.protobuf.FieldMask; +import java.io.IOException; +import java.util.List; +import java.util.concurrent.TimeUnit; +import javax.annotation.Generated; + +// AUTO-GENERATED DOCUMENTATION AND CLASS. +/** + * Service Description: Secret Manager Service + * + *

Manages secrets and operations using those secrets. Implements a REST model with the following + * objects: + * + *

    + *
  • [Secret][google.cloud.secrets.v1beta1.Secret] + *
  • [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] + *
+ * + *

This class provides the ability to make remote calls to the backing service through method + * calls that map to API methods. Sample code to get started: + * + *

{@code
+ * // This snippet has been automatically generated and should be regarded as a code template only.
+ * // It will require modifications to work:
+ * // - It may require correct/in-range values for request initialization.
+ * // - It may require specifying regional endpoints when creating the service client as shown in
+ * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+ * try (SecretManagerServiceClient secretManagerServiceClient =
+ *     SecretManagerServiceClient.create()) {
+ *   ProjectName parent = ProjectName.of("[PROJECT]");
+ *   String secretId = "secretId945974251";
+ *   Secret secret = Secret.newBuilder().build();
+ *   Secret response = secretManagerServiceClient.createSecret(parent, secretId, secret);
+ * }
+ * }
+ * + *

Note: close() needs to be called on the SecretManagerServiceClient object to clean up + * resources such as threads. In the example above, try-with-resources is used, which automatically + * calls close(). + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + * + *
Methods
MethodDescriptionMethod Variants

ListSecrets

Lists [Secrets][google.cloud.secrets.v1beta1.Secret].

+ *

Request object method variants only take one parameter, a request object, which must be constructed before the call.

+ *
    + *
  • listSecrets(ListSecretsRequest request) + *

+ *

"Flattened" method variants have converted the fields of the request object into function parameters to enable multiple ways to call the same method.

+ *
    + *
  • listSecrets(ProjectName parent) + *

  • listSecrets(String parent) + *

+ *

Callable method variants take no parameters and return an immutable API callable object, which can be used to initiate calls to the service.

+ *
    + *
  • listSecretsPagedCallable() + *

  • listSecretsCallable() + *

+ *

CreateSecret

Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].

+ *

Request object method variants only take one parameter, a request object, which must be constructed before the call.

+ *
    + *
  • createSecret(CreateSecretRequest request) + *

+ *

"Flattened" method variants have converted the fields of the request object into function parameters to enable multiple ways to call the same method.

+ *
    + *
  • createSecret(ProjectName parent, String secretId, Secret secret) + *

  • createSecret(String parent, String secretId, Secret secret) + *

+ *

Callable method variants take no parameters and return an immutable API callable object, which can be used to initiate calls to the service.

+ *
    + *
  • createSecretCallable() + *

+ *

AddSecretVersion

Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret data and attaches it to an existing [Secret][google.cloud.secrets.v1beta1.Secret].

+ *

Request object method variants only take one parameter, a request object, which must be constructed before the call.

+ *
    + *
  • addSecretVersion(AddSecretVersionRequest request) + *

+ *

"Flattened" method variants have converted the fields of the request object into function parameters to enable multiple ways to call the same method.

+ *
    + *
  • addSecretVersion(SecretName parent, SecretPayload payload) + *

  • addSecretVersion(String parent, SecretPayload payload) + *

+ *

Callable method variants take no parameters and return an immutable API callable object, which can be used to initiate calls to the service.

+ *
    + *
  • addSecretVersionCallable() + *

+ *

GetSecret

Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret].

+ *

Request object method variants only take one parameter, a request object, which must be constructed before the call.

+ *
    + *
  • getSecret(GetSecretRequest request) + *

+ *

"Flattened" method variants have converted the fields of the request object into function parameters to enable multiple ways to call the same method.

+ *
    + *
  • getSecret(SecretName name) + *

  • getSecret(String name) + *

+ *

Callable method variants take no parameters and return an immutable API callable object, which can be used to initiate calls to the service.

+ *
    + *
  • getSecretCallable() + *

+ *

UpdateSecret

Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret].

+ *

Request object method variants only take one parameter, a request object, which must be constructed before the call.

+ *
    + *
  • updateSecret(UpdateSecretRequest request) + *

+ *

"Flattened" method variants have converted the fields of the request object into function parameters to enable multiple ways to call the same method.

+ *
    + *
  • updateSecret(Secret secret, FieldMask updateMask) + *

+ *

Callable method variants take no parameters and return an immutable API callable object, which can be used to initiate calls to the service.

+ *
    + *
  • updateSecretCallable() + *

+ *

DeleteSecret

Deletes a [Secret][google.cloud.secrets.v1beta1.Secret].

+ *

Request object method variants only take one parameter, a request object, which must be constructed before the call.

+ *
    + *
  • deleteSecret(DeleteSecretRequest request) + *

+ *

"Flattened" method variants have converted the fields of the request object into function parameters to enable multiple ways to call the same method.

+ *
    + *
  • deleteSecret(SecretName name) + *

  • deleteSecret(String name) + *

+ *

Callable method variants take no parameters and return an immutable API callable object, which can be used to initiate calls to the service.

+ *
    + *
  • deleteSecretCallable() + *

+ *

ListSecretVersions

Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return secret data.

+ *

Request object method variants only take one parameter, a request object, which must be constructed before the call.

+ *
    + *
  • listSecretVersions(ListSecretVersionsRequest request) + *

+ *

"Flattened" method variants have converted the fields of the request object into function parameters to enable multiple ways to call the same method.

+ *
    + *
  • listSecretVersions(SecretName parent) + *

  • listSecretVersions(String parent) + *

+ *

Callable method variants take no parameters and return an immutable API callable object, which can be used to initiate calls to the service.

+ *
    + *
  • listSecretVersionsPagedCallable() + *

  • listSecretVersionsCallable() + *

+ *

GetSecretVersion

Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + *

`projects/*/secrets/*/versions/latest` is an alias to the `latest` [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].

+ *

Request object method variants only take one parameter, a request object, which must be constructed before the call.

+ *
    + *
  • getSecretVersion(GetSecretVersionRequest request) + *

+ *

"Flattened" method variants have converted the fields of the request object into function parameters to enable multiple ways to call the same method.

+ *
    + *
  • getSecretVersion(SecretVersionName name) + *

  • getSecretVersion(String name) + *

+ *

Callable method variants take no parameters and return an immutable API callable object, which can be used to initiate calls to the service.

+ *
    + *
  • getSecretVersionCallable() + *

+ *

AccessSecretVersion

Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the secret data. + *

`projects/*/secrets/*/versions/latest` is an alias to the `latest` [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].

+ *

Request object method variants only take one parameter, a request object, which must be constructed before the call.

+ *
    + *
  • accessSecretVersion(AccessSecretVersionRequest request) + *

+ *

"Flattened" method variants have converted the fields of the request object into function parameters to enable multiple ways to call the same method.

+ *
    + *
  • accessSecretVersion(SecretVersionName name) + *

  • accessSecretVersion(String name) + *

+ *

Callable method variants take no parameters and return an immutable API callable object, which can be used to initiate calls to the service.

+ *
    + *
  • accessSecretVersionCallable() + *

+ *

DisableSecretVersion

Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED].

+ *

Request object method variants only take one parameter, a request object, which must be constructed before the call.

+ *
    + *
  • disableSecretVersion(DisableSecretVersionRequest request) + *

+ *

"Flattened" method variants have converted the fields of the request object into function parameters to enable multiple ways to call the same method.

+ *
    + *
  • disableSecretVersion(SecretVersionName name) + *

  • disableSecretVersion(String name) + *

+ *

Callable method variants take no parameters and return an immutable API callable object, which can be used to initiate calls to the service.

+ *
    + *
  • disableSecretVersionCallable() + *

+ *

EnableSecretVersion

Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED].

+ *

Request object method variants only take one parameter, a request object, which must be constructed before the call.

+ *
    + *
  • enableSecretVersion(EnableSecretVersionRequest request) + *

+ *

"Flattened" method variants have converted the fields of the request object into function parameters to enable multiple ways to call the same method.

+ *
    + *
  • enableSecretVersion(SecretVersionName name) + *

  • enableSecretVersion(String name) + *

+ *

Callable method variants take no parameters and return an immutable API callable object, which can be used to initiate calls to the service.

+ *
    + *
  • enableSecretVersionCallable() + *

+ *

DestroySecretVersion

Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably destroys the secret data.

+ *

Request object method variants only take one parameter, a request object, which must be constructed before the call.

+ *
    + *
  • destroySecretVersion(DestroySecretVersionRequest request) + *

+ *

"Flattened" method variants have converted the fields of the request object into function parameters to enable multiple ways to call the same method.

+ *
    + *
  • destroySecretVersion(SecretVersionName name) + *

  • destroySecretVersion(String name) + *

+ *

Callable method variants take no parameters and return an immutable API callable object, which can be used to initiate calls to the service.

+ *
    + *
  • destroySecretVersionCallable() + *

+ *

SetIamPolicy

Sets the access control policy on the specified secret. Replaces any existing policy. + *

Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced according to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret].

+ *

Request object method variants only take one parameter, a request object, which must be constructed before the call.

+ *
    + *
  • setIamPolicy(SetIamPolicyRequest request) + *

+ *

Callable method variants take no parameters and return an immutable API callable object, which can be used to initiate calls to the service.

+ *
    + *
  • setIamPolicyCallable() + *

+ *

GetIamPolicy

Gets the access control policy for a secret. Returns empty policy if the secret exists and does not have a policy set.

+ *

Request object method variants only take one parameter, a request object, which must be constructed before the call.

+ *
    + *
  • getIamPolicy(GetIamPolicyRequest request) + *

+ *

Callable method variants take no parameters and return an immutable API callable object, which can be used to initiate calls to the service.

+ *
    + *
  • getIamPolicyCallable() + *

+ *

TestIamPermissions

Returns permissions that a caller has for the specified secret. If the secret does not exist, this call returns an empty set of permissions, not a NOT_FOUND error. + *

Note: This operation is designed to be used for building permission-aware UIs and command-line tools, not for authorization checking. This operation may "fail open" without warning.

+ *

Request object method variants only take one parameter, a request object, which must be constructed before the call.

+ *
    + *
  • testIamPermissions(TestIamPermissionsRequest request) + *

+ *

Callable method variants take no parameters and return an immutable API callable object, which can be used to initiate calls to the service.

+ *
    + *
  • testIamPermissionsCallable() + *

+ *
+ * + *

See the individual methods for example code. + * + *

Many parameters require resource names to be formatted in a particular way. To assist with + * these names, this class includes a format method for each type of name, and additionally a parse + * method to extract the individual identifiers contained within names that are returned. + * + *

This class can be customized by passing in a custom instance of SecretManagerServiceSettings + * to create(). For example: + * + *

To customize credentials: + * + *

{@code
+ * // This snippet has been automatically generated and should be regarded as a code template only.
+ * // It will require modifications to work:
+ * // - It may require correct/in-range values for request initialization.
+ * // - It may require specifying regional endpoints when creating the service client as shown in
+ * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+ * SecretManagerServiceSettings secretManagerServiceSettings =
+ *     SecretManagerServiceSettings.newBuilder()
+ *         .setCredentialsProvider(FixedCredentialsProvider.create(myCredentials))
+ *         .build();
+ * SecretManagerServiceClient secretManagerServiceClient =
+ *     SecretManagerServiceClient.create(secretManagerServiceSettings);
+ * }
+ * + *

To customize the endpoint: + * + *

{@code
+ * // This snippet has been automatically generated and should be regarded as a code template only.
+ * // It will require modifications to work:
+ * // - It may require correct/in-range values for request initialization.
+ * // - It may require specifying regional endpoints when creating the service client as shown in
+ * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+ * SecretManagerServiceSettings secretManagerServiceSettings =
+ *     SecretManagerServiceSettings.newBuilder().setEndpoint(myEndpoint).build();
+ * SecretManagerServiceClient secretManagerServiceClient =
+ *     SecretManagerServiceClient.create(secretManagerServiceSettings);
+ * }
+ * + *

To use REST (HTTP1.1/JSON) transport (instead of gRPC) for sending and receiving requests over + * the wire: + * + *

{@code
+ * // This snippet has been automatically generated and should be regarded as a code template only.
+ * // It will require modifications to work:
+ * // - It may require correct/in-range values for request initialization.
+ * // - It may require specifying regional endpoints when creating the service client as shown in
+ * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+ * SecretManagerServiceSettings secretManagerServiceSettings =
+ *     SecretManagerServiceSettings.newHttpJsonBuilder().build();
+ * SecretManagerServiceClient secretManagerServiceClient =
+ *     SecretManagerServiceClient.create(secretManagerServiceSettings);
+ * }
+ * + *

Please refer to the GitHub repository's samples for more quickstart code snippets. + */ +@BetaApi +@Generated("by gapic-generator-java") +public class SecretManagerServiceClient implements BackgroundResource { + private final SecretManagerServiceSettings settings; + private final SecretManagerServiceStub stub; + + /** Constructs an instance of SecretManagerServiceClient with default settings. */ + public static final SecretManagerServiceClient create() throws IOException { + return create(SecretManagerServiceSettings.newBuilder().build()); + } + + /** + * Constructs an instance of SecretManagerServiceClient, using the given settings. The channels + * are created based on the settings passed in, or defaults for any settings that are not set. + */ + public static final SecretManagerServiceClient create(SecretManagerServiceSettings settings) + throws IOException { + return new SecretManagerServiceClient(settings); + } + + /** + * Constructs an instance of SecretManagerServiceClient, using the given stub for making calls. + * This is for advanced usage - prefer using create(SecretManagerServiceSettings). + */ + public static final SecretManagerServiceClient create(SecretManagerServiceStub stub) { + return new SecretManagerServiceClient(stub); + } + + /** + * Constructs an instance of SecretManagerServiceClient, using the given settings. This is + * protected so that it is easy to make a subclass, but otherwise, the static factory methods + * should be preferred. + */ + protected SecretManagerServiceClient(SecretManagerServiceSettings settings) throws IOException { + this.settings = settings; + this.stub = ((SecretManagerServiceStubSettings) settings.getStubSettings()).createStub(); + } + + protected SecretManagerServiceClient(SecretManagerServiceStub stub) { + this.settings = null; + this.stub = stub; + } + + public final SecretManagerServiceSettings getSettings() { + return settings; + } + + public SecretManagerServiceStub getStub() { + return stub; + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Lists [Secrets][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   ProjectName parent = ProjectName.of("[PROJECT]");
+   *   for (Secret element : secretManagerServiceClient.listSecrets(parent).iterateAll()) {
+   *     // doThingsWith(element);
+   *   }
+   * }
+   * }
+ * + * @param parent Required. The resource name of the project associated with the + * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final ListSecretsPagedResponse listSecrets(ProjectName parent) { + ListSecretsRequest request = + ListSecretsRequest.newBuilder() + .setParent(parent == null ? null : parent.toString()) + .build(); + return listSecrets(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Lists [Secrets][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   String parent = ProjectName.of("[PROJECT]").toString();
+   *   for (Secret element : secretManagerServiceClient.listSecrets(parent).iterateAll()) {
+   *     // doThingsWith(element);
+   *   }
+   * }
+   * }
+ * + * @param parent Required. The resource name of the project associated with the + * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final ListSecretsPagedResponse listSecrets(String parent) { + ListSecretsRequest request = ListSecretsRequest.newBuilder().setParent(parent).build(); + return listSecrets(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Lists [Secrets][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   ListSecretsRequest request =
+   *       ListSecretsRequest.newBuilder()
+   *           .setParent(ProjectName.of("[PROJECT]").toString())
+   *           .setPageSize(883849137)
+   *           .setPageToken("pageToken873572522")
+   *           .build();
+   *   for (Secret element : secretManagerServiceClient.listSecrets(request).iterateAll()) {
+   *     // doThingsWith(element);
+   *   }
+   * }
+   * }
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final ListSecretsPagedResponse listSecrets(ListSecretsRequest request) { + return listSecretsPagedCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Lists [Secrets][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   ListSecretsRequest request =
+   *       ListSecretsRequest.newBuilder()
+   *           .setParent(ProjectName.of("[PROJECT]").toString())
+   *           .setPageSize(883849137)
+   *           .setPageToken("pageToken873572522")
+   *           .build();
+   *   ApiFuture future =
+   *       secretManagerServiceClient.listSecretsPagedCallable().futureCall(request);
+   *   // Do something.
+   *   for (Secret element : future.get().iterateAll()) {
+   *     // doThingsWith(element);
+   *   }
+   * }
+   * }
+ */ + public final UnaryCallable + listSecretsPagedCallable() { + return stub.listSecretsPagedCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Lists [Secrets][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   ListSecretsRequest request =
+   *       ListSecretsRequest.newBuilder()
+   *           .setParent(ProjectName.of("[PROJECT]").toString())
+   *           .setPageSize(883849137)
+   *           .setPageToken("pageToken873572522")
+   *           .build();
+   *   while (true) {
+   *     ListSecretsResponse response =
+   *         secretManagerServiceClient.listSecretsCallable().call(request);
+   *     for (Secret element : response.getSecretsList()) {
+   *       // doThingsWith(element);
+   *     }
+   *     String nextPageToken = response.getNextPageToken();
+   *     if (!Strings.isNullOrEmpty(nextPageToken)) {
+   *       request = request.toBuilder().setPageToken(nextPageToken).build();
+   *     } else {
+   *       break;
+   *     }
+   *   }
+   * }
+   * }
+ */ + public final UnaryCallable listSecretsCallable() { + return stub.listSecretsCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no + * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   ProjectName parent = ProjectName.of("[PROJECT]");
+   *   String secretId = "secretId945974251";
+   *   Secret secret = Secret.newBuilder().build();
+   *   Secret response = secretManagerServiceClient.createSecret(parent, secretId, secret);
+   * }
+   * }
+ * + * @param parent Required. The resource name of the project to associate with the + * [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`. + * @param secretId Required. This must be unique within the project. + *

A secret ID is a string with a maximum length of 255 characters and can contain + * uppercase and lowercase letters, numerals, and the hyphen (`-`) and underscore (`_`) + * characters. + * @param secret Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field + * values. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final Secret createSecret(ProjectName parent, String secretId, Secret secret) { + CreateSecretRequest request = + CreateSecretRequest.newBuilder() + .setParent(parent == null ? null : parent.toString()) + .setSecretId(secretId) + .setSecret(secret) + .build(); + return createSecret(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no + * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   String parent = ProjectName.of("[PROJECT]").toString();
+   *   String secretId = "secretId945974251";
+   *   Secret secret = Secret.newBuilder().build();
+   *   Secret response = secretManagerServiceClient.createSecret(parent, secretId, secret);
+   * }
+   * }
+ * + * @param parent Required. The resource name of the project to associate with the + * [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`. + * @param secretId Required. This must be unique within the project. + *

A secret ID is a string with a maximum length of 255 characters and can contain + * uppercase and lowercase letters, numerals, and the hyphen (`-`) and underscore (`_`) + * characters. + * @param secret Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field + * values. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final Secret createSecret(String parent, String secretId, Secret secret) { + CreateSecretRequest request = + CreateSecretRequest.newBuilder() + .setParent(parent) + .setSecretId(secretId) + .setSecret(secret) + .build(); + return createSecret(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no + * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   CreateSecretRequest request =
+   *       CreateSecretRequest.newBuilder()
+   *           .setParent(ProjectName.of("[PROJECT]").toString())
+   *           .setSecretId("secretId945974251")
+   *           .setSecret(Secret.newBuilder().build())
+   *           .build();
+   *   Secret response = secretManagerServiceClient.createSecret(request);
+   * }
+   * }
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final Secret createSecret(CreateSecretRequest request) { + return createSecretCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no + * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   CreateSecretRequest request =
+   *       CreateSecretRequest.newBuilder()
+   *           .setParent(ProjectName.of("[PROJECT]").toString())
+   *           .setSecretId("secretId945974251")
+   *           .setSecret(Secret.newBuilder().build())
+   *           .build();
+   *   ApiFuture future =
+   *       secretManagerServiceClient.createSecretCallable().futureCall(request);
+   *   // Do something.
+   *   Secret response = future.get();
+   * }
+   * }
+ */ + public final UnaryCallable createSecretCallable() { + return stub.createSecretCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret + * data and attaches it to an existing [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   SecretName parent = SecretName.of("[PROJECT]", "[SECRET]");
+   *   SecretPayload payload = SecretPayload.newBuilder().build();
+   *   SecretVersion response = secretManagerServiceClient.addSecretVersion(parent, payload);
+   * }
+   * }
+ * + * @param parent Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] + * to associate with the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the + * format `projects/*/secrets/*`. + * @param payload Required. The secret payload of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion addSecretVersion(SecretName parent, SecretPayload payload) { + AddSecretVersionRequest request = + AddSecretVersionRequest.newBuilder() + .setParent(parent == null ? null : parent.toString()) + .setPayload(payload) + .build(); + return addSecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret + * data and attaches it to an existing [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   String parent = SecretName.of("[PROJECT]", "[SECRET]").toString();
+   *   SecretPayload payload = SecretPayload.newBuilder().build();
+   *   SecretVersion response = secretManagerServiceClient.addSecretVersion(parent, payload);
+   * }
+   * }
+ * + * @param parent Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] + * to associate with the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the + * format `projects/*/secrets/*`. + * @param payload Required. The secret payload of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion addSecretVersion(String parent, SecretPayload payload) { + AddSecretVersionRequest request = + AddSecretVersionRequest.newBuilder().setParent(parent).setPayload(payload).build(); + return addSecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret + * data and attaches it to an existing [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   AddSecretVersionRequest request =
+   *       AddSecretVersionRequest.newBuilder()
+   *           .setParent(SecretName.of("[PROJECT]", "[SECRET]").toString())
+   *           .setPayload(SecretPayload.newBuilder().build())
+   *           .build();
+   *   SecretVersion response = secretManagerServiceClient.addSecretVersion(request);
+   * }
+   * }
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion addSecretVersion(AddSecretVersionRequest request) { + return addSecretVersionCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret + * data and attaches it to an existing [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   AddSecretVersionRequest request =
+   *       AddSecretVersionRequest.newBuilder()
+   *           .setParent(SecretName.of("[PROJECT]", "[SECRET]").toString())
+   *           .setPayload(SecretPayload.newBuilder().build())
+   *           .build();
+   *   ApiFuture future =
+   *       secretManagerServiceClient.addSecretVersionCallable().futureCall(request);
+   *   // Do something.
+   *   SecretVersion response = future.get();
+   * }
+   * }
+ */ + public final UnaryCallable addSecretVersionCallable() { + return stub.addSecretVersionCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   SecretName name = SecretName.of("[PROJECT]", "[SECRET]");
+   *   Secret response = secretManagerServiceClient.getSecret(name);
+   * }
+   * }
+ * + * @param name Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], + * in the format `projects/*/secrets/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final Secret getSecret(SecretName name) { + GetSecretRequest request = + GetSecretRequest.newBuilder().setName(name == null ? null : name.toString()).build(); + return getSecret(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   String name = SecretName.of("[PROJECT]", "[SECRET]").toString();
+   *   Secret response = secretManagerServiceClient.getSecret(name);
+   * }
+   * }
+ * + * @param name Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], + * in the format `projects/*/secrets/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final Secret getSecret(String name) { + GetSecretRequest request = GetSecretRequest.newBuilder().setName(name).build(); + return getSecret(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   GetSecretRequest request =
+   *       GetSecretRequest.newBuilder()
+   *           .setName(SecretName.of("[PROJECT]", "[SECRET]").toString())
+   *           .build();
+   *   Secret response = secretManagerServiceClient.getSecret(request);
+   * }
+   * }
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final Secret getSecret(GetSecretRequest request) { + return getSecretCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   GetSecretRequest request =
+   *       GetSecretRequest.newBuilder()
+   *           .setName(SecretName.of("[PROJECT]", "[SECRET]").toString())
+   *           .build();
+   *   ApiFuture future = secretManagerServiceClient.getSecretCallable().futureCall(request);
+   *   // Do something.
+   *   Secret response = future.get();
+   * }
+   * }
+ */ + public final UnaryCallable getSecretCallable() { + return stub.getSecretCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   Secret secret = Secret.newBuilder().build();
+   *   FieldMask updateMask = FieldMask.newBuilder().build();
+   *   Secret response = secretManagerServiceClient.updateSecret(secret, updateMask);
+   * }
+   * }
+ * + * @param secret Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field + * values. + * @param updateMask Required. Specifies the fields to be updated. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final Secret updateSecret(Secret secret, FieldMask updateMask) { + UpdateSecretRequest request = + UpdateSecretRequest.newBuilder().setSecret(secret).setUpdateMask(updateMask).build(); + return updateSecret(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   UpdateSecretRequest request =
+   *       UpdateSecretRequest.newBuilder()
+   *           .setSecret(Secret.newBuilder().build())
+   *           .setUpdateMask(FieldMask.newBuilder().build())
+   *           .build();
+   *   Secret response = secretManagerServiceClient.updateSecret(request);
+   * }
+   * }
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final Secret updateSecret(UpdateSecretRequest request) { + return updateSecretCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   UpdateSecretRequest request =
+   *       UpdateSecretRequest.newBuilder()
+   *           .setSecret(Secret.newBuilder().build())
+   *           .setUpdateMask(FieldMask.newBuilder().build())
+   *           .build();
+   *   ApiFuture future =
+   *       secretManagerServiceClient.updateSecretCallable().futureCall(request);
+   *   // Do something.
+   *   Secret response = future.get();
+   * }
+   * }
+ */ + public final UnaryCallable updateSecretCallable() { + return stub.updateSecretCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Deletes a [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   SecretName name = SecretName.of("[PROJECT]", "[SECRET]");
+   *   secretManagerServiceClient.deleteSecret(name);
+   * }
+   * }
+ * + * @param name Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to + * delete in the format `projects/*/secrets/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final void deleteSecret(SecretName name) { + DeleteSecretRequest request = + DeleteSecretRequest.newBuilder().setName(name == null ? null : name.toString()).build(); + deleteSecret(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Deletes a [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   String name = SecretName.of("[PROJECT]", "[SECRET]").toString();
+   *   secretManagerServiceClient.deleteSecret(name);
+   * }
+   * }
+ * + * @param name Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to + * delete in the format `projects/*/secrets/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final void deleteSecret(String name) { + DeleteSecretRequest request = DeleteSecretRequest.newBuilder().setName(name).build(); + deleteSecret(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Deletes a [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   DeleteSecretRequest request =
+   *       DeleteSecretRequest.newBuilder()
+   *           .setName(SecretName.of("[PROJECT]", "[SECRET]").toString())
+   *           .build();
+   *   secretManagerServiceClient.deleteSecret(request);
+   * }
+   * }
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final void deleteSecret(DeleteSecretRequest request) { + deleteSecretCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Deletes a [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   DeleteSecretRequest request =
+   *       DeleteSecretRequest.newBuilder()
+   *           .setName(SecretName.of("[PROJECT]", "[SECRET]").toString())
+   *           .build();
+   *   ApiFuture future =
+   *       secretManagerServiceClient.deleteSecretCallable().futureCall(request);
+   *   // Do something.
+   *   future.get();
+   * }
+   * }
+ */ + public final UnaryCallable deleteSecretCallable() { + return stub.deleteSecretCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return + * secret data. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   SecretName parent = SecretName.of("[PROJECT]", "[SECRET]");
+   *   for (SecretVersion element :
+   *       secretManagerServiceClient.listSecretVersions(parent).iterateAll()) {
+   *     // doThingsWith(element);
+   *   }
+   * }
+   * }
+ * + * @param parent Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] + * associated with the [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, + * in the format `projects/*/secrets/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final ListSecretVersionsPagedResponse listSecretVersions(SecretName parent) { + ListSecretVersionsRequest request = + ListSecretVersionsRequest.newBuilder() + .setParent(parent == null ? null : parent.toString()) + .build(); + return listSecretVersions(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return + * secret data. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   String parent = SecretName.of("[PROJECT]", "[SECRET]").toString();
+   *   for (SecretVersion element :
+   *       secretManagerServiceClient.listSecretVersions(parent).iterateAll()) {
+   *     // doThingsWith(element);
+   *   }
+   * }
+   * }
+ * + * @param parent Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] + * associated with the [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, + * in the format `projects/*/secrets/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final ListSecretVersionsPagedResponse listSecretVersions(String parent) { + ListSecretVersionsRequest request = + ListSecretVersionsRequest.newBuilder().setParent(parent).build(); + return listSecretVersions(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return + * secret data. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   ListSecretVersionsRequest request =
+   *       ListSecretVersionsRequest.newBuilder()
+   *           .setParent(SecretName.of("[PROJECT]", "[SECRET]").toString())
+   *           .setPageSize(883849137)
+   *           .setPageToken("pageToken873572522")
+   *           .build();
+   *   for (SecretVersion element :
+   *       secretManagerServiceClient.listSecretVersions(request).iterateAll()) {
+   *     // doThingsWith(element);
+   *   }
+   * }
+   * }
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final ListSecretVersionsPagedResponse listSecretVersions( + ListSecretVersionsRequest request) { + return listSecretVersionsPagedCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return + * secret data. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   ListSecretVersionsRequest request =
+   *       ListSecretVersionsRequest.newBuilder()
+   *           .setParent(SecretName.of("[PROJECT]", "[SECRET]").toString())
+   *           .setPageSize(883849137)
+   *           .setPageToken("pageToken873572522")
+   *           .build();
+   *   ApiFuture future =
+   *       secretManagerServiceClient.listSecretVersionsPagedCallable().futureCall(request);
+   *   // Do something.
+   *   for (SecretVersion element : future.get().iterateAll()) {
+   *     // doThingsWith(element);
+   *   }
+   * }
+   * }
+ */ + public final UnaryCallable + listSecretVersionsPagedCallable() { + return stub.listSecretVersionsPagedCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return + * secret data. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   ListSecretVersionsRequest request =
+   *       ListSecretVersionsRequest.newBuilder()
+   *           .setParent(SecretName.of("[PROJECT]", "[SECRET]").toString())
+   *           .setPageSize(883849137)
+   *           .setPageToken("pageToken873572522")
+   *           .build();
+   *   while (true) {
+   *     ListSecretVersionsResponse response =
+   *         secretManagerServiceClient.listSecretVersionsCallable().call(request);
+   *     for (SecretVersion element : response.getVersionsList()) {
+   *       // doThingsWith(element);
+   *     }
+   *     String nextPageToken = response.getNextPageToken();
+   *     if (!Strings.isNullOrEmpty(nextPageToken)) {
+   *       request = request.toBuilder().setPageToken(nextPageToken).build();
+   *     } else {
+   *       break;
+   *     }
+   *   }
+   * }
+   * }
+ */ + public final UnaryCallable + listSecretVersionsCallable() { + return stub.listSecretVersionsCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

`projects/*/secrets/*/versions/latest` is an alias to the `latest` + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   SecretVersion response = secretManagerServiceClient.getSecretVersion(name);
+   * }
+   * }
+ * + * @param name Required. The resource name of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format + * `projects/*/secrets/*/versions/*`. + * `projects/*/secrets/*/versions/latest` is an alias to the `latest` + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion getSecretVersion(SecretVersionName name) { + GetSecretVersionRequest request = + GetSecretVersionRequest.newBuilder().setName(name == null ? null : name.toString()).build(); + return getSecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

`projects/*/secrets/*/versions/latest` is an alias to the `latest` + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   String name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString();
+   *   SecretVersion response = secretManagerServiceClient.getSecretVersion(name);
+   * }
+   * }
+ * + * @param name Required. The resource name of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format + * `projects/*/secrets/*/versions/*`. + * `projects/*/secrets/*/versions/latest` is an alias to the `latest` + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion getSecretVersion(String name) { + GetSecretVersionRequest request = GetSecretVersionRequest.newBuilder().setName(name).build(); + return getSecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

`projects/*/secrets/*/versions/latest` is an alias to the `latest` + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   GetSecretVersionRequest request =
+   *       GetSecretVersionRequest.newBuilder()
+   *           .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString())
+   *           .build();
+   *   SecretVersion response = secretManagerServiceClient.getSecretVersion(request);
+   * }
+   * }
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion getSecretVersion(GetSecretVersionRequest request) { + return getSecretVersionCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

`projects/*/secrets/*/versions/latest` is an alias to the `latest` + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   GetSecretVersionRequest request =
+   *       GetSecretVersionRequest.newBuilder()
+   *           .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString())
+   *           .build();
+   *   ApiFuture future =
+   *       secretManagerServiceClient.getSecretVersionCallable().futureCall(request);
+   *   // Do something.
+   *   SecretVersion response = future.get();
+   * }
+   * }
+ */ + public final UnaryCallable getSecretVersionCallable() { + return stub.getSecretVersionCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the + * secret data. + * + *

`projects/*/secrets/*/versions/latest` is an alias to the `latest` + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   AccessSecretVersionResponse response = secretManagerServiceClient.accessSecretVersion(name);
+   * }
+   * }
+ * + * @param name Required. The resource name of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format + * `projects/*/secrets/*/versions/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final AccessSecretVersionResponse accessSecretVersion(SecretVersionName name) { + AccessSecretVersionRequest request = + AccessSecretVersionRequest.newBuilder() + .setName(name == null ? null : name.toString()) + .build(); + return accessSecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the + * secret data. + * + *

`projects/*/secrets/*/versions/latest` is an alias to the `latest` + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   String name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString();
+   *   AccessSecretVersionResponse response = secretManagerServiceClient.accessSecretVersion(name);
+   * }
+   * }
+ * + * @param name Required. The resource name of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format + * `projects/*/secrets/*/versions/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final AccessSecretVersionResponse accessSecretVersion(String name) { + AccessSecretVersionRequest request = + AccessSecretVersionRequest.newBuilder().setName(name).build(); + return accessSecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the + * secret data. + * + *

`projects/*/secrets/*/versions/latest` is an alias to the `latest` + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   AccessSecretVersionRequest request =
+   *       AccessSecretVersionRequest.newBuilder()
+   *           .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString())
+   *           .build();
+   *   AccessSecretVersionResponse response =
+   *       secretManagerServiceClient.accessSecretVersion(request);
+   * }
+   * }
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final AccessSecretVersionResponse accessSecretVersion(AccessSecretVersionRequest request) { + return accessSecretVersionCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the + * secret data. + * + *

`projects/*/secrets/*/versions/latest` is an alias to the `latest` + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   AccessSecretVersionRequest request =
+   *       AccessSecretVersionRequest.newBuilder()
+   *           .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString())
+   *           .build();
+   *   ApiFuture future =
+   *       secretManagerServiceClient.accessSecretVersionCallable().futureCall(request);
+   *   // Do something.
+   *   AccessSecretVersionResponse response = future.get();
+   * }
+   * }
+ */ + public final UnaryCallable + accessSecretVersionCallable() { + return stub.accessSecretVersionCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   SecretVersion response = secretManagerServiceClient.disableSecretVersion(name);
+   * }
+   * }
+ * + * @param name Required. The resource name of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format + * `projects/*/secrets/*/versions/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion disableSecretVersion(SecretVersionName name) { + DisableSecretVersionRequest request = + DisableSecretVersionRequest.newBuilder() + .setName(name == null ? null : name.toString()) + .build(); + return disableSecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   String name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString();
+   *   SecretVersion response = secretManagerServiceClient.disableSecretVersion(name);
+   * }
+   * }
+ * + * @param name Required. The resource name of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format + * `projects/*/secrets/*/versions/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion disableSecretVersion(String name) { + DisableSecretVersionRequest request = + DisableSecretVersionRequest.newBuilder().setName(name).build(); + return disableSecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   DisableSecretVersionRequest request =
+   *       DisableSecretVersionRequest.newBuilder()
+   *           .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString())
+   *           .build();
+   *   SecretVersion response = secretManagerServiceClient.disableSecretVersion(request);
+   * }
+   * }
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion disableSecretVersion(DisableSecretVersionRequest request) { + return disableSecretVersionCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   DisableSecretVersionRequest request =
+   *       DisableSecretVersionRequest.newBuilder()
+   *           .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString())
+   *           .build();
+   *   ApiFuture future =
+   *       secretManagerServiceClient.disableSecretVersionCallable().futureCall(request);
+   *   // Do something.
+   *   SecretVersion response = future.get();
+   * }
+   * }
+ */ + public final UnaryCallable + disableSecretVersionCallable() { + return stub.disableSecretVersionCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   SecretVersion response = secretManagerServiceClient.enableSecretVersion(name);
+   * }
+   * }
+ * + * @param name Required. The resource name of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format + * `projects/*/secrets/*/versions/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion enableSecretVersion(SecretVersionName name) { + EnableSecretVersionRequest request = + EnableSecretVersionRequest.newBuilder() + .setName(name == null ? null : name.toString()) + .build(); + return enableSecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   String name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString();
+   *   SecretVersion response = secretManagerServiceClient.enableSecretVersion(name);
+   * }
+   * }
+ * + * @param name Required. The resource name of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format + * `projects/*/secrets/*/versions/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion enableSecretVersion(String name) { + EnableSecretVersionRequest request = + EnableSecretVersionRequest.newBuilder().setName(name).build(); + return enableSecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   EnableSecretVersionRequest request =
+   *       EnableSecretVersionRequest.newBuilder()
+   *           .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString())
+   *           .build();
+   *   SecretVersion response = secretManagerServiceClient.enableSecretVersion(request);
+   * }
+   * }
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion enableSecretVersion(EnableSecretVersionRequest request) { + return enableSecretVersionCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   EnableSecretVersionRequest request =
+   *       EnableSecretVersionRequest.newBuilder()
+   *           .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString())
+   *           .build();
+   *   ApiFuture future =
+   *       secretManagerServiceClient.enableSecretVersionCallable().futureCall(request);
+   *   // Do something.
+   *   SecretVersion response = future.get();
+   * }
+   * }
+ */ + public final UnaryCallable + enableSecretVersionCallable() { + return stub.enableSecretVersionCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably + * destroys the secret data. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]");
+   *   SecretVersion response = secretManagerServiceClient.destroySecretVersion(name);
+   * }
+   * }
+ * + * @param name Required. The resource name of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format + * `projects/*/secrets/*/versions/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion destroySecretVersion(SecretVersionName name) { + DestroySecretVersionRequest request = + DestroySecretVersionRequest.newBuilder() + .setName(name == null ? null : name.toString()) + .build(); + return destroySecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably + * destroys the secret data. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   String name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString();
+   *   SecretVersion response = secretManagerServiceClient.destroySecretVersion(name);
+   * }
+   * }
+ * + * @param name Required. The resource name of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format + * `projects/*/secrets/*/versions/*`. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion destroySecretVersion(String name) { + DestroySecretVersionRequest request = + DestroySecretVersionRequest.newBuilder().setName(name).build(); + return destroySecretVersion(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably + * destroys the secret data. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   DestroySecretVersionRequest request =
+   *       DestroySecretVersionRequest.newBuilder()
+   *           .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString())
+   *           .build();
+   *   SecretVersion response = secretManagerServiceClient.destroySecretVersion(request);
+   * }
+   * }
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final SecretVersion destroySecretVersion(DestroySecretVersionRequest request) { + return destroySecretVersionCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + * + *

Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the + * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably + * destroys the secret data. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   DestroySecretVersionRequest request =
+   *       DestroySecretVersionRequest.newBuilder()
+   *           .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString())
+   *           .build();
+   *   ApiFuture future =
+   *       secretManagerServiceClient.destroySecretVersionCallable().futureCall(request);
+   *   // Do something.
+   *   SecretVersion response = future.get();
+   * }
+   * }
+ */ + public final UnaryCallable + destroySecretVersionCallable() { + return stub.destroySecretVersionCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Sets the access control policy on the specified secret. Replaces any existing policy. + * + *

Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced + * according to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   SetIamPolicyRequest request =
+   *       SetIamPolicyRequest.newBuilder()
+   *           .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString())
+   *           .setPolicy(Policy.newBuilder().build())
+   *           .setUpdateMask(FieldMask.newBuilder().build())
+   *           .build();
+   *   Policy response = secretManagerServiceClient.setIamPolicy(request);
+   * }
+   * }
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final Policy setIamPolicy(SetIamPolicyRequest request) { + return setIamPolicyCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Sets the access control policy on the specified secret. Replaces any existing policy. + * + *

Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced + * according to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret]. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   SetIamPolicyRequest request =
+   *       SetIamPolicyRequest.newBuilder()
+   *           .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString())
+   *           .setPolicy(Policy.newBuilder().build())
+   *           .setUpdateMask(FieldMask.newBuilder().build())
+   *           .build();
+   *   ApiFuture future =
+   *       secretManagerServiceClient.setIamPolicyCallable().futureCall(request);
+   *   // Do something.
+   *   Policy response = future.get();
+   * }
+   * }
+ */ + public final UnaryCallable setIamPolicyCallable() { + return stub.setIamPolicyCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Gets the access control policy for a secret. Returns empty policy if the secret exists and does + * not have a policy set. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   GetIamPolicyRequest request =
+   *       GetIamPolicyRequest.newBuilder()
+   *           .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString())
+   *           .setOptions(GetPolicyOptions.newBuilder().build())
+   *           .build();
+   *   Policy response = secretManagerServiceClient.getIamPolicy(request);
+   * }
+   * }
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final Policy getIamPolicy(GetIamPolicyRequest request) { + return getIamPolicyCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Gets the access control policy for a secret. Returns empty policy if the secret exists and does + * not have a policy set. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   GetIamPolicyRequest request =
+   *       GetIamPolicyRequest.newBuilder()
+   *           .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString())
+   *           .setOptions(GetPolicyOptions.newBuilder().build())
+   *           .build();
+   *   ApiFuture future =
+   *       secretManagerServiceClient.getIamPolicyCallable().futureCall(request);
+   *   // Do something.
+   *   Policy response = future.get();
+   * }
+   * }
+ */ + public final UnaryCallable getIamPolicyCallable() { + return stub.getIamPolicyCallable(); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Returns permissions that a caller has for the specified secret. If the secret does not exist, + * this call returns an empty set of permissions, not a NOT_FOUND error. + * + *

Note: This operation is designed to be used for building permission-aware UIs and + * command-line tools, not for authorization checking. This operation may "fail open" without + * warning. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   TestIamPermissionsRequest request =
+   *       TestIamPermissionsRequest.newBuilder()
+   *           .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString())
+   *           .addAllPermissions(new ArrayList())
+   *           .build();
+   *   TestIamPermissionsResponse response = secretManagerServiceClient.testIamPermissions(request);
+   * }
+   * }
+ * + * @param request The request object containing all of the parameters for the API call. + * @throws com.google.api.gax.rpc.ApiException if the remote call fails + */ + public final TestIamPermissionsResponse testIamPermissions(TestIamPermissionsRequest request) { + return testIamPermissionsCallable().call(request); + } + + // AUTO-GENERATED DOCUMENTATION AND METHOD. + /** + * Returns permissions that a caller has for the specified secret. If the secret does not exist, + * this call returns an empty set of permissions, not a NOT_FOUND error. + * + *

Note: This operation is designed to be used for building permission-aware UIs and + * command-line tools, not for authorization checking. This operation may "fail open" without + * warning. + * + *

Sample code: + * + *

{@code
+   * // This snippet has been automatically generated and should be regarded as a code template only.
+   * // It will require modifications to work:
+   * // - It may require correct/in-range values for request initialization.
+   * // - It may require specifying regional endpoints when creating the service client as shown in
+   * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+   * try (SecretManagerServiceClient secretManagerServiceClient =
+   *     SecretManagerServiceClient.create()) {
+   *   TestIamPermissionsRequest request =
+   *       TestIamPermissionsRequest.newBuilder()
+   *           .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString())
+   *           .addAllPermissions(new ArrayList())
+   *           .build();
+   *   ApiFuture future =
+   *       secretManagerServiceClient.testIamPermissionsCallable().futureCall(request);
+   *   // Do something.
+   *   TestIamPermissionsResponse response = future.get();
+   * }
+   * }
+ */ + public final UnaryCallable + testIamPermissionsCallable() { + return stub.testIamPermissionsCallable(); + } + + @Override + public final void close() { + stub.close(); + } + + @Override + public void shutdown() { + stub.shutdown(); + } + + @Override + public boolean isShutdown() { + return stub.isShutdown(); + } + + @Override + public boolean isTerminated() { + return stub.isTerminated(); + } + + @Override + public void shutdownNow() { + stub.shutdownNow(); + } + + @Override + public boolean awaitTermination(long duration, TimeUnit unit) throws InterruptedException { + return stub.awaitTermination(duration, unit); + } + + public static class ListSecretsPagedResponse + extends AbstractPagedListResponse< + ListSecretsRequest, + ListSecretsResponse, + Secret, + ListSecretsPage, + ListSecretsFixedSizeCollection> { + + public static ApiFuture createAsync( + PageContext context, + ApiFuture futureResponse) { + ApiFuture futurePage = + ListSecretsPage.createEmptyPage().createPageAsync(context, futureResponse); + return ApiFutures.transform( + futurePage, input -> new ListSecretsPagedResponse(input), MoreExecutors.directExecutor()); + } + + private ListSecretsPagedResponse(ListSecretsPage page) { + super(page, ListSecretsFixedSizeCollection.createEmptyCollection()); + } + } + + public static class ListSecretsPage + extends AbstractPage { + + private ListSecretsPage( + PageContext context, + ListSecretsResponse response) { + super(context, response); + } + + private static ListSecretsPage createEmptyPage() { + return new ListSecretsPage(null, null); + } + + @Override + protected ListSecretsPage createPage( + PageContext context, + ListSecretsResponse response) { + return new ListSecretsPage(context, response); + } + + @Override + public ApiFuture createPageAsync( + PageContext context, + ApiFuture futureResponse) { + return super.createPageAsync(context, futureResponse); + } + } + + public static class ListSecretsFixedSizeCollection + extends AbstractFixedSizeCollection< + ListSecretsRequest, + ListSecretsResponse, + Secret, + ListSecretsPage, + ListSecretsFixedSizeCollection> { + + private ListSecretsFixedSizeCollection(List pages, int collectionSize) { + super(pages, collectionSize); + } + + private static ListSecretsFixedSizeCollection createEmptyCollection() { + return new ListSecretsFixedSizeCollection(null, 0); + } + + @Override + protected ListSecretsFixedSizeCollection createCollection( + List pages, int collectionSize) { + return new ListSecretsFixedSizeCollection(pages, collectionSize); + } + } + + public static class ListSecretVersionsPagedResponse + extends AbstractPagedListResponse< + ListSecretVersionsRequest, + ListSecretVersionsResponse, + SecretVersion, + ListSecretVersionsPage, + ListSecretVersionsFixedSizeCollection> { + + public static ApiFuture createAsync( + PageContext context, + ApiFuture futureResponse) { + ApiFuture futurePage = + ListSecretVersionsPage.createEmptyPage().createPageAsync(context, futureResponse); + return ApiFutures.transform( + futurePage, + input -> new ListSecretVersionsPagedResponse(input), + MoreExecutors.directExecutor()); + } + + private ListSecretVersionsPagedResponse(ListSecretVersionsPage page) { + super(page, ListSecretVersionsFixedSizeCollection.createEmptyCollection()); + } + } + + public static class ListSecretVersionsPage + extends AbstractPage< + ListSecretVersionsRequest, + ListSecretVersionsResponse, + SecretVersion, + ListSecretVersionsPage> { + + private ListSecretVersionsPage( + PageContext context, + ListSecretVersionsResponse response) { + super(context, response); + } + + private static ListSecretVersionsPage createEmptyPage() { + return new ListSecretVersionsPage(null, null); + } + + @Override + protected ListSecretVersionsPage createPage( + PageContext context, + ListSecretVersionsResponse response) { + return new ListSecretVersionsPage(context, response); + } + + @Override + public ApiFuture createPageAsync( + PageContext context, + ApiFuture futureResponse) { + return super.createPageAsync(context, futureResponse); + } + } + + public static class ListSecretVersionsFixedSizeCollection + extends AbstractFixedSizeCollection< + ListSecretVersionsRequest, + ListSecretVersionsResponse, + SecretVersion, + ListSecretVersionsPage, + ListSecretVersionsFixedSizeCollection> { + + private ListSecretVersionsFixedSizeCollection( + List pages, int collectionSize) { + super(pages, collectionSize); + } + + private static ListSecretVersionsFixedSizeCollection createEmptyCollection() { + return new ListSecretVersionsFixedSizeCollection(null, 0); + } + + @Override + protected ListSecretVersionsFixedSizeCollection createCollection( + List pages, int collectionSize) { + return new ListSecretVersionsFixedSizeCollection(pages, collectionSize); + } + } +} diff --git a/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceSettings.java b/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceSettings.java new file mode 100644 index 000000000000..e04a127798fc --- /dev/null +++ b/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceSettings.java @@ -0,0 +1,387 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1; + +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretVersionsPagedResponse; +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretsPagedResponse; + +import com.google.api.core.ApiFunction; +import com.google.api.core.BetaApi; +import com.google.api.gax.core.GoogleCredentialsProvider; +import com.google.api.gax.core.InstantiatingExecutorProvider; +import com.google.api.gax.grpc.InstantiatingGrpcChannelProvider; +import com.google.api.gax.httpjson.InstantiatingHttpJsonChannelProvider; +import com.google.api.gax.rpc.ApiClientHeaderProvider; +import com.google.api.gax.rpc.ClientContext; +import com.google.api.gax.rpc.ClientSettings; +import com.google.api.gax.rpc.PagedCallSettings; +import com.google.api.gax.rpc.TransportChannelProvider; +import com.google.api.gax.rpc.UnaryCallSettings; +import com.google.cloud.secretmanager.v1beta1.stub.SecretManagerServiceStubSettings; +import com.google.iam.v1.GetIamPolicyRequest; +import com.google.iam.v1.Policy; +import com.google.iam.v1.SetIamPolicyRequest; +import com.google.iam.v1.TestIamPermissionsRequest; +import com.google.iam.v1.TestIamPermissionsResponse; +import com.google.protobuf.Empty; +import java.io.IOException; +import java.util.List; +import javax.annotation.Generated; + +// AUTO-GENERATED DOCUMENTATION AND CLASS. +/** + * Settings class to configure an instance of {@link SecretManagerServiceClient}. + * + *

The default instance has everything set to sensible defaults: + * + *

    + *
  • The default service address (secretmanager.googleapis.com) and default port (443) are used. + *
  • Credentials are acquired automatically through Application Default Credentials. + *
  • Retries are configured for idempotent methods but not for non-idempotent methods. + *
+ * + *

The builder of this class is recursive, so contained classes are themselves builders. When + * build() is called, the tree of builders is called to create the complete settings object. + * + *

For example, to set the + * [RetrySettings](https://cloud.google.com/java/docs/reference/gax/latest/com.google.api.gax.retrying.RetrySettings) + * of createSecret: + * + *

{@code
+ * // This snippet has been automatically generated and should be regarded as a code template only.
+ * // It will require modifications to work:
+ * // - It may require correct/in-range values for request initialization.
+ * // - It may require specifying regional endpoints when creating the service client as shown in
+ * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+ * SecretManagerServiceSettings.Builder secretManagerServiceSettingsBuilder =
+ *     SecretManagerServiceSettings.newBuilder();
+ * secretManagerServiceSettingsBuilder
+ *     .createSecretSettings()
+ *     .setRetrySettings(
+ *         secretManagerServiceSettingsBuilder
+ *             .createSecretSettings()
+ *             .getRetrySettings()
+ *             .toBuilder()
+ *             .setInitialRetryDelayDuration(Duration.ofSeconds(1))
+ *             .setInitialRpcTimeoutDuration(Duration.ofSeconds(5))
+ *             .setMaxAttempts(5)
+ *             .setMaxRetryDelayDuration(Duration.ofSeconds(30))
+ *             .setMaxRpcTimeoutDuration(Duration.ofSeconds(60))
+ *             .setRetryDelayMultiplier(1.3)
+ *             .setRpcTimeoutMultiplier(1.5)
+ *             .setTotalTimeoutDuration(Duration.ofSeconds(300))
+ *             .build());
+ * SecretManagerServiceSettings secretManagerServiceSettings =
+ *     secretManagerServiceSettingsBuilder.build();
+ * }
+ * + * Please refer to the [Client Side Retry + * Guide](https://github.com/googleapis/google-cloud-java/blob/main/docs/client_retries.md) for + * additional support in setting retries. + */ +@BetaApi +@Generated("by gapic-generator-java") +public class SecretManagerServiceSettings extends ClientSettings { + + /** Returns the object with the settings used for calls to listSecrets. */ + public PagedCallSettings + listSecretsSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).listSecretsSettings(); + } + + /** Returns the object with the settings used for calls to createSecret. */ + public UnaryCallSettings createSecretSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).createSecretSettings(); + } + + /** Returns the object with the settings used for calls to addSecretVersion. */ + public UnaryCallSettings addSecretVersionSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).addSecretVersionSettings(); + } + + /** Returns the object with the settings used for calls to getSecret. */ + public UnaryCallSettings getSecretSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).getSecretSettings(); + } + + /** Returns the object with the settings used for calls to updateSecret. */ + public UnaryCallSettings updateSecretSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).updateSecretSettings(); + } + + /** Returns the object with the settings used for calls to deleteSecret. */ + public UnaryCallSettings deleteSecretSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).deleteSecretSettings(); + } + + /** Returns the object with the settings used for calls to listSecretVersions. */ + public PagedCallSettings< + ListSecretVersionsRequest, ListSecretVersionsResponse, ListSecretVersionsPagedResponse> + listSecretVersionsSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).listSecretVersionsSettings(); + } + + /** Returns the object with the settings used for calls to getSecretVersion. */ + public UnaryCallSettings getSecretVersionSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).getSecretVersionSettings(); + } + + /** Returns the object with the settings used for calls to accessSecretVersion. */ + public UnaryCallSettings + accessSecretVersionSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).accessSecretVersionSettings(); + } + + /** Returns the object with the settings used for calls to disableSecretVersion. */ + public UnaryCallSettings + disableSecretVersionSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).disableSecretVersionSettings(); + } + + /** Returns the object with the settings used for calls to enableSecretVersion. */ + public UnaryCallSettings + enableSecretVersionSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).enableSecretVersionSettings(); + } + + /** Returns the object with the settings used for calls to destroySecretVersion. */ + public UnaryCallSettings + destroySecretVersionSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).destroySecretVersionSettings(); + } + + /** Returns the object with the settings used for calls to setIamPolicy. */ + public UnaryCallSettings setIamPolicySettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).setIamPolicySettings(); + } + + /** Returns the object with the settings used for calls to getIamPolicy. */ + public UnaryCallSettings getIamPolicySettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).getIamPolicySettings(); + } + + /** Returns the object with the settings used for calls to testIamPermissions. */ + public UnaryCallSettings + testIamPermissionsSettings() { + return ((SecretManagerServiceStubSettings) getStubSettings()).testIamPermissionsSettings(); + } + + public static final SecretManagerServiceSettings create(SecretManagerServiceStubSettings stub) + throws IOException { + return new SecretManagerServiceSettings.Builder(stub.toBuilder()).build(); + } + + /** Returns a builder for the default ExecutorProvider for this service. */ + public static InstantiatingExecutorProvider.Builder defaultExecutorProviderBuilder() { + return SecretManagerServiceStubSettings.defaultExecutorProviderBuilder(); + } + + /** Returns the default service endpoint. */ + public static String getDefaultEndpoint() { + return SecretManagerServiceStubSettings.getDefaultEndpoint(); + } + + /** Returns the default service scopes. */ + public static List getDefaultServiceScopes() { + return SecretManagerServiceStubSettings.getDefaultServiceScopes(); + } + + /** Returns a builder for the default credentials for this service. */ + public static GoogleCredentialsProvider.Builder defaultCredentialsProviderBuilder() { + return SecretManagerServiceStubSettings.defaultCredentialsProviderBuilder(); + } + + /** Returns a builder for the default gRPC ChannelProvider for this service. */ + public static InstantiatingGrpcChannelProvider.Builder defaultGrpcTransportProviderBuilder() { + return SecretManagerServiceStubSettings.defaultGrpcTransportProviderBuilder(); + } + + /** Returns a builder for the default REST ChannelProvider for this service. */ + @BetaApi + public static InstantiatingHttpJsonChannelProvider.Builder + defaultHttpJsonTransportProviderBuilder() { + return SecretManagerServiceStubSettings.defaultHttpJsonTransportProviderBuilder(); + } + + public static TransportChannelProvider defaultTransportChannelProvider() { + return SecretManagerServiceStubSettings.defaultTransportChannelProvider(); + } + + public static ApiClientHeaderProvider.Builder defaultApiClientHeaderProviderBuilder() { + return SecretManagerServiceStubSettings.defaultApiClientHeaderProviderBuilder(); + } + + /** Returns a new gRPC builder for this class. */ + public static Builder newBuilder() { + return Builder.createDefault(); + } + + /** Returns a new REST builder for this class. */ + public static Builder newHttpJsonBuilder() { + return Builder.createHttpJsonDefault(); + } + + /** Returns a new builder for this class. */ + public static Builder newBuilder(ClientContext clientContext) { + return new Builder(clientContext); + } + + /** Returns a builder containing all the values of this settings class. */ + public Builder toBuilder() { + return new Builder(this); + } + + protected SecretManagerServiceSettings(Builder settingsBuilder) throws IOException { + super(settingsBuilder); + } + + /** Builder for SecretManagerServiceSettings. */ + public static class Builder + extends ClientSettings.Builder { + + protected Builder() throws IOException { + this(((ClientContext) null)); + } + + protected Builder(ClientContext clientContext) { + super(SecretManagerServiceStubSettings.newBuilder(clientContext)); + } + + protected Builder(SecretManagerServiceSettings settings) { + super(settings.getStubSettings().toBuilder()); + } + + protected Builder(SecretManagerServiceStubSettings.Builder stubSettings) { + super(stubSettings); + } + + private static Builder createDefault() { + return new Builder(SecretManagerServiceStubSettings.newBuilder()); + } + + private static Builder createHttpJsonDefault() { + return new Builder(SecretManagerServiceStubSettings.newHttpJsonBuilder()); + } + + public SecretManagerServiceStubSettings.Builder getStubSettingsBuilder() { + return ((SecretManagerServiceStubSettings.Builder) getStubSettings()); + } + + /** + * Applies the given settings updater function to all of the unary API methods in this service. + * + *

Note: This method does not support applying settings to streaming methods. + */ + public Builder applyToAllUnaryMethods( + ApiFunction, Void> settingsUpdater) { + super.applyToAllUnaryMethods( + getStubSettingsBuilder().unaryMethodSettingsBuilders(), settingsUpdater); + return this; + } + + /** Returns the builder for the settings used for calls to listSecrets. */ + public PagedCallSettings.Builder< + ListSecretsRequest, ListSecretsResponse, ListSecretsPagedResponse> + listSecretsSettings() { + return getStubSettingsBuilder().listSecretsSettings(); + } + + /** Returns the builder for the settings used for calls to createSecret. */ + public UnaryCallSettings.Builder createSecretSettings() { + return getStubSettingsBuilder().createSecretSettings(); + } + + /** Returns the builder for the settings used for calls to addSecretVersion. */ + public UnaryCallSettings.Builder + addSecretVersionSettings() { + return getStubSettingsBuilder().addSecretVersionSettings(); + } + + /** Returns the builder for the settings used for calls to getSecret. */ + public UnaryCallSettings.Builder getSecretSettings() { + return getStubSettingsBuilder().getSecretSettings(); + } + + /** Returns the builder for the settings used for calls to updateSecret. */ + public UnaryCallSettings.Builder updateSecretSettings() { + return getStubSettingsBuilder().updateSecretSettings(); + } + + /** Returns the builder for the settings used for calls to deleteSecret. */ + public UnaryCallSettings.Builder deleteSecretSettings() { + return getStubSettingsBuilder().deleteSecretSettings(); + } + + /** Returns the builder for the settings used for calls to listSecretVersions. */ + public PagedCallSettings.Builder< + ListSecretVersionsRequest, ListSecretVersionsResponse, ListSecretVersionsPagedResponse> + listSecretVersionsSettings() { + return getStubSettingsBuilder().listSecretVersionsSettings(); + } + + /** Returns the builder for the settings used for calls to getSecretVersion. */ + public UnaryCallSettings.Builder + getSecretVersionSettings() { + return getStubSettingsBuilder().getSecretVersionSettings(); + } + + /** Returns the builder for the settings used for calls to accessSecretVersion. */ + public UnaryCallSettings.Builder + accessSecretVersionSettings() { + return getStubSettingsBuilder().accessSecretVersionSettings(); + } + + /** Returns the builder for the settings used for calls to disableSecretVersion. */ + public UnaryCallSettings.Builder + disableSecretVersionSettings() { + return getStubSettingsBuilder().disableSecretVersionSettings(); + } + + /** Returns the builder for the settings used for calls to enableSecretVersion. */ + public UnaryCallSettings.Builder + enableSecretVersionSettings() { + return getStubSettingsBuilder().enableSecretVersionSettings(); + } + + /** Returns the builder for the settings used for calls to destroySecretVersion. */ + public UnaryCallSettings.Builder + destroySecretVersionSettings() { + return getStubSettingsBuilder().destroySecretVersionSettings(); + } + + /** Returns the builder for the settings used for calls to setIamPolicy. */ + public UnaryCallSettings.Builder setIamPolicySettings() { + return getStubSettingsBuilder().setIamPolicySettings(); + } + + /** Returns the builder for the settings used for calls to getIamPolicy. */ + public UnaryCallSettings.Builder getIamPolicySettings() { + return getStubSettingsBuilder().getIamPolicySettings(); + } + + /** Returns the builder for the settings used for calls to testIamPermissions. */ + public UnaryCallSettings.Builder + testIamPermissionsSettings() { + return getStubSettingsBuilder().testIamPermissionsSettings(); + } + + @Override + public SecretManagerServiceSettings build() throws IOException { + return new SecretManagerServiceSettings(this); + } + } +} diff --git a/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/gapic_metadata.json b/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/gapic_metadata.json new file mode 100644 index 000000000000..94fbac7cfd5e --- /dev/null +++ b/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/gapic_metadata.json @@ -0,0 +1,63 @@ +{ + "schema": "1.0", + "comment": "This file maps proto services/RPCs to the corresponding library clients/methods", + "language": "java", + "protoPackage": "google.cloud.secrets.v1beta1", + "libraryPackage": "com.google.cloud.secretmanager.v1beta1", + "services": { + "SecretManagerService": { + "clients": { + "grpc": { + "libraryClient": "SecretManagerServiceClient", + "rpcs": { + "AccessSecretVersion": { + "methods": ["accessSecretVersion", "accessSecretVersion", "accessSecretVersion", "accessSecretVersionCallable"] + }, + "AddSecretVersion": { + "methods": ["addSecretVersion", "addSecretVersion", "addSecretVersion", "addSecretVersionCallable"] + }, + "CreateSecret": { + "methods": ["createSecret", "createSecret", "createSecret", "createSecretCallable"] + }, + "DeleteSecret": { + "methods": ["deleteSecret", "deleteSecret", "deleteSecret", "deleteSecretCallable"] + }, + "DestroySecretVersion": { + "methods": ["destroySecretVersion", "destroySecretVersion", "destroySecretVersion", "destroySecretVersionCallable"] + }, + "DisableSecretVersion": { + "methods": ["disableSecretVersion", "disableSecretVersion", "disableSecretVersion", "disableSecretVersionCallable"] + }, + "EnableSecretVersion": { + "methods": ["enableSecretVersion", "enableSecretVersion", "enableSecretVersion", "enableSecretVersionCallable"] + }, + "GetIamPolicy": { + "methods": ["getIamPolicy", "getIamPolicyCallable"] + }, + "GetSecret": { + "methods": ["getSecret", "getSecret", "getSecret", "getSecretCallable"] + }, + "GetSecretVersion": { + "methods": ["getSecretVersion", "getSecretVersion", "getSecretVersion", "getSecretVersionCallable"] + }, + "ListSecretVersions": { + "methods": ["listSecretVersions", "listSecretVersions", "listSecretVersions", "listSecretVersionsPagedCallable", "listSecretVersionsCallable"] + }, + "ListSecrets": { + "methods": ["listSecrets", "listSecrets", "listSecrets", "listSecretsPagedCallable", "listSecretsCallable"] + }, + "SetIamPolicy": { + "methods": ["setIamPolicy", "setIamPolicyCallable"] + }, + "TestIamPermissions": { + "methods": ["testIamPermissions", "testIamPermissionsCallable"] + }, + "UpdateSecret": { + "methods": ["updateSecret", "updateSecret", "updateSecretCallable"] + } + } + } + } + } + } +} \ No newline at end of file diff --git a/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/package-info.java b/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/package-info.java new file mode 100644 index 000000000000..ac046ea5d33e --- /dev/null +++ b/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/package-info.java @@ -0,0 +1,54 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +/** + * A client to Secret Manager API + * + *

The interfaces provided are listed below, along with usage samples. + * + *

======================= SecretManagerServiceClient ======================= + * + *

Service Description: Secret Manager Service + * + *

Manages secrets and operations using those secrets. Implements a REST model with the following + * objects: + * + *

    + *
  • [Secret][google.cloud.secrets.v1beta1.Secret] + *
  • [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] + *
+ * + *

Sample for SecretManagerServiceClient: + * + *

{@code
+ * // This snippet has been automatically generated and should be regarded as a code template only.
+ * // It will require modifications to work:
+ * // - It may require correct/in-range values for request initialization.
+ * // - It may require specifying regional endpoints when creating the service client as shown in
+ * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+ * try (SecretManagerServiceClient secretManagerServiceClient =
+ *     SecretManagerServiceClient.create()) {
+ *   ProjectName parent = ProjectName.of("[PROJECT]");
+ *   String secretId = "secretId945974251";
+ *   Secret secret = Secret.newBuilder().build();
+ *   Secret response = secretManagerServiceClient.createSecret(parent, secretId, secret);
+ * }
+ * }
+ */ +@Generated("by gapic-generator-java") +package com.google.cloud.secretmanager.v1beta1; + +import javax.annotation.Generated; diff --git a/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/GrpcSecretManagerServiceCallableFactory.java b/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/GrpcSecretManagerServiceCallableFactory.java new file mode 100644 index 000000000000..7924eefaf2ff --- /dev/null +++ b/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/GrpcSecretManagerServiceCallableFactory.java @@ -0,0 +1,115 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.stub; + +import com.google.api.core.BetaApi; +import com.google.api.gax.grpc.GrpcCallSettings; +import com.google.api.gax.grpc.GrpcCallableFactory; +import com.google.api.gax.grpc.GrpcStubCallableFactory; +import com.google.api.gax.rpc.BatchingCallSettings; +import com.google.api.gax.rpc.BidiStreamingCallable; +import com.google.api.gax.rpc.ClientContext; +import com.google.api.gax.rpc.ClientStreamingCallable; +import com.google.api.gax.rpc.OperationCallSettings; +import com.google.api.gax.rpc.OperationCallable; +import com.google.api.gax.rpc.PagedCallSettings; +import com.google.api.gax.rpc.ServerStreamingCallSettings; +import com.google.api.gax.rpc.ServerStreamingCallable; +import com.google.api.gax.rpc.StreamingCallSettings; +import com.google.api.gax.rpc.UnaryCallSettings; +import com.google.api.gax.rpc.UnaryCallable; +import com.google.longrunning.Operation; +import com.google.longrunning.stub.OperationsStub; +import javax.annotation.Generated; + +// AUTO-GENERATED DOCUMENTATION AND CLASS. +/** + * gRPC callable factory implementation for the SecretManagerService service API. + * + *

This class is for advanced usage. + */ +@BetaApi +@Generated("by gapic-generator-java") +public class GrpcSecretManagerServiceCallableFactory implements GrpcStubCallableFactory { + + @Override + public UnaryCallable createUnaryCallable( + GrpcCallSettings grpcCallSettings, + UnaryCallSettings callSettings, + ClientContext clientContext) { + return GrpcCallableFactory.createUnaryCallable(grpcCallSettings, callSettings, clientContext); + } + + @Override + public + UnaryCallable createPagedCallable( + GrpcCallSettings grpcCallSettings, + PagedCallSettings callSettings, + ClientContext clientContext) { + return GrpcCallableFactory.createPagedCallable(grpcCallSettings, callSettings, clientContext); + } + + @Override + public UnaryCallable createBatchingCallable( + GrpcCallSettings grpcCallSettings, + BatchingCallSettings callSettings, + ClientContext clientContext) { + return GrpcCallableFactory.createBatchingCallable( + grpcCallSettings, callSettings, clientContext); + } + + @Override + public + OperationCallable createOperationCallable( + GrpcCallSettings grpcCallSettings, + OperationCallSettings callSettings, + ClientContext clientContext, + OperationsStub operationsStub) { + return GrpcCallableFactory.createOperationCallable( + grpcCallSettings, callSettings, clientContext, operationsStub); + } + + @Override + public + BidiStreamingCallable createBidiStreamingCallable( + GrpcCallSettings grpcCallSettings, + StreamingCallSettings callSettings, + ClientContext clientContext) { + return GrpcCallableFactory.createBidiStreamingCallable( + grpcCallSettings, callSettings, clientContext); + } + + @Override + public + ServerStreamingCallable createServerStreamingCallable( + GrpcCallSettings grpcCallSettings, + ServerStreamingCallSettings callSettings, + ClientContext clientContext) { + return GrpcCallableFactory.createServerStreamingCallable( + grpcCallSettings, callSettings, clientContext); + } + + @Override + public + ClientStreamingCallable createClientStreamingCallable( + GrpcCallSettings grpcCallSettings, + StreamingCallSettings callSettings, + ClientContext clientContext) { + return GrpcCallableFactory.createClientStreamingCallable( + grpcCallSettings, callSettings, clientContext); + } +} diff --git a/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/GrpcSecretManagerServiceStub.java b/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/GrpcSecretManagerServiceStub.java new file mode 100644 index 000000000000..803d2d252908 --- /dev/null +++ b/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/GrpcSecretManagerServiceStub.java @@ -0,0 +1,643 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.stub; + +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretVersionsPagedResponse; +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretsPagedResponse; + +import com.google.api.core.BetaApi; +import com.google.api.gax.core.BackgroundResource; +import com.google.api.gax.core.BackgroundResourceAggregation; +import com.google.api.gax.grpc.GrpcCallSettings; +import com.google.api.gax.grpc.GrpcStubCallableFactory; +import com.google.api.gax.rpc.ClientContext; +import com.google.api.gax.rpc.RequestParamsBuilder; +import com.google.api.gax.rpc.UnaryCallable; +import com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse; +import com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.CreateSecretRequest; +import com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest; +import com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.GetSecretRequest; +import com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest; +import com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse; +import com.google.cloud.secretmanager.v1beta1.ListSecretsRequest; +import com.google.cloud.secretmanager.v1beta1.ListSecretsResponse; +import com.google.cloud.secretmanager.v1beta1.Secret; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; +import com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest; +import com.google.iam.v1.GetIamPolicyRequest; +import com.google.iam.v1.Policy; +import com.google.iam.v1.SetIamPolicyRequest; +import com.google.iam.v1.TestIamPermissionsRequest; +import com.google.iam.v1.TestIamPermissionsResponse; +import com.google.longrunning.stub.GrpcOperationsStub; +import com.google.protobuf.Empty; +import io.grpc.MethodDescriptor; +import io.grpc.protobuf.ProtoUtils; +import java.io.IOException; +import java.util.concurrent.TimeUnit; +import javax.annotation.Generated; + +// AUTO-GENERATED DOCUMENTATION AND CLASS. +/** + * gRPC stub implementation for the SecretManagerService service API. + * + *

This class is for advanced usage and reflects the underlying API directly. + */ +@BetaApi +@Generated("by gapic-generator-java") +public class GrpcSecretManagerServiceStub extends SecretManagerServiceStub { + private static final MethodDescriptor + listSecretsMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName("google.cloud.secrets.v1beta1.SecretManagerService/ListSecrets") + .setRequestMarshaller(ProtoUtils.marshaller(ListSecretsRequest.getDefaultInstance())) + .setResponseMarshaller( + ProtoUtils.marshaller(ListSecretsResponse.getDefaultInstance())) + .build(); + + private static final MethodDescriptor createSecretMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName("google.cloud.secrets.v1beta1.SecretManagerService/CreateSecret") + .setRequestMarshaller(ProtoUtils.marshaller(CreateSecretRequest.getDefaultInstance())) + .setResponseMarshaller(ProtoUtils.marshaller(Secret.getDefaultInstance())) + .build(); + + private static final MethodDescriptor + addSecretVersionMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/AddSecretVersion") + .setRequestMarshaller( + ProtoUtils.marshaller(AddSecretVersionRequest.getDefaultInstance())) + .setResponseMarshaller(ProtoUtils.marshaller(SecretVersion.getDefaultInstance())) + .build(); + + private static final MethodDescriptor getSecretMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName("google.cloud.secrets.v1beta1.SecretManagerService/GetSecret") + .setRequestMarshaller(ProtoUtils.marshaller(GetSecretRequest.getDefaultInstance())) + .setResponseMarshaller(ProtoUtils.marshaller(Secret.getDefaultInstance())) + .build(); + + private static final MethodDescriptor updateSecretMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName("google.cloud.secrets.v1beta1.SecretManagerService/UpdateSecret") + .setRequestMarshaller(ProtoUtils.marshaller(UpdateSecretRequest.getDefaultInstance())) + .setResponseMarshaller(ProtoUtils.marshaller(Secret.getDefaultInstance())) + .build(); + + private static final MethodDescriptor deleteSecretMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName("google.cloud.secrets.v1beta1.SecretManagerService/DeleteSecret") + .setRequestMarshaller(ProtoUtils.marshaller(DeleteSecretRequest.getDefaultInstance())) + .setResponseMarshaller(ProtoUtils.marshaller(Empty.getDefaultInstance())) + .build(); + + private static final MethodDescriptor + listSecretVersionsMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/ListSecretVersions") + .setRequestMarshaller( + ProtoUtils.marshaller(ListSecretVersionsRequest.getDefaultInstance())) + .setResponseMarshaller( + ProtoUtils.marshaller(ListSecretVersionsResponse.getDefaultInstance())) + .build(); + + private static final MethodDescriptor + getSecretVersionMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/GetSecretVersion") + .setRequestMarshaller( + ProtoUtils.marshaller(GetSecretVersionRequest.getDefaultInstance())) + .setResponseMarshaller(ProtoUtils.marshaller(SecretVersion.getDefaultInstance())) + .build(); + + private static final MethodDescriptor + accessSecretVersionMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/AccessSecretVersion") + .setRequestMarshaller( + ProtoUtils.marshaller(AccessSecretVersionRequest.getDefaultInstance())) + .setResponseMarshaller( + ProtoUtils.marshaller(AccessSecretVersionResponse.getDefaultInstance())) + .build(); + + private static final MethodDescriptor + disableSecretVersionMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/DisableSecretVersion") + .setRequestMarshaller( + ProtoUtils.marshaller(DisableSecretVersionRequest.getDefaultInstance())) + .setResponseMarshaller(ProtoUtils.marshaller(SecretVersion.getDefaultInstance())) + .build(); + + private static final MethodDescriptor + enableSecretVersionMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/EnableSecretVersion") + .setRequestMarshaller( + ProtoUtils.marshaller(EnableSecretVersionRequest.getDefaultInstance())) + .setResponseMarshaller(ProtoUtils.marshaller(SecretVersion.getDefaultInstance())) + .build(); + + private static final MethodDescriptor + destroySecretVersionMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/DestroySecretVersion") + .setRequestMarshaller( + ProtoUtils.marshaller(DestroySecretVersionRequest.getDefaultInstance())) + .setResponseMarshaller(ProtoUtils.marshaller(SecretVersion.getDefaultInstance())) + .build(); + + private static final MethodDescriptor setIamPolicyMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName("google.cloud.secrets.v1beta1.SecretManagerService/SetIamPolicy") + .setRequestMarshaller(ProtoUtils.marshaller(SetIamPolicyRequest.getDefaultInstance())) + .setResponseMarshaller(ProtoUtils.marshaller(Policy.getDefaultInstance())) + .build(); + + private static final MethodDescriptor getIamPolicyMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName("google.cloud.secrets.v1beta1.SecretManagerService/GetIamPolicy") + .setRequestMarshaller(ProtoUtils.marshaller(GetIamPolicyRequest.getDefaultInstance())) + .setResponseMarshaller(ProtoUtils.marshaller(Policy.getDefaultInstance())) + .build(); + + private static final MethodDescriptor + testIamPermissionsMethodDescriptor = + MethodDescriptor.newBuilder() + .setType(MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/TestIamPermissions") + .setRequestMarshaller( + ProtoUtils.marshaller(TestIamPermissionsRequest.getDefaultInstance())) + .setResponseMarshaller( + ProtoUtils.marshaller(TestIamPermissionsResponse.getDefaultInstance())) + .build(); + + private final UnaryCallable listSecretsCallable; + private final UnaryCallable + listSecretsPagedCallable; + private final UnaryCallable createSecretCallable; + private final UnaryCallable addSecretVersionCallable; + private final UnaryCallable getSecretCallable; + private final UnaryCallable updateSecretCallable; + private final UnaryCallable deleteSecretCallable; + private final UnaryCallable + listSecretVersionsCallable; + private final UnaryCallable + listSecretVersionsPagedCallable; + private final UnaryCallable getSecretVersionCallable; + private final UnaryCallable + accessSecretVersionCallable; + private final UnaryCallable + disableSecretVersionCallable; + private final UnaryCallable + enableSecretVersionCallable; + private final UnaryCallable + destroySecretVersionCallable; + private final UnaryCallable setIamPolicyCallable; + private final UnaryCallable getIamPolicyCallable; + private final UnaryCallable + testIamPermissionsCallable; + + private final BackgroundResource backgroundResources; + private final GrpcOperationsStub operationsStub; + private final GrpcStubCallableFactory callableFactory; + + public static final GrpcSecretManagerServiceStub create(SecretManagerServiceStubSettings settings) + throws IOException { + return new GrpcSecretManagerServiceStub(settings, ClientContext.create(settings)); + } + + public static final GrpcSecretManagerServiceStub create(ClientContext clientContext) + throws IOException { + return new GrpcSecretManagerServiceStub( + SecretManagerServiceStubSettings.newBuilder().build(), clientContext); + } + + public static final GrpcSecretManagerServiceStub create( + ClientContext clientContext, GrpcStubCallableFactory callableFactory) throws IOException { + return new GrpcSecretManagerServiceStub( + SecretManagerServiceStubSettings.newBuilder().build(), clientContext, callableFactory); + } + + /** + * Constructs an instance of GrpcSecretManagerServiceStub, using the given settings. This is + * protected so that it is easy to make a subclass, but otherwise, the static factory methods + * should be preferred. + */ + protected GrpcSecretManagerServiceStub( + SecretManagerServiceStubSettings settings, ClientContext clientContext) throws IOException { + this(settings, clientContext, new GrpcSecretManagerServiceCallableFactory()); + } + + /** + * Constructs an instance of GrpcSecretManagerServiceStub, using the given settings. This is + * protected so that it is easy to make a subclass, but otherwise, the static factory methods + * should be preferred. + */ + protected GrpcSecretManagerServiceStub( + SecretManagerServiceStubSettings settings, + ClientContext clientContext, + GrpcStubCallableFactory callableFactory) + throws IOException { + this.callableFactory = callableFactory; + this.operationsStub = GrpcOperationsStub.create(clientContext, callableFactory); + + GrpcCallSettings listSecretsTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(listSecretsMethodDescriptor) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("parent", String.valueOf(request.getParent())); + return builder.build(); + }) + .build(); + GrpcCallSettings createSecretTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(createSecretMethodDescriptor) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("parent", String.valueOf(request.getParent())); + return builder.build(); + }) + .build(); + GrpcCallSettings addSecretVersionTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(addSecretVersionMethodDescriptor) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("parent", String.valueOf(request.getParent())); + return builder.build(); + }) + .build(); + GrpcCallSettings getSecretTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(getSecretMethodDescriptor) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("name", String.valueOf(request.getName())); + return builder.build(); + }) + .build(); + GrpcCallSettings updateSecretTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(updateSecretMethodDescriptor) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("secret.name", String.valueOf(request.getSecret().getName())); + return builder.build(); + }) + .build(); + GrpcCallSettings deleteSecretTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(deleteSecretMethodDescriptor) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("name", String.valueOf(request.getName())); + return builder.build(); + }) + .build(); + GrpcCallSettings + listSecretVersionsTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(listSecretVersionsMethodDescriptor) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("parent", String.valueOf(request.getParent())); + return builder.build(); + }) + .build(); + GrpcCallSettings getSecretVersionTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(getSecretVersionMethodDescriptor) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("name", String.valueOf(request.getName())); + return builder.build(); + }) + .build(); + GrpcCallSettings + accessSecretVersionTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(accessSecretVersionMethodDescriptor) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("name", String.valueOf(request.getName())); + return builder.build(); + }) + .build(); + GrpcCallSettings + disableSecretVersionTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(disableSecretVersionMethodDescriptor) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("name", String.valueOf(request.getName())); + return builder.build(); + }) + .build(); + GrpcCallSettings + enableSecretVersionTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(enableSecretVersionMethodDescriptor) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("name", String.valueOf(request.getName())); + return builder.build(); + }) + .build(); + GrpcCallSettings + destroySecretVersionTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(destroySecretVersionMethodDescriptor) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("name", String.valueOf(request.getName())); + return builder.build(); + }) + .build(); + GrpcCallSettings setIamPolicyTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(setIamPolicyMethodDescriptor) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("resource", String.valueOf(request.getResource())); + return builder.build(); + }) + .build(); + GrpcCallSettings getIamPolicyTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(getIamPolicyMethodDescriptor) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("resource", String.valueOf(request.getResource())); + return builder.build(); + }) + .build(); + GrpcCallSettings + testIamPermissionsTransportSettings = + GrpcCallSettings.newBuilder() + .setMethodDescriptor(testIamPermissionsMethodDescriptor) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("resource", String.valueOf(request.getResource())); + return builder.build(); + }) + .build(); + + this.listSecretsCallable = + callableFactory.createUnaryCallable( + listSecretsTransportSettings, settings.listSecretsSettings(), clientContext); + this.listSecretsPagedCallable = + callableFactory.createPagedCallable( + listSecretsTransportSettings, settings.listSecretsSettings(), clientContext); + this.createSecretCallable = + callableFactory.createUnaryCallable( + createSecretTransportSettings, settings.createSecretSettings(), clientContext); + this.addSecretVersionCallable = + callableFactory.createUnaryCallable( + addSecretVersionTransportSettings, settings.addSecretVersionSettings(), clientContext); + this.getSecretCallable = + callableFactory.createUnaryCallable( + getSecretTransportSettings, settings.getSecretSettings(), clientContext); + this.updateSecretCallable = + callableFactory.createUnaryCallable( + updateSecretTransportSettings, settings.updateSecretSettings(), clientContext); + this.deleteSecretCallable = + callableFactory.createUnaryCallable( + deleteSecretTransportSettings, settings.deleteSecretSettings(), clientContext); + this.listSecretVersionsCallable = + callableFactory.createUnaryCallable( + listSecretVersionsTransportSettings, + settings.listSecretVersionsSettings(), + clientContext); + this.listSecretVersionsPagedCallable = + callableFactory.createPagedCallable( + listSecretVersionsTransportSettings, + settings.listSecretVersionsSettings(), + clientContext); + this.getSecretVersionCallable = + callableFactory.createUnaryCallable( + getSecretVersionTransportSettings, settings.getSecretVersionSettings(), clientContext); + this.accessSecretVersionCallable = + callableFactory.createUnaryCallable( + accessSecretVersionTransportSettings, + settings.accessSecretVersionSettings(), + clientContext); + this.disableSecretVersionCallable = + callableFactory.createUnaryCallable( + disableSecretVersionTransportSettings, + settings.disableSecretVersionSettings(), + clientContext); + this.enableSecretVersionCallable = + callableFactory.createUnaryCallable( + enableSecretVersionTransportSettings, + settings.enableSecretVersionSettings(), + clientContext); + this.destroySecretVersionCallable = + callableFactory.createUnaryCallable( + destroySecretVersionTransportSettings, + settings.destroySecretVersionSettings(), + clientContext); + this.setIamPolicyCallable = + callableFactory.createUnaryCallable( + setIamPolicyTransportSettings, settings.setIamPolicySettings(), clientContext); + this.getIamPolicyCallable = + callableFactory.createUnaryCallable( + getIamPolicyTransportSettings, settings.getIamPolicySettings(), clientContext); + this.testIamPermissionsCallable = + callableFactory.createUnaryCallable( + testIamPermissionsTransportSettings, + settings.testIamPermissionsSettings(), + clientContext); + + this.backgroundResources = + new BackgroundResourceAggregation(clientContext.getBackgroundResources()); + } + + public GrpcOperationsStub getOperationsStub() { + return operationsStub; + } + + @Override + public UnaryCallable listSecretsCallable() { + return listSecretsCallable; + } + + @Override + public UnaryCallable listSecretsPagedCallable() { + return listSecretsPagedCallable; + } + + @Override + public UnaryCallable createSecretCallable() { + return createSecretCallable; + } + + @Override + public UnaryCallable addSecretVersionCallable() { + return addSecretVersionCallable; + } + + @Override + public UnaryCallable getSecretCallable() { + return getSecretCallable; + } + + @Override + public UnaryCallable updateSecretCallable() { + return updateSecretCallable; + } + + @Override + public UnaryCallable deleteSecretCallable() { + return deleteSecretCallable; + } + + @Override + public UnaryCallable + listSecretVersionsCallable() { + return listSecretVersionsCallable; + } + + @Override + public UnaryCallable + listSecretVersionsPagedCallable() { + return listSecretVersionsPagedCallable; + } + + @Override + public UnaryCallable getSecretVersionCallable() { + return getSecretVersionCallable; + } + + @Override + public UnaryCallable + accessSecretVersionCallable() { + return accessSecretVersionCallable; + } + + @Override + public UnaryCallable disableSecretVersionCallable() { + return disableSecretVersionCallable; + } + + @Override + public UnaryCallable enableSecretVersionCallable() { + return enableSecretVersionCallable; + } + + @Override + public UnaryCallable destroySecretVersionCallable() { + return destroySecretVersionCallable; + } + + @Override + public UnaryCallable setIamPolicyCallable() { + return setIamPolicyCallable; + } + + @Override + public UnaryCallable getIamPolicyCallable() { + return getIamPolicyCallable; + } + + @Override + public UnaryCallable + testIamPermissionsCallable() { + return testIamPermissionsCallable; + } + + @Override + public final void close() { + try { + backgroundResources.close(); + } catch (RuntimeException e) { + throw e; + } catch (Exception e) { + throw new IllegalStateException("Failed to close resource", e); + } + } + + @Override + public void shutdown() { + backgroundResources.shutdown(); + } + + @Override + public boolean isShutdown() { + return backgroundResources.isShutdown(); + } + + @Override + public boolean isTerminated() { + return backgroundResources.isTerminated(); + } + + @Override + public void shutdownNow() { + backgroundResources.shutdownNow(); + } + + @Override + public boolean awaitTermination(long duration, TimeUnit unit) throws InterruptedException { + return backgroundResources.awaitTermination(duration, unit); + } +} diff --git a/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/HttpJsonSecretManagerServiceCallableFactory.java b/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/HttpJsonSecretManagerServiceCallableFactory.java new file mode 100644 index 000000000000..0a5d52e4ef92 --- /dev/null +++ b/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/HttpJsonSecretManagerServiceCallableFactory.java @@ -0,0 +1,103 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.stub; + +import com.google.api.core.BetaApi; +import com.google.api.gax.httpjson.HttpJsonCallSettings; +import com.google.api.gax.httpjson.HttpJsonCallableFactory; +import com.google.api.gax.httpjson.HttpJsonOperationSnapshotCallable; +import com.google.api.gax.httpjson.HttpJsonStubCallableFactory; +import com.google.api.gax.httpjson.longrunning.stub.OperationsStub; +import com.google.api.gax.rpc.BatchingCallSettings; +import com.google.api.gax.rpc.ClientContext; +import com.google.api.gax.rpc.OperationCallSettings; +import com.google.api.gax.rpc.OperationCallable; +import com.google.api.gax.rpc.PagedCallSettings; +import com.google.api.gax.rpc.ServerStreamingCallSettings; +import com.google.api.gax.rpc.ServerStreamingCallable; +import com.google.api.gax.rpc.UnaryCallSettings; +import com.google.api.gax.rpc.UnaryCallable; +import com.google.longrunning.Operation; +import javax.annotation.Generated; + +// AUTO-GENERATED DOCUMENTATION AND CLASS. +/** + * REST callable factory implementation for the SecretManagerService service API. + * + *

This class is for advanced usage. + */ +@BetaApi +@Generated("by gapic-generator-java") +public class HttpJsonSecretManagerServiceCallableFactory + implements HttpJsonStubCallableFactory { + + @Override + public UnaryCallable createUnaryCallable( + HttpJsonCallSettings httpJsonCallSettings, + UnaryCallSettings callSettings, + ClientContext clientContext) { + return HttpJsonCallableFactory.createUnaryCallable( + httpJsonCallSettings, callSettings, clientContext); + } + + @Override + public + UnaryCallable createPagedCallable( + HttpJsonCallSettings httpJsonCallSettings, + PagedCallSettings callSettings, + ClientContext clientContext) { + return HttpJsonCallableFactory.createPagedCallable( + httpJsonCallSettings, callSettings, clientContext); + } + + @Override + public UnaryCallable createBatchingCallable( + HttpJsonCallSettings httpJsonCallSettings, + BatchingCallSettings callSettings, + ClientContext clientContext) { + return HttpJsonCallableFactory.createBatchingCallable( + httpJsonCallSettings, callSettings, clientContext); + } + + @Override + public + OperationCallable createOperationCallable( + HttpJsonCallSettings httpJsonCallSettings, + OperationCallSettings callSettings, + ClientContext clientContext, + OperationsStub operationsStub) { + UnaryCallable innerCallable = + HttpJsonCallableFactory.createBaseUnaryCallable( + httpJsonCallSettings, callSettings.getInitialCallSettings(), clientContext); + HttpJsonOperationSnapshotCallable initialCallable = + new HttpJsonOperationSnapshotCallable( + innerCallable, + httpJsonCallSettings.getMethodDescriptor().getOperationSnapshotFactory()); + return HttpJsonCallableFactory.createOperationCallable( + callSettings, clientContext, operationsStub.longRunningClient(), initialCallable); + } + + @Override + public + ServerStreamingCallable createServerStreamingCallable( + HttpJsonCallSettings httpJsonCallSettings, + ServerStreamingCallSettings callSettings, + ClientContext clientContext) { + return HttpJsonCallableFactory.createServerStreamingCallable( + httpJsonCallSettings, callSettings, clientContext); + } +} diff --git a/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/HttpJsonSecretManagerServiceStub.java b/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/HttpJsonSecretManagerServiceStub.java new file mode 100644 index 000000000000..e4dd36e9177a --- /dev/null +++ b/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/HttpJsonSecretManagerServiceStub.java @@ -0,0 +1,1085 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.stub; + +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretVersionsPagedResponse; +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretsPagedResponse; + +import com.google.api.core.BetaApi; +import com.google.api.core.InternalApi; +import com.google.api.gax.core.BackgroundResource; +import com.google.api.gax.core.BackgroundResourceAggregation; +import com.google.api.gax.httpjson.ApiMethodDescriptor; +import com.google.api.gax.httpjson.HttpJsonCallSettings; +import com.google.api.gax.httpjson.HttpJsonStubCallableFactory; +import com.google.api.gax.httpjson.ProtoMessageRequestFormatter; +import com.google.api.gax.httpjson.ProtoMessageResponseParser; +import com.google.api.gax.httpjson.ProtoRestSerializer; +import com.google.api.gax.rpc.ClientContext; +import com.google.api.gax.rpc.RequestParamsBuilder; +import com.google.api.gax.rpc.UnaryCallable; +import com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse; +import com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.CreateSecretRequest; +import com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest; +import com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.GetSecretRequest; +import com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest; +import com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse; +import com.google.cloud.secretmanager.v1beta1.ListSecretsRequest; +import com.google.cloud.secretmanager.v1beta1.ListSecretsResponse; +import com.google.cloud.secretmanager.v1beta1.Secret; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; +import com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest; +import com.google.iam.v1.GetIamPolicyRequest; +import com.google.iam.v1.Policy; +import com.google.iam.v1.SetIamPolicyRequest; +import com.google.iam.v1.TestIamPermissionsRequest; +import com.google.iam.v1.TestIamPermissionsResponse; +import com.google.protobuf.Empty; +import com.google.protobuf.TypeRegistry; +import java.io.IOException; +import java.util.ArrayList; +import java.util.HashMap; +import java.util.List; +import java.util.Map; +import java.util.concurrent.TimeUnit; +import javax.annotation.Generated; + +// AUTO-GENERATED DOCUMENTATION AND CLASS. +/** + * REST stub implementation for the SecretManagerService service API. + * + *

This class is for advanced usage and reflects the underlying API directly. + */ +@BetaApi +@Generated("by gapic-generator-java") +public class HttpJsonSecretManagerServiceStub extends SecretManagerServiceStub { + private static final TypeRegistry typeRegistry = TypeRegistry.newBuilder().build(); + + private static final ApiMethodDescriptor + listSecretsMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName("google.cloud.secrets.v1beta1.SecretManagerService/ListSecrets") + .setHttpMethod("GET") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1beta1/{parent=projects/*}/secrets", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "parent", request.getParent()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putQueryParam(fields, "pageSize", request.getPageSize()); + serializer.putQueryParam(fields, "pageToken", request.getPageToken()); + serializer.putQueryParam(fields, "$alt", "json;enum-encoding=int"); + return fields; + }) + .setRequestBodyExtractor(request -> null) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(ListSecretsResponse.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + createSecretMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName("google.cloud.secrets.v1beta1.SecretManagerService/CreateSecret") + .setHttpMethod("POST") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1beta1/{parent=projects/*}/secrets", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "parent", request.getParent()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putQueryParam(fields, "secretId", request.getSecretId()); + serializer.putQueryParam(fields, "$alt", "json;enum-encoding=int"); + return fields; + }) + .setRequestBodyExtractor( + request -> + ProtoRestSerializer.create() + .toBody("secret", request.getSecret(), true)) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(Secret.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + addSecretVersionMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/AddSecretVersion") + .setHttpMethod("POST") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1beta1/{parent=projects/*/secrets/*}:addVersion", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "parent", request.getParent()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putQueryParam(fields, "$alt", "json;enum-encoding=int"); + return fields; + }) + .setRequestBodyExtractor( + request -> + ProtoRestSerializer.create() + .toBody("*", request.toBuilder().clearParent().build(), true)) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(SecretVersion.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor getSecretMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName("google.cloud.secrets.v1beta1.SecretManagerService/GetSecret") + .setHttpMethod("GET") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1beta1/{name=projects/*/secrets/*}", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "name", request.getName()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putQueryParam(fields, "$alt", "json;enum-encoding=int"); + return fields; + }) + .setRequestBodyExtractor(request -> null) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(Secret.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + updateSecretMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName("google.cloud.secrets.v1beta1.SecretManagerService/UpdateSecret") + .setHttpMethod("PATCH") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1beta1/{secret.name=projects/*/secrets/*}", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam( + fields, "secret.name", request.getSecret().getName()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putQueryParam(fields, "updateMask", request.getUpdateMask()); + serializer.putQueryParam(fields, "$alt", "json;enum-encoding=int"); + return fields; + }) + .setRequestBodyExtractor( + request -> + ProtoRestSerializer.create() + .toBody("secret", request.getSecret(), true)) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(Secret.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + deleteSecretMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName("google.cloud.secrets.v1beta1.SecretManagerService/DeleteSecret") + .setHttpMethod("DELETE") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1beta1/{name=projects/*/secrets/*}", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "name", request.getName()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putQueryParam(fields, "$alt", "json;enum-encoding=int"); + return fields; + }) + .setRequestBodyExtractor(request -> null) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(Empty.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + listSecretVersionsMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/ListSecretVersions") + .setHttpMethod("GET") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1beta1/{parent=projects/*/secrets/*}/versions", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "parent", request.getParent()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putQueryParam(fields, "pageSize", request.getPageSize()); + serializer.putQueryParam(fields, "pageToken", request.getPageToken()); + serializer.putQueryParam(fields, "$alt", "json;enum-encoding=int"); + return fields; + }) + .setRequestBodyExtractor(request -> null) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(ListSecretVersionsResponse.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + getSecretVersionMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/GetSecretVersion") + .setHttpMethod("GET") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1beta1/{name=projects/*/secrets/*/versions/*}", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "name", request.getName()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putQueryParam(fields, "$alt", "json;enum-encoding=int"); + return fields; + }) + .setRequestBodyExtractor(request -> null) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(SecretVersion.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + accessSecretVersionMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/AccessSecretVersion") + .setHttpMethod("GET") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1beta1/{name=projects/*/secrets/*/versions/*}:access", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "name", request.getName()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putQueryParam(fields, "$alt", "json;enum-encoding=int"); + return fields; + }) + .setRequestBodyExtractor(request -> null) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(AccessSecretVersionResponse.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + disableSecretVersionMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/DisableSecretVersion") + .setHttpMethod("POST") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1beta1/{name=projects/*/secrets/*/versions/*}:disable", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "name", request.getName()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putQueryParam(fields, "$alt", "json;enum-encoding=int"); + return fields; + }) + .setRequestBodyExtractor( + request -> + ProtoRestSerializer.create() + .toBody("*", request.toBuilder().clearName().build(), true)) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(SecretVersion.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + enableSecretVersionMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/EnableSecretVersion") + .setHttpMethod("POST") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1beta1/{name=projects/*/secrets/*/versions/*}:enable", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "name", request.getName()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putQueryParam(fields, "$alt", "json;enum-encoding=int"); + return fields; + }) + .setRequestBodyExtractor( + request -> + ProtoRestSerializer.create() + .toBody("*", request.toBuilder().clearName().build(), true)) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(SecretVersion.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + destroySecretVersionMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/DestroySecretVersion") + .setHttpMethod("POST") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1beta1/{name=projects/*/secrets/*/versions/*}:destroy", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "name", request.getName()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putQueryParam(fields, "$alt", "json;enum-encoding=int"); + return fields; + }) + .setRequestBodyExtractor( + request -> + ProtoRestSerializer.create() + .toBody("*", request.toBuilder().clearName().build(), true)) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(SecretVersion.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + setIamPolicyMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName("google.cloud.secrets.v1beta1.SecretManagerService/SetIamPolicy") + .setHttpMethod("POST") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1beta1/{resource=projects/*/secrets/*}:setIamPolicy", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "resource", request.getResource()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putQueryParam(fields, "$alt", "json;enum-encoding=int"); + return fields; + }) + .setRequestBodyExtractor( + request -> + ProtoRestSerializer.create() + .toBody("*", request.toBuilder().clearResource().build(), true)) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(Policy.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + getIamPolicyMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName("google.cloud.secrets.v1beta1.SecretManagerService/GetIamPolicy") + .setHttpMethod("GET") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1beta1/{resource=projects/*/secrets/*}:getIamPolicy", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "resource", request.getResource()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putQueryParam(fields, "options", request.getOptions()); + serializer.putQueryParam(fields, "$alt", "json;enum-encoding=int"); + return fields; + }) + .setRequestBodyExtractor(request -> null) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(Policy.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + testIamPermissionsMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName( + "google.cloud.secrets.v1beta1.SecretManagerService/TestIamPermissions") + .setHttpMethod("POST") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1beta1/{resource=projects/*/secrets/*}:testIamPermissions", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "resource", request.getResource()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putQueryParam(fields, "$alt", "json;enum-encoding=int"); + return fields; + }) + .setRequestBodyExtractor( + request -> + ProtoRestSerializer.create() + .toBody("*", request.toBuilder().clearResource().build(), true)) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(TestIamPermissionsResponse.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private final UnaryCallable listSecretsCallable; + private final UnaryCallable + listSecretsPagedCallable; + private final UnaryCallable createSecretCallable; + private final UnaryCallable addSecretVersionCallable; + private final UnaryCallable getSecretCallable; + private final UnaryCallable updateSecretCallable; + private final UnaryCallable deleteSecretCallable; + private final UnaryCallable + listSecretVersionsCallable; + private final UnaryCallable + listSecretVersionsPagedCallable; + private final UnaryCallable getSecretVersionCallable; + private final UnaryCallable + accessSecretVersionCallable; + private final UnaryCallable + disableSecretVersionCallable; + private final UnaryCallable + enableSecretVersionCallable; + private final UnaryCallable + destroySecretVersionCallable; + private final UnaryCallable setIamPolicyCallable; + private final UnaryCallable getIamPolicyCallable; + private final UnaryCallable + testIamPermissionsCallable; + + private final BackgroundResource backgroundResources; + private final HttpJsonStubCallableFactory callableFactory; + + public static final HttpJsonSecretManagerServiceStub create( + SecretManagerServiceStubSettings settings) throws IOException { + return new HttpJsonSecretManagerServiceStub(settings, ClientContext.create(settings)); + } + + public static final HttpJsonSecretManagerServiceStub create(ClientContext clientContext) + throws IOException { + return new HttpJsonSecretManagerServiceStub( + SecretManagerServiceStubSettings.newHttpJsonBuilder().build(), clientContext); + } + + public static final HttpJsonSecretManagerServiceStub create( + ClientContext clientContext, HttpJsonStubCallableFactory callableFactory) throws IOException { + return new HttpJsonSecretManagerServiceStub( + SecretManagerServiceStubSettings.newHttpJsonBuilder().build(), + clientContext, + callableFactory); + } + + /** + * Constructs an instance of HttpJsonSecretManagerServiceStub, using the given settings. This is + * protected so that it is easy to make a subclass, but otherwise, the static factory methods + * should be preferred. + */ + protected HttpJsonSecretManagerServiceStub( + SecretManagerServiceStubSettings settings, ClientContext clientContext) throws IOException { + this(settings, clientContext, new HttpJsonSecretManagerServiceCallableFactory()); + } + + /** + * Constructs an instance of HttpJsonSecretManagerServiceStub, using the given settings. This is + * protected so that it is easy to make a subclass, but otherwise, the static factory methods + * should be preferred. + */ + protected HttpJsonSecretManagerServiceStub( + SecretManagerServiceStubSettings settings, + ClientContext clientContext, + HttpJsonStubCallableFactory callableFactory) + throws IOException { + this.callableFactory = callableFactory; + + HttpJsonCallSettings listSecretsTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(listSecretsMethodDescriptor) + .setTypeRegistry(typeRegistry) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("parent", String.valueOf(request.getParent())); + return builder.build(); + }) + .build(); + HttpJsonCallSettings createSecretTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(createSecretMethodDescriptor) + .setTypeRegistry(typeRegistry) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("parent", String.valueOf(request.getParent())); + return builder.build(); + }) + .build(); + HttpJsonCallSettings addSecretVersionTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(addSecretVersionMethodDescriptor) + .setTypeRegistry(typeRegistry) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("parent", String.valueOf(request.getParent())); + return builder.build(); + }) + .build(); + HttpJsonCallSettings getSecretTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(getSecretMethodDescriptor) + .setTypeRegistry(typeRegistry) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("name", String.valueOf(request.getName())); + return builder.build(); + }) + .build(); + HttpJsonCallSettings updateSecretTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(updateSecretMethodDescriptor) + .setTypeRegistry(typeRegistry) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("secret.name", String.valueOf(request.getSecret().getName())); + return builder.build(); + }) + .build(); + HttpJsonCallSettings deleteSecretTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(deleteSecretMethodDescriptor) + .setTypeRegistry(typeRegistry) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("name", String.valueOf(request.getName())); + return builder.build(); + }) + .build(); + HttpJsonCallSettings + listSecretVersionsTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(listSecretVersionsMethodDescriptor) + .setTypeRegistry(typeRegistry) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("parent", String.valueOf(request.getParent())); + return builder.build(); + }) + .build(); + HttpJsonCallSettings getSecretVersionTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(getSecretVersionMethodDescriptor) + .setTypeRegistry(typeRegistry) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("name", String.valueOf(request.getName())); + return builder.build(); + }) + .build(); + HttpJsonCallSettings + accessSecretVersionTransportSettings = + HttpJsonCallSettings + .newBuilder() + .setMethodDescriptor(accessSecretVersionMethodDescriptor) + .setTypeRegistry(typeRegistry) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("name", String.valueOf(request.getName())); + return builder.build(); + }) + .build(); + HttpJsonCallSettings + disableSecretVersionTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(disableSecretVersionMethodDescriptor) + .setTypeRegistry(typeRegistry) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("name", String.valueOf(request.getName())); + return builder.build(); + }) + .build(); + HttpJsonCallSettings + enableSecretVersionTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(enableSecretVersionMethodDescriptor) + .setTypeRegistry(typeRegistry) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("name", String.valueOf(request.getName())); + return builder.build(); + }) + .build(); + HttpJsonCallSettings + destroySecretVersionTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(destroySecretVersionMethodDescriptor) + .setTypeRegistry(typeRegistry) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("name", String.valueOf(request.getName())); + return builder.build(); + }) + .build(); + HttpJsonCallSettings setIamPolicyTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(setIamPolicyMethodDescriptor) + .setTypeRegistry(typeRegistry) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("resource", String.valueOf(request.getResource())); + return builder.build(); + }) + .build(); + HttpJsonCallSettings getIamPolicyTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(getIamPolicyMethodDescriptor) + .setTypeRegistry(typeRegistry) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("resource", String.valueOf(request.getResource())); + return builder.build(); + }) + .build(); + HttpJsonCallSettings + testIamPermissionsTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(testIamPermissionsMethodDescriptor) + .setTypeRegistry(typeRegistry) + .setParamsExtractor( + request -> { + RequestParamsBuilder builder = RequestParamsBuilder.create(); + builder.add("resource", String.valueOf(request.getResource())); + return builder.build(); + }) + .build(); + + this.listSecretsCallable = + callableFactory.createUnaryCallable( + listSecretsTransportSettings, settings.listSecretsSettings(), clientContext); + this.listSecretsPagedCallable = + callableFactory.createPagedCallable( + listSecretsTransportSettings, settings.listSecretsSettings(), clientContext); + this.createSecretCallable = + callableFactory.createUnaryCallable( + createSecretTransportSettings, settings.createSecretSettings(), clientContext); + this.addSecretVersionCallable = + callableFactory.createUnaryCallable( + addSecretVersionTransportSettings, settings.addSecretVersionSettings(), clientContext); + this.getSecretCallable = + callableFactory.createUnaryCallable( + getSecretTransportSettings, settings.getSecretSettings(), clientContext); + this.updateSecretCallable = + callableFactory.createUnaryCallable( + updateSecretTransportSettings, settings.updateSecretSettings(), clientContext); + this.deleteSecretCallable = + callableFactory.createUnaryCallable( + deleteSecretTransportSettings, settings.deleteSecretSettings(), clientContext); + this.listSecretVersionsCallable = + callableFactory.createUnaryCallable( + listSecretVersionsTransportSettings, + settings.listSecretVersionsSettings(), + clientContext); + this.listSecretVersionsPagedCallable = + callableFactory.createPagedCallable( + listSecretVersionsTransportSettings, + settings.listSecretVersionsSettings(), + clientContext); + this.getSecretVersionCallable = + callableFactory.createUnaryCallable( + getSecretVersionTransportSettings, settings.getSecretVersionSettings(), clientContext); + this.accessSecretVersionCallable = + callableFactory.createUnaryCallable( + accessSecretVersionTransportSettings, + settings.accessSecretVersionSettings(), + clientContext); + this.disableSecretVersionCallable = + callableFactory.createUnaryCallable( + disableSecretVersionTransportSettings, + settings.disableSecretVersionSettings(), + clientContext); + this.enableSecretVersionCallable = + callableFactory.createUnaryCallable( + enableSecretVersionTransportSettings, + settings.enableSecretVersionSettings(), + clientContext); + this.destroySecretVersionCallable = + callableFactory.createUnaryCallable( + destroySecretVersionTransportSettings, + settings.destroySecretVersionSettings(), + clientContext); + this.setIamPolicyCallable = + callableFactory.createUnaryCallable( + setIamPolicyTransportSettings, settings.setIamPolicySettings(), clientContext); + this.getIamPolicyCallable = + callableFactory.createUnaryCallable( + getIamPolicyTransportSettings, settings.getIamPolicySettings(), clientContext); + this.testIamPermissionsCallable = + callableFactory.createUnaryCallable( + testIamPermissionsTransportSettings, + settings.testIamPermissionsSettings(), + clientContext); + + this.backgroundResources = + new BackgroundResourceAggregation(clientContext.getBackgroundResources()); + } + + @InternalApi + public static List getMethodDescriptors() { + List methodDescriptors = new ArrayList<>(); + methodDescriptors.add(listSecretsMethodDescriptor); + methodDescriptors.add(createSecretMethodDescriptor); + methodDescriptors.add(addSecretVersionMethodDescriptor); + methodDescriptors.add(getSecretMethodDescriptor); + methodDescriptors.add(updateSecretMethodDescriptor); + methodDescriptors.add(deleteSecretMethodDescriptor); + methodDescriptors.add(listSecretVersionsMethodDescriptor); + methodDescriptors.add(getSecretVersionMethodDescriptor); + methodDescriptors.add(accessSecretVersionMethodDescriptor); + methodDescriptors.add(disableSecretVersionMethodDescriptor); + methodDescriptors.add(enableSecretVersionMethodDescriptor); + methodDescriptors.add(destroySecretVersionMethodDescriptor); + methodDescriptors.add(setIamPolicyMethodDescriptor); + methodDescriptors.add(getIamPolicyMethodDescriptor); + methodDescriptors.add(testIamPermissionsMethodDescriptor); + return methodDescriptors; + } + + @Override + public UnaryCallable listSecretsCallable() { + return listSecretsCallable; + } + + @Override + public UnaryCallable listSecretsPagedCallable() { + return listSecretsPagedCallable; + } + + @Override + public UnaryCallable createSecretCallable() { + return createSecretCallable; + } + + @Override + public UnaryCallable addSecretVersionCallable() { + return addSecretVersionCallable; + } + + @Override + public UnaryCallable getSecretCallable() { + return getSecretCallable; + } + + @Override + public UnaryCallable updateSecretCallable() { + return updateSecretCallable; + } + + @Override + public UnaryCallable deleteSecretCallable() { + return deleteSecretCallable; + } + + @Override + public UnaryCallable + listSecretVersionsCallable() { + return listSecretVersionsCallable; + } + + @Override + public UnaryCallable + listSecretVersionsPagedCallable() { + return listSecretVersionsPagedCallable; + } + + @Override + public UnaryCallable getSecretVersionCallable() { + return getSecretVersionCallable; + } + + @Override + public UnaryCallable + accessSecretVersionCallable() { + return accessSecretVersionCallable; + } + + @Override + public UnaryCallable disableSecretVersionCallable() { + return disableSecretVersionCallable; + } + + @Override + public UnaryCallable enableSecretVersionCallable() { + return enableSecretVersionCallable; + } + + @Override + public UnaryCallable destroySecretVersionCallable() { + return destroySecretVersionCallable; + } + + @Override + public UnaryCallable setIamPolicyCallable() { + return setIamPolicyCallable; + } + + @Override + public UnaryCallable getIamPolicyCallable() { + return getIamPolicyCallable; + } + + @Override + public UnaryCallable + testIamPermissionsCallable() { + return testIamPermissionsCallable; + } + + @Override + public final void close() { + try { + backgroundResources.close(); + } catch (RuntimeException e) { + throw e; + } catch (Exception e) { + throw new IllegalStateException("Failed to close resource", e); + } + } + + @Override + public void shutdown() { + backgroundResources.shutdown(); + } + + @Override + public boolean isShutdown() { + return backgroundResources.isShutdown(); + } + + @Override + public boolean isTerminated() { + return backgroundResources.isTerminated(); + } + + @Override + public void shutdownNow() { + backgroundResources.shutdownNow(); + } + + @Override + public boolean awaitTermination(long duration, TimeUnit unit) throws InterruptedException { + return backgroundResources.awaitTermination(duration, unit); + } +} diff --git a/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/SecretManagerServiceStub.java b/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/SecretManagerServiceStub.java new file mode 100644 index 000000000000..9c457001b1fa --- /dev/null +++ b/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/SecretManagerServiceStub.java @@ -0,0 +1,134 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.stub; + +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretVersionsPagedResponse; +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretsPagedResponse; + +import com.google.api.core.BetaApi; +import com.google.api.gax.core.BackgroundResource; +import com.google.api.gax.rpc.UnaryCallable; +import com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse; +import com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.CreateSecretRequest; +import com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest; +import com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.GetSecretRequest; +import com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest; +import com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse; +import com.google.cloud.secretmanager.v1beta1.ListSecretsRequest; +import com.google.cloud.secretmanager.v1beta1.ListSecretsResponse; +import com.google.cloud.secretmanager.v1beta1.Secret; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; +import com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest; +import com.google.iam.v1.GetIamPolicyRequest; +import com.google.iam.v1.Policy; +import com.google.iam.v1.SetIamPolicyRequest; +import com.google.iam.v1.TestIamPermissionsRequest; +import com.google.iam.v1.TestIamPermissionsResponse; +import com.google.protobuf.Empty; +import javax.annotation.Generated; + +// AUTO-GENERATED DOCUMENTATION AND CLASS. +/** + * Base stub class for the SecretManagerService service API. + * + *

This class is for advanced usage and reflects the underlying API directly. + */ +@BetaApi +@Generated("by gapic-generator-java") +public abstract class SecretManagerServiceStub implements BackgroundResource { + + public UnaryCallable listSecretsPagedCallable() { + throw new UnsupportedOperationException("Not implemented: listSecretsPagedCallable()"); + } + + public UnaryCallable listSecretsCallable() { + throw new UnsupportedOperationException("Not implemented: listSecretsCallable()"); + } + + public UnaryCallable createSecretCallable() { + throw new UnsupportedOperationException("Not implemented: createSecretCallable()"); + } + + public UnaryCallable addSecretVersionCallable() { + throw new UnsupportedOperationException("Not implemented: addSecretVersionCallable()"); + } + + public UnaryCallable getSecretCallable() { + throw new UnsupportedOperationException("Not implemented: getSecretCallable()"); + } + + public UnaryCallable updateSecretCallable() { + throw new UnsupportedOperationException("Not implemented: updateSecretCallable()"); + } + + public UnaryCallable deleteSecretCallable() { + throw new UnsupportedOperationException("Not implemented: deleteSecretCallable()"); + } + + public UnaryCallable + listSecretVersionsPagedCallable() { + throw new UnsupportedOperationException("Not implemented: listSecretVersionsPagedCallable()"); + } + + public UnaryCallable + listSecretVersionsCallable() { + throw new UnsupportedOperationException("Not implemented: listSecretVersionsCallable()"); + } + + public UnaryCallable getSecretVersionCallable() { + throw new UnsupportedOperationException("Not implemented: getSecretVersionCallable()"); + } + + public UnaryCallable + accessSecretVersionCallable() { + throw new UnsupportedOperationException("Not implemented: accessSecretVersionCallable()"); + } + + public UnaryCallable disableSecretVersionCallable() { + throw new UnsupportedOperationException("Not implemented: disableSecretVersionCallable()"); + } + + public UnaryCallable enableSecretVersionCallable() { + throw new UnsupportedOperationException("Not implemented: enableSecretVersionCallable()"); + } + + public UnaryCallable destroySecretVersionCallable() { + throw new UnsupportedOperationException("Not implemented: destroySecretVersionCallable()"); + } + + public UnaryCallable setIamPolicyCallable() { + throw new UnsupportedOperationException("Not implemented: setIamPolicyCallable()"); + } + + public UnaryCallable getIamPolicyCallable() { + throw new UnsupportedOperationException("Not implemented: getIamPolicyCallable()"); + } + + public UnaryCallable + testIamPermissionsCallable() { + throw new UnsupportedOperationException("Not implemented: testIamPermissionsCallable()"); + } + + @Override + public abstract void close(); +} diff --git a/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/SecretManagerServiceStubSettings.java b/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/SecretManagerServiceStubSettings.java new file mode 100644 index 000000000000..76fcb78444ea --- /dev/null +++ b/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/stub/SecretManagerServiceStubSettings.java @@ -0,0 +1,847 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.stub; + +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretVersionsPagedResponse; +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretsPagedResponse; + +import com.google.api.core.ApiFunction; +import com.google.api.core.ApiFuture; +import com.google.api.core.BetaApi; +import com.google.api.core.ObsoleteApi; +import com.google.api.gax.core.GaxProperties; +import com.google.api.gax.core.GoogleCredentialsProvider; +import com.google.api.gax.core.InstantiatingExecutorProvider; +import com.google.api.gax.grpc.GaxGrpcProperties; +import com.google.api.gax.grpc.GrpcTransportChannel; +import com.google.api.gax.grpc.InstantiatingGrpcChannelProvider; +import com.google.api.gax.httpjson.GaxHttpJsonProperties; +import com.google.api.gax.httpjson.HttpJsonTransportChannel; +import com.google.api.gax.httpjson.InstantiatingHttpJsonChannelProvider; +import com.google.api.gax.retrying.RetrySettings; +import com.google.api.gax.rpc.ApiCallContext; +import com.google.api.gax.rpc.ApiClientHeaderProvider; +import com.google.api.gax.rpc.ClientContext; +import com.google.api.gax.rpc.PageContext; +import com.google.api.gax.rpc.PagedCallSettings; +import com.google.api.gax.rpc.PagedListDescriptor; +import com.google.api.gax.rpc.PagedListResponseFactory; +import com.google.api.gax.rpc.StatusCode; +import com.google.api.gax.rpc.StubSettings; +import com.google.api.gax.rpc.TransportChannelProvider; +import com.google.api.gax.rpc.UnaryCallSettings; +import com.google.api.gax.rpc.UnaryCallable; +import com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse; +import com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.CreateSecretRequest; +import com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest; +import com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.GetSecretRequest; +import com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest; +import com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse; +import com.google.cloud.secretmanager.v1beta1.ListSecretsRequest; +import com.google.cloud.secretmanager.v1beta1.ListSecretsResponse; +import com.google.cloud.secretmanager.v1beta1.Secret; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; +import com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest; +import com.google.common.collect.ImmutableList; +import com.google.common.collect.ImmutableMap; +import com.google.common.collect.ImmutableSet; +import com.google.common.collect.Lists; +import com.google.iam.v1.GetIamPolicyRequest; +import com.google.iam.v1.Policy; +import com.google.iam.v1.SetIamPolicyRequest; +import com.google.iam.v1.TestIamPermissionsRequest; +import com.google.iam.v1.TestIamPermissionsResponse; +import com.google.protobuf.Empty; +import java.io.IOException; +import java.time.Duration; +import java.util.List; +import javax.annotation.Generated; + +// AUTO-GENERATED DOCUMENTATION AND CLASS. +/** + * Settings class to configure an instance of {@link SecretManagerServiceStub}. + * + *

The default instance has everything set to sensible defaults: + * + *

    + *
  • The default service address (secretmanager.googleapis.com) and default port (443) are used. + *
  • Credentials are acquired automatically through Application Default Credentials. + *
  • Retries are configured for idempotent methods but not for non-idempotent methods. + *
+ * + *

The builder of this class is recursive, so contained classes are themselves builders. When + * build() is called, the tree of builders is called to create the complete settings object. + * + *

For example, to set the + * [RetrySettings](https://cloud.google.com/java/docs/reference/gax/latest/com.google.api.gax.retrying.RetrySettings) + * of createSecret: + * + *

{@code
+ * // This snippet has been automatically generated and should be regarded as a code template only.
+ * // It will require modifications to work:
+ * // - It may require correct/in-range values for request initialization.
+ * // - It may require specifying regional endpoints when creating the service client as shown in
+ * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+ * SecretManagerServiceStubSettings.Builder secretManagerServiceSettingsBuilder =
+ *     SecretManagerServiceStubSettings.newBuilder();
+ * secretManagerServiceSettingsBuilder
+ *     .createSecretSettings()
+ *     .setRetrySettings(
+ *         secretManagerServiceSettingsBuilder
+ *             .createSecretSettings()
+ *             .getRetrySettings()
+ *             .toBuilder()
+ *             .setInitialRetryDelayDuration(Duration.ofSeconds(1))
+ *             .setInitialRpcTimeoutDuration(Duration.ofSeconds(5))
+ *             .setMaxAttempts(5)
+ *             .setMaxRetryDelayDuration(Duration.ofSeconds(30))
+ *             .setMaxRpcTimeoutDuration(Duration.ofSeconds(60))
+ *             .setRetryDelayMultiplier(1.3)
+ *             .setRpcTimeoutMultiplier(1.5)
+ *             .setTotalTimeoutDuration(Duration.ofSeconds(300))
+ *             .build());
+ * SecretManagerServiceStubSettings secretManagerServiceSettings =
+ *     secretManagerServiceSettingsBuilder.build();
+ * }
+ * + * Please refer to the [Client Side Retry + * Guide](https://github.com/googleapis/google-cloud-java/blob/main/docs/client_retries.md) for + * additional support in setting retries. + */ +@BetaApi +@Generated("by gapic-generator-java") +public class SecretManagerServiceStubSettings + extends StubSettings { + /** The default scopes of the service. */ + private static final ImmutableList DEFAULT_SERVICE_SCOPES = + ImmutableList.builder().add("https://www.googleapis.com/auth/cloud-platform").build(); + + private final PagedCallSettings + listSecretsSettings; + private final UnaryCallSettings createSecretSettings; + private final UnaryCallSettings addSecretVersionSettings; + private final UnaryCallSettings getSecretSettings; + private final UnaryCallSettings updateSecretSettings; + private final UnaryCallSettings deleteSecretSettings; + private final PagedCallSettings< + ListSecretVersionsRequest, ListSecretVersionsResponse, ListSecretVersionsPagedResponse> + listSecretVersionsSettings; + private final UnaryCallSettings getSecretVersionSettings; + private final UnaryCallSettings + accessSecretVersionSettings; + private final UnaryCallSettings + disableSecretVersionSettings; + private final UnaryCallSettings + enableSecretVersionSettings; + private final UnaryCallSettings + destroySecretVersionSettings; + private final UnaryCallSettings setIamPolicySettings; + private final UnaryCallSettings getIamPolicySettings; + private final UnaryCallSettings + testIamPermissionsSettings; + + private static final PagedListDescriptor + LIST_SECRETS_PAGE_STR_DESC = + new PagedListDescriptor() { + @Override + public String emptyToken() { + return ""; + } + + @Override + public ListSecretsRequest injectToken(ListSecretsRequest payload, String token) { + return ListSecretsRequest.newBuilder(payload).setPageToken(token).build(); + } + + @Override + public ListSecretsRequest injectPageSize(ListSecretsRequest payload, int pageSize) { + return ListSecretsRequest.newBuilder(payload).setPageSize(pageSize).build(); + } + + @Override + public Integer extractPageSize(ListSecretsRequest payload) { + return payload.getPageSize(); + } + + @Override + public String extractNextToken(ListSecretsResponse payload) { + return payload.getNextPageToken(); + } + + @Override + public Iterable extractResources(ListSecretsResponse payload) { + return payload.getSecretsList(); + } + }; + + private static final PagedListDescriptor< + ListSecretVersionsRequest, ListSecretVersionsResponse, SecretVersion> + LIST_SECRET_VERSIONS_PAGE_STR_DESC = + new PagedListDescriptor< + ListSecretVersionsRequest, ListSecretVersionsResponse, SecretVersion>() { + @Override + public String emptyToken() { + return ""; + } + + @Override + public ListSecretVersionsRequest injectToken( + ListSecretVersionsRequest payload, String token) { + return ListSecretVersionsRequest.newBuilder(payload).setPageToken(token).build(); + } + + @Override + public ListSecretVersionsRequest injectPageSize( + ListSecretVersionsRequest payload, int pageSize) { + return ListSecretVersionsRequest.newBuilder(payload).setPageSize(pageSize).build(); + } + + @Override + public Integer extractPageSize(ListSecretVersionsRequest payload) { + return payload.getPageSize(); + } + + @Override + public String extractNextToken(ListSecretVersionsResponse payload) { + return payload.getNextPageToken(); + } + + @Override + public Iterable extractResources(ListSecretVersionsResponse payload) { + return payload.getVersionsList(); + } + }; + + private static final PagedListResponseFactory< + ListSecretsRequest, ListSecretsResponse, ListSecretsPagedResponse> + LIST_SECRETS_PAGE_STR_FACT = + new PagedListResponseFactory< + ListSecretsRequest, ListSecretsResponse, ListSecretsPagedResponse>() { + @Override + public ApiFuture getFuturePagedResponse( + UnaryCallable callable, + ListSecretsRequest request, + ApiCallContext context, + ApiFuture futureResponse) { + PageContext pageContext = + PageContext.create(callable, LIST_SECRETS_PAGE_STR_DESC, request, context); + return ListSecretsPagedResponse.createAsync(pageContext, futureResponse); + } + }; + + private static final PagedListResponseFactory< + ListSecretVersionsRequest, ListSecretVersionsResponse, ListSecretVersionsPagedResponse> + LIST_SECRET_VERSIONS_PAGE_STR_FACT = + new PagedListResponseFactory< + ListSecretVersionsRequest, + ListSecretVersionsResponse, + ListSecretVersionsPagedResponse>() { + @Override + public ApiFuture getFuturePagedResponse( + UnaryCallable callable, + ListSecretVersionsRequest request, + ApiCallContext context, + ApiFuture futureResponse) { + PageContext + pageContext = + PageContext.create( + callable, LIST_SECRET_VERSIONS_PAGE_STR_DESC, request, context); + return ListSecretVersionsPagedResponse.createAsync(pageContext, futureResponse); + } + }; + + /** Returns the object with the settings used for calls to listSecrets. */ + public PagedCallSettings + listSecretsSettings() { + return listSecretsSettings; + } + + /** Returns the object with the settings used for calls to createSecret. */ + public UnaryCallSettings createSecretSettings() { + return createSecretSettings; + } + + /** Returns the object with the settings used for calls to addSecretVersion. */ + public UnaryCallSettings addSecretVersionSettings() { + return addSecretVersionSettings; + } + + /** Returns the object with the settings used for calls to getSecret. */ + public UnaryCallSettings getSecretSettings() { + return getSecretSettings; + } + + /** Returns the object with the settings used for calls to updateSecret. */ + public UnaryCallSettings updateSecretSettings() { + return updateSecretSettings; + } + + /** Returns the object with the settings used for calls to deleteSecret. */ + public UnaryCallSettings deleteSecretSettings() { + return deleteSecretSettings; + } + + /** Returns the object with the settings used for calls to listSecretVersions. */ + public PagedCallSettings< + ListSecretVersionsRequest, ListSecretVersionsResponse, ListSecretVersionsPagedResponse> + listSecretVersionsSettings() { + return listSecretVersionsSettings; + } + + /** Returns the object with the settings used for calls to getSecretVersion. */ + public UnaryCallSettings getSecretVersionSettings() { + return getSecretVersionSettings; + } + + /** Returns the object with the settings used for calls to accessSecretVersion. */ + public UnaryCallSettings + accessSecretVersionSettings() { + return accessSecretVersionSettings; + } + + /** Returns the object with the settings used for calls to disableSecretVersion. */ + public UnaryCallSettings + disableSecretVersionSettings() { + return disableSecretVersionSettings; + } + + /** Returns the object with the settings used for calls to enableSecretVersion. */ + public UnaryCallSettings + enableSecretVersionSettings() { + return enableSecretVersionSettings; + } + + /** Returns the object with the settings used for calls to destroySecretVersion. */ + public UnaryCallSettings + destroySecretVersionSettings() { + return destroySecretVersionSettings; + } + + /** Returns the object with the settings used for calls to setIamPolicy. */ + public UnaryCallSettings setIamPolicySettings() { + return setIamPolicySettings; + } + + /** Returns the object with the settings used for calls to getIamPolicy. */ + public UnaryCallSettings getIamPolicySettings() { + return getIamPolicySettings; + } + + /** Returns the object with the settings used for calls to testIamPermissions. */ + public UnaryCallSettings + testIamPermissionsSettings() { + return testIamPermissionsSettings; + } + + public SecretManagerServiceStub createStub() throws IOException { + if (getTransportChannelProvider() + .getTransportName() + .equals(GrpcTransportChannel.getGrpcTransportName())) { + return GrpcSecretManagerServiceStub.create(this); + } + if (getTransportChannelProvider() + .getTransportName() + .equals(HttpJsonTransportChannel.getHttpJsonTransportName())) { + return HttpJsonSecretManagerServiceStub.create(this); + } + throw new UnsupportedOperationException( + String.format( + "Transport not supported: %s", getTransportChannelProvider().getTransportName())); + } + + /** Returns the default service name. */ + @Override + public String getServiceName() { + return "secretmanager"; + } + + /** Returns a builder for the default ExecutorProvider for this service. */ + public static InstantiatingExecutorProvider.Builder defaultExecutorProviderBuilder() { + return InstantiatingExecutorProvider.newBuilder(); + } + + /** Returns the default service endpoint. */ + @ObsoleteApi("Use getEndpoint() instead") + public static String getDefaultEndpoint() { + return "secretmanager.googleapis.com:443"; + } + + /** Returns the default mTLS service endpoint. */ + public static String getDefaultMtlsEndpoint() { + return "secretmanager.mtls.googleapis.com:443"; + } + + /** Returns the default service scopes. */ + public static List getDefaultServiceScopes() { + return DEFAULT_SERVICE_SCOPES; + } + + /** Returns a builder for the default credentials for this service. */ + public static GoogleCredentialsProvider.Builder defaultCredentialsProviderBuilder() { + return GoogleCredentialsProvider.newBuilder() + .setScopesToApply(DEFAULT_SERVICE_SCOPES) + .setUseJwtAccessWithScope(true); + } + + /** Returns a builder for the default gRPC ChannelProvider for this service. */ + public static InstantiatingGrpcChannelProvider.Builder defaultGrpcTransportProviderBuilder() { + return InstantiatingGrpcChannelProvider.newBuilder() + .setMaxInboundMessageSize(Integer.MAX_VALUE); + } + + /** Returns a builder for the default REST ChannelProvider for this service. */ + @BetaApi + public static InstantiatingHttpJsonChannelProvider.Builder + defaultHttpJsonTransportProviderBuilder() { + return InstantiatingHttpJsonChannelProvider.newBuilder(); + } + + public static TransportChannelProvider defaultTransportChannelProvider() { + return defaultGrpcTransportProviderBuilder().build(); + } + + public static ApiClientHeaderProvider.Builder defaultGrpcApiClientHeaderProviderBuilder() { + return ApiClientHeaderProvider.newBuilder() + .setGeneratedLibToken( + "gapic", GaxProperties.getLibraryVersion(SecretManagerServiceStubSettings.class)) + .setTransportToken( + GaxGrpcProperties.getGrpcTokenName(), GaxGrpcProperties.getGrpcVersion()); + } + + public static ApiClientHeaderProvider.Builder defaultHttpJsonApiClientHeaderProviderBuilder() { + return ApiClientHeaderProvider.newBuilder() + .setGeneratedLibToken( + "gapic", GaxProperties.getLibraryVersion(SecretManagerServiceStubSettings.class)) + .setTransportToken( + GaxHttpJsonProperties.getHttpJsonTokenName(), + GaxHttpJsonProperties.getHttpJsonVersion()); + } + + public static ApiClientHeaderProvider.Builder defaultApiClientHeaderProviderBuilder() { + return SecretManagerServiceStubSettings.defaultGrpcApiClientHeaderProviderBuilder(); + } + + /** Returns a new gRPC builder for this class. */ + public static Builder newBuilder() { + return Builder.createDefault(); + } + + /** Returns a new REST builder for this class. */ + public static Builder newHttpJsonBuilder() { + return Builder.createHttpJsonDefault(); + } + + /** Returns a new builder for this class. */ + public static Builder newBuilder(ClientContext clientContext) { + return new Builder(clientContext); + } + + /** Returns a builder containing all the values of this settings class. */ + public Builder toBuilder() { + return new Builder(this); + } + + protected SecretManagerServiceStubSettings(Builder settingsBuilder) throws IOException { + super(settingsBuilder); + + listSecretsSettings = settingsBuilder.listSecretsSettings().build(); + createSecretSettings = settingsBuilder.createSecretSettings().build(); + addSecretVersionSettings = settingsBuilder.addSecretVersionSettings().build(); + getSecretSettings = settingsBuilder.getSecretSettings().build(); + updateSecretSettings = settingsBuilder.updateSecretSettings().build(); + deleteSecretSettings = settingsBuilder.deleteSecretSettings().build(); + listSecretVersionsSettings = settingsBuilder.listSecretVersionsSettings().build(); + getSecretVersionSettings = settingsBuilder.getSecretVersionSettings().build(); + accessSecretVersionSettings = settingsBuilder.accessSecretVersionSettings().build(); + disableSecretVersionSettings = settingsBuilder.disableSecretVersionSettings().build(); + enableSecretVersionSettings = settingsBuilder.enableSecretVersionSettings().build(); + destroySecretVersionSettings = settingsBuilder.destroySecretVersionSettings().build(); + setIamPolicySettings = settingsBuilder.setIamPolicySettings().build(); + getIamPolicySettings = settingsBuilder.getIamPolicySettings().build(); + testIamPermissionsSettings = settingsBuilder.testIamPermissionsSettings().build(); + } + + /** Builder for SecretManagerServiceStubSettings. */ + public static class Builder + extends StubSettings.Builder { + private final ImmutableList> unaryMethodSettingsBuilders; + private final PagedCallSettings.Builder< + ListSecretsRequest, ListSecretsResponse, ListSecretsPagedResponse> + listSecretsSettings; + private final UnaryCallSettings.Builder createSecretSettings; + private final UnaryCallSettings.Builder + addSecretVersionSettings; + private final UnaryCallSettings.Builder getSecretSettings; + private final UnaryCallSettings.Builder updateSecretSettings; + private final UnaryCallSettings.Builder deleteSecretSettings; + private final PagedCallSettings.Builder< + ListSecretVersionsRequest, ListSecretVersionsResponse, ListSecretVersionsPagedResponse> + listSecretVersionsSettings; + private final UnaryCallSettings.Builder + getSecretVersionSettings; + private final UnaryCallSettings.Builder + accessSecretVersionSettings; + private final UnaryCallSettings.Builder + disableSecretVersionSettings; + private final UnaryCallSettings.Builder + enableSecretVersionSettings; + private final UnaryCallSettings.Builder + destroySecretVersionSettings; + private final UnaryCallSettings.Builder setIamPolicySettings; + private final UnaryCallSettings.Builder getIamPolicySettings; + private final UnaryCallSettings.Builder + testIamPermissionsSettings; + private static final ImmutableMap> + RETRYABLE_CODE_DEFINITIONS; + + static { + ImmutableMap.Builder> definitions = + ImmutableMap.builder(); + definitions.put( + "no_retry_0_codes", ImmutableSet.copyOf(Lists.newArrayList())); + definitions.put( + "retry_policy_1_codes", + ImmutableSet.copyOf( + Lists.newArrayList( + StatusCode.Code.UNAVAILABLE, StatusCode.Code.UNKNOWN))); + RETRYABLE_CODE_DEFINITIONS = definitions.build(); + } + + private static final ImmutableMap RETRY_PARAM_DEFINITIONS; + + static { + ImmutableMap.Builder definitions = ImmutableMap.builder(); + RetrySettings settings = null; + settings = + RetrySettings.newBuilder() + .setInitialRpcTimeoutDuration(Duration.ofMillis(60000L)) + .setRpcTimeoutMultiplier(1.0) + .setMaxRpcTimeoutDuration(Duration.ofMillis(60000L)) + .setTotalTimeoutDuration(Duration.ofMillis(60000L)) + .build(); + definitions.put("no_retry_0_params", settings); + settings = + RetrySettings.newBuilder() + .setInitialRetryDelayDuration(Duration.ofMillis(1000L)) + .setRetryDelayMultiplier(1.3) + .setMaxRetryDelayDuration(Duration.ofMillis(60000L)) + .setInitialRpcTimeoutDuration(Duration.ofMillis(60000L)) + .setRpcTimeoutMultiplier(1.0) + .setMaxRpcTimeoutDuration(Duration.ofMillis(60000L)) + .setTotalTimeoutDuration(Duration.ofMillis(60000L)) + .build(); + definitions.put("retry_policy_1_params", settings); + RETRY_PARAM_DEFINITIONS = definitions.build(); + } + + protected Builder() { + this(((ClientContext) null)); + } + + protected Builder(ClientContext clientContext) { + super(clientContext); + + listSecretsSettings = PagedCallSettings.newBuilder(LIST_SECRETS_PAGE_STR_FACT); + createSecretSettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + addSecretVersionSettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + getSecretSettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + updateSecretSettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + deleteSecretSettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + listSecretVersionsSettings = PagedCallSettings.newBuilder(LIST_SECRET_VERSIONS_PAGE_STR_FACT); + getSecretVersionSettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + accessSecretVersionSettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + disableSecretVersionSettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + enableSecretVersionSettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + destroySecretVersionSettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + setIamPolicySettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + getIamPolicySettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + testIamPermissionsSettings = UnaryCallSettings.newUnaryCallSettingsBuilder(); + + unaryMethodSettingsBuilders = + ImmutableList.>of( + listSecretsSettings, + createSecretSettings, + addSecretVersionSettings, + getSecretSettings, + updateSecretSettings, + deleteSecretSettings, + listSecretVersionsSettings, + getSecretVersionSettings, + accessSecretVersionSettings, + disableSecretVersionSettings, + enableSecretVersionSettings, + destroySecretVersionSettings, + setIamPolicySettings, + getIamPolicySettings, + testIamPermissionsSettings); + initDefaults(this); + } + + protected Builder(SecretManagerServiceStubSettings settings) { + super(settings); + + listSecretsSettings = settings.listSecretsSettings.toBuilder(); + createSecretSettings = settings.createSecretSettings.toBuilder(); + addSecretVersionSettings = settings.addSecretVersionSettings.toBuilder(); + getSecretSettings = settings.getSecretSettings.toBuilder(); + updateSecretSettings = settings.updateSecretSettings.toBuilder(); + deleteSecretSettings = settings.deleteSecretSettings.toBuilder(); + listSecretVersionsSettings = settings.listSecretVersionsSettings.toBuilder(); + getSecretVersionSettings = settings.getSecretVersionSettings.toBuilder(); + accessSecretVersionSettings = settings.accessSecretVersionSettings.toBuilder(); + disableSecretVersionSettings = settings.disableSecretVersionSettings.toBuilder(); + enableSecretVersionSettings = settings.enableSecretVersionSettings.toBuilder(); + destroySecretVersionSettings = settings.destroySecretVersionSettings.toBuilder(); + setIamPolicySettings = settings.setIamPolicySettings.toBuilder(); + getIamPolicySettings = settings.getIamPolicySettings.toBuilder(); + testIamPermissionsSettings = settings.testIamPermissionsSettings.toBuilder(); + + unaryMethodSettingsBuilders = + ImmutableList.>of( + listSecretsSettings, + createSecretSettings, + addSecretVersionSettings, + getSecretSettings, + updateSecretSettings, + deleteSecretSettings, + listSecretVersionsSettings, + getSecretVersionSettings, + accessSecretVersionSettings, + disableSecretVersionSettings, + enableSecretVersionSettings, + destroySecretVersionSettings, + setIamPolicySettings, + getIamPolicySettings, + testIamPermissionsSettings); + } + + private static Builder createDefault() { + Builder builder = new Builder(((ClientContext) null)); + + builder.setTransportChannelProvider(defaultTransportChannelProvider()); + builder.setCredentialsProvider(defaultCredentialsProviderBuilder().build()); + builder.setInternalHeaderProvider(defaultApiClientHeaderProviderBuilder().build()); + builder.setMtlsEndpoint(getDefaultMtlsEndpoint()); + builder.setSwitchToMtlsEndpointAllowed(true); + + return initDefaults(builder); + } + + private static Builder createHttpJsonDefault() { + Builder builder = new Builder(((ClientContext) null)); + + builder.setTransportChannelProvider(defaultHttpJsonTransportProviderBuilder().build()); + builder.setCredentialsProvider(defaultCredentialsProviderBuilder().build()); + builder.setInternalHeaderProvider(defaultHttpJsonApiClientHeaderProviderBuilder().build()); + builder.setMtlsEndpoint(getDefaultMtlsEndpoint()); + builder.setSwitchToMtlsEndpointAllowed(true); + + return initDefaults(builder); + } + + private static Builder initDefaults(Builder builder) { + builder + .listSecretsSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("no_retry_0_codes")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("no_retry_0_params")); + + builder + .createSecretSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("no_retry_0_codes")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("no_retry_0_params")); + + builder + .addSecretVersionSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("no_retry_0_codes")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("no_retry_0_params")); + + builder + .getSecretSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("no_retry_0_codes")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("no_retry_0_params")); + + builder + .updateSecretSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("no_retry_0_codes")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("no_retry_0_params")); + + builder + .deleteSecretSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("no_retry_0_codes")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("no_retry_0_params")); + + builder + .listSecretVersionsSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("no_retry_0_codes")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("no_retry_0_params")); + + builder + .getSecretVersionSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("no_retry_0_codes")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("no_retry_0_params")); + + builder + .accessSecretVersionSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("retry_policy_1_codes")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("retry_policy_1_params")); + + builder + .disableSecretVersionSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("no_retry_0_codes")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("no_retry_0_params")); + + builder + .enableSecretVersionSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("no_retry_0_codes")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("no_retry_0_params")); + + builder + .destroySecretVersionSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("no_retry_0_codes")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("no_retry_0_params")); + + builder + .setIamPolicySettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("no_retry_0_codes")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("no_retry_0_params")); + + builder + .getIamPolicySettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("no_retry_0_codes")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("no_retry_0_params")); + + builder + .testIamPermissionsSettings() + .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("no_retry_0_codes")) + .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("no_retry_0_params")); + + return builder; + } + + /** + * Applies the given settings updater function to all of the unary API methods in this service. + * + *

Note: This method does not support applying settings to streaming methods. + */ + public Builder applyToAllUnaryMethods( + ApiFunction, Void> settingsUpdater) { + super.applyToAllUnaryMethods(unaryMethodSettingsBuilders, settingsUpdater); + return this; + } + + public ImmutableList> unaryMethodSettingsBuilders() { + return unaryMethodSettingsBuilders; + } + + /** Returns the builder for the settings used for calls to listSecrets. */ + public PagedCallSettings.Builder< + ListSecretsRequest, ListSecretsResponse, ListSecretsPagedResponse> + listSecretsSettings() { + return listSecretsSettings; + } + + /** Returns the builder for the settings used for calls to createSecret. */ + public UnaryCallSettings.Builder createSecretSettings() { + return createSecretSettings; + } + + /** Returns the builder for the settings used for calls to addSecretVersion. */ + public UnaryCallSettings.Builder + addSecretVersionSettings() { + return addSecretVersionSettings; + } + + /** Returns the builder for the settings used for calls to getSecret. */ + public UnaryCallSettings.Builder getSecretSettings() { + return getSecretSettings; + } + + /** Returns the builder for the settings used for calls to updateSecret. */ + public UnaryCallSettings.Builder updateSecretSettings() { + return updateSecretSettings; + } + + /** Returns the builder for the settings used for calls to deleteSecret. */ + public UnaryCallSettings.Builder deleteSecretSettings() { + return deleteSecretSettings; + } + + /** Returns the builder for the settings used for calls to listSecretVersions. */ + public PagedCallSettings.Builder< + ListSecretVersionsRequest, ListSecretVersionsResponse, ListSecretVersionsPagedResponse> + listSecretVersionsSettings() { + return listSecretVersionsSettings; + } + + /** Returns the builder for the settings used for calls to getSecretVersion. */ + public UnaryCallSettings.Builder + getSecretVersionSettings() { + return getSecretVersionSettings; + } + + /** Returns the builder for the settings used for calls to accessSecretVersion. */ + public UnaryCallSettings.Builder + accessSecretVersionSettings() { + return accessSecretVersionSettings; + } + + /** Returns the builder for the settings used for calls to disableSecretVersion. */ + public UnaryCallSettings.Builder + disableSecretVersionSettings() { + return disableSecretVersionSettings; + } + + /** Returns the builder for the settings used for calls to enableSecretVersion. */ + public UnaryCallSettings.Builder + enableSecretVersionSettings() { + return enableSecretVersionSettings; + } + + /** Returns the builder for the settings used for calls to destroySecretVersion. */ + public UnaryCallSettings.Builder + destroySecretVersionSettings() { + return destroySecretVersionSettings; + } + + /** Returns the builder for the settings used for calls to setIamPolicy. */ + public UnaryCallSettings.Builder setIamPolicySettings() { + return setIamPolicySettings; + } + + /** Returns the builder for the settings used for calls to getIamPolicy. */ + public UnaryCallSettings.Builder getIamPolicySettings() { + return getIamPolicySettings; + } + + /** Returns the builder for the settings used for calls to testIamPermissions. */ + public UnaryCallSettings.Builder + testIamPermissionsSettings() { + return testIamPermissionsSettings; + } + + @Override + public SecretManagerServiceStubSettings build() throws IOException { + return new SecretManagerServiceStubSettings(this); + } + } +} diff --git a/java-secretmanager/google-cloud-secretmanager/src/main/resources/META-INF/native-image/com.google.cloud.secretmanager.v1beta1/reflect-config.json b/java-secretmanager/google-cloud-secretmanager/src/main/resources/META-INF/native-image/com.google.cloud.secretmanager.v1beta1/reflect-config.json new file mode 100644 index 000000000000..ed0b5e4c96df --- /dev/null +++ b/java-secretmanager/google-cloud-secretmanager/src/main/resources/META-INF/native-image/com.google.cloud.secretmanager.v1beta1/reflect-config.json @@ -0,0 +1,1883 @@ +[ + { + "name": "com.google.api.ClientLibraryDestination", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.ClientLibraryOrganization", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.ClientLibrarySettings", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.ClientLibrarySettings$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.CommonLanguageSettings", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.CommonLanguageSettings$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.CppSettings", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.CppSettings$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.CustomHttpPattern", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.CustomHttpPattern$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.DotnetSettings", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.DotnetSettings$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.FieldBehavior", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.GoSettings", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.GoSettings$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.Http", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.Http$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.HttpRule", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.HttpRule$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.JavaSettings", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.JavaSettings$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.LaunchStage", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.MethodSettings", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.MethodSettings$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.MethodSettings$LongRunning", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.MethodSettings$LongRunning$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.NodeSettings", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.NodeSettings$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.PhpSettings", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.PhpSettings$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.Publishing", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.Publishing$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.PythonSettings", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.PythonSettings$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.PythonSettings$ExperimentalFeatures", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.PythonSettings$ExperimentalFeatures$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.ResourceDescriptor", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.ResourceDescriptor$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.ResourceDescriptor$History", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.ResourceDescriptor$Style", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.ResourceReference", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.ResourceReference$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.RubySettings", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.RubySettings$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.SelectiveGapicGeneration", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.api.SelectiveGapicGeneration$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.CreateSecretRequest", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.CreateSecretRequest$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.GetSecretRequest", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.GetSecretRequest$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.ListSecretsRequest", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.ListSecretsRequest$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.ListSecretsResponse", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.ListSecretsResponse$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.Replication", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.Replication$Automatic", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.Replication$Automatic$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.Replication$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.Replication$UserManaged", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.Replication$UserManaged$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.Replication$UserManaged$Replica", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.Replication$UserManaged$Replica$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.Secret", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.Secret$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.SecretPayload", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.SecretPayload$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.SecretVersion", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.SecretVersion$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.SecretVersion$State", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.AuditConfig", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.AuditConfig$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.AuditConfigDelta", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.AuditConfigDelta$Action", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.AuditConfigDelta$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.AuditLogConfig", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.AuditLogConfig$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.AuditLogConfig$LogType", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.Binding", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.Binding$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.BindingDelta", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.BindingDelta$Action", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.BindingDelta$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.GetIamPolicyRequest", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.GetIamPolicyRequest$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.GetPolicyOptions", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.GetPolicyOptions$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.Policy", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.Policy$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.PolicyDelta", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.PolicyDelta$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.SetIamPolicyRequest", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.SetIamPolicyRequest$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.TestIamPermissionsRequest", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.TestIamPermissionsRequest$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.TestIamPermissionsResponse", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.iam.v1.TestIamPermissionsResponse$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$DescriptorProto", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$DescriptorProto$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$DescriptorProto$ExtensionRange", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$DescriptorProto$ExtensionRange$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$DescriptorProto$ReservedRange", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$DescriptorProto$ReservedRange$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$Edition", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$EnumDescriptorProto", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$EnumDescriptorProto$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$EnumDescriptorProto$EnumReservedRange", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$EnumDescriptorProto$EnumReservedRange$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$EnumOptions", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$EnumOptions$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$EnumValueDescriptorProto", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$EnumValueDescriptorProto$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$EnumValueOptions", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$EnumValueOptions$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$ExtensionRangeOptions", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$ExtensionRangeOptions$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$ExtensionRangeOptions$Declaration", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$ExtensionRangeOptions$Declaration$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$ExtensionRangeOptions$VerificationState", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FeatureSet", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FeatureSet$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FeatureSet$EnumType", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FeatureSet$FieldPresence", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FeatureSet$JsonFormat", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FeatureSet$MessageEncoding", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FeatureSet$RepeatedFieldEncoding", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FeatureSet$Utf8Validation", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FeatureSetDefaults", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FeatureSetDefaults$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FeatureSetDefaults$FeatureSetEditionDefault", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FeatureSetDefaults$FeatureSetEditionDefault$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FieldDescriptorProto", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FieldDescriptorProto$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FieldDescriptorProto$Label", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FieldDescriptorProto$Type", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FieldOptions", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FieldOptions$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FieldOptions$CType", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FieldOptions$EditionDefault", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FieldOptions$EditionDefault$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FieldOptions$JSType", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FieldOptions$OptionRetention", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FieldOptions$OptionTargetType", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FileDescriptorProto", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FileDescriptorProto$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FileDescriptorSet", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FileDescriptorSet$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FileOptions", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FileOptions$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$FileOptions$OptimizeMode", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$GeneratedCodeInfo", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$GeneratedCodeInfo$Annotation", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$GeneratedCodeInfo$Annotation$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$GeneratedCodeInfo$Annotation$Semantic", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$GeneratedCodeInfo$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$MessageOptions", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$MessageOptions$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$MethodDescriptorProto", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$MethodDescriptorProto$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$MethodOptions", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$MethodOptions$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$MethodOptions$IdempotencyLevel", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$OneofDescriptorProto", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$OneofDescriptorProto$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$OneofOptions", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$OneofOptions$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$ServiceDescriptorProto", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$ServiceDescriptorProto$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$ServiceOptions", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$ServiceOptions$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$SourceCodeInfo", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$SourceCodeInfo$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$SourceCodeInfo$Location", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$SourceCodeInfo$Location$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$UninterpretedOption", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$UninterpretedOption$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$UninterpretedOption$NamePart", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.DescriptorProtos$UninterpretedOption$NamePart$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.Duration", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.Duration$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.Empty", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.Empty$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.FieldMask", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.FieldMask$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.Timestamp", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.protobuf.Timestamp$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.type.Expr", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + }, + { + "name": "com.google.type.Expr$Builder", + "queryAllDeclaredConstructors": true, + "queryAllPublicConstructors": true, + "queryAllDeclaredMethods": true, + "allPublicMethods": true, + "allDeclaredClasses": true, + "allPublicClasses": true + } +] \ No newline at end of file diff --git a/java-secretmanager/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/MockSecretManagerService.java b/java-secretmanager/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/MockSecretManagerService.java new file mode 100644 index 000000000000..441501949d75 --- /dev/null +++ b/java-secretmanager/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/MockSecretManagerService.java @@ -0,0 +1,59 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1; + +import com.google.api.core.BetaApi; +import com.google.api.gax.grpc.testing.MockGrpcService; +import com.google.protobuf.AbstractMessage; +import io.grpc.ServerServiceDefinition; +import java.util.List; +import javax.annotation.Generated; + +@BetaApi +@Generated("by gapic-generator-java") +public class MockSecretManagerService implements MockGrpcService { + private final MockSecretManagerServiceImpl serviceImpl; + + public MockSecretManagerService() { + serviceImpl = new MockSecretManagerServiceImpl(); + } + + @Override + public List getRequests() { + return serviceImpl.getRequests(); + } + + @Override + public void addResponse(AbstractMessage response) { + serviceImpl.addResponse(response); + } + + @Override + public void addException(Exception exception) { + serviceImpl.addException(exception); + } + + @Override + public ServerServiceDefinition getServiceDefinition() { + return serviceImpl.bindService(); + } + + @Override + public void reset() { + serviceImpl.reset(); + } +} diff --git a/java-secretmanager/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/MockSecretManagerServiceImpl.java b/java-secretmanager/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/MockSecretManagerServiceImpl.java new file mode 100644 index 000000000000..4d5a0035be5c --- /dev/null +++ b/java-secretmanager/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/MockSecretManagerServiceImpl.java @@ -0,0 +1,378 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1; + +import com.google.api.core.BetaApi; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceGrpc.SecretManagerServiceImplBase; +import com.google.iam.v1.GetIamPolicyRequest; +import com.google.iam.v1.Policy; +import com.google.iam.v1.SetIamPolicyRequest; +import com.google.iam.v1.TestIamPermissionsRequest; +import com.google.iam.v1.TestIamPermissionsResponse; +import com.google.protobuf.AbstractMessage; +import com.google.protobuf.Empty; +import io.grpc.stub.StreamObserver; +import java.util.ArrayList; +import java.util.LinkedList; +import java.util.List; +import java.util.Queue; +import javax.annotation.Generated; + +@BetaApi +@Generated("by gapic-generator-java") +public class MockSecretManagerServiceImpl extends SecretManagerServiceImplBase { + private List requests; + private Queue responses; + + public MockSecretManagerServiceImpl() { + requests = new ArrayList<>(); + responses = new LinkedList<>(); + } + + public List getRequests() { + return requests; + } + + public void addResponse(AbstractMessage response) { + responses.add(response); + } + + public void setResponses(List responses) { + this.responses = new LinkedList(responses); + } + + public void addException(Exception exception) { + responses.add(exception); + } + + public void reset() { + requests = new ArrayList<>(); + responses = new LinkedList<>(); + } + + @Override + public void listSecrets( + ListSecretsRequest request, StreamObserver responseObserver) { + Object response = responses.poll(); + if (response instanceof ListSecretsResponse) { + requests.add(request); + responseObserver.onNext(((ListSecretsResponse) response)); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError(((Exception) response)); + } else { + responseObserver.onError( + new IllegalArgumentException( + String.format( + "Unrecognized response type %s for method ListSecrets, expected %s or %s", + response == null ? "null" : response.getClass().getName(), + ListSecretsResponse.class.getName(), + Exception.class.getName()))); + } + } + + @Override + public void createSecret(CreateSecretRequest request, StreamObserver responseObserver) { + Object response = responses.poll(); + if (response instanceof Secret) { + requests.add(request); + responseObserver.onNext(((Secret) response)); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError(((Exception) response)); + } else { + responseObserver.onError( + new IllegalArgumentException( + String.format( + "Unrecognized response type %s for method CreateSecret, expected %s or %s", + response == null ? "null" : response.getClass().getName(), + Secret.class.getName(), + Exception.class.getName()))); + } + } + + @Override + public void addSecretVersion( + AddSecretVersionRequest request, StreamObserver responseObserver) { + Object response = responses.poll(); + if (response instanceof SecretVersion) { + requests.add(request); + responseObserver.onNext(((SecretVersion) response)); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError(((Exception) response)); + } else { + responseObserver.onError( + new IllegalArgumentException( + String.format( + "Unrecognized response type %s for method AddSecretVersion, expected %s or %s", + response == null ? "null" : response.getClass().getName(), + SecretVersion.class.getName(), + Exception.class.getName()))); + } + } + + @Override + public void getSecret(GetSecretRequest request, StreamObserver responseObserver) { + Object response = responses.poll(); + if (response instanceof Secret) { + requests.add(request); + responseObserver.onNext(((Secret) response)); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError(((Exception) response)); + } else { + responseObserver.onError( + new IllegalArgumentException( + String.format( + "Unrecognized response type %s for method GetSecret, expected %s or %s", + response == null ? "null" : response.getClass().getName(), + Secret.class.getName(), + Exception.class.getName()))); + } + } + + @Override + public void updateSecret(UpdateSecretRequest request, StreamObserver responseObserver) { + Object response = responses.poll(); + if (response instanceof Secret) { + requests.add(request); + responseObserver.onNext(((Secret) response)); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError(((Exception) response)); + } else { + responseObserver.onError( + new IllegalArgumentException( + String.format( + "Unrecognized response type %s for method UpdateSecret, expected %s or %s", + response == null ? "null" : response.getClass().getName(), + Secret.class.getName(), + Exception.class.getName()))); + } + } + + @Override + public void deleteSecret(DeleteSecretRequest request, StreamObserver responseObserver) { + Object response = responses.poll(); + if (response instanceof Empty) { + requests.add(request); + responseObserver.onNext(((Empty) response)); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError(((Exception) response)); + } else { + responseObserver.onError( + new IllegalArgumentException( + String.format( + "Unrecognized response type %s for method DeleteSecret, expected %s or %s", + response == null ? "null" : response.getClass().getName(), + Empty.class.getName(), + Exception.class.getName()))); + } + } + + @Override + public void listSecretVersions( + ListSecretVersionsRequest request, + StreamObserver responseObserver) { + Object response = responses.poll(); + if (response instanceof ListSecretVersionsResponse) { + requests.add(request); + responseObserver.onNext(((ListSecretVersionsResponse) response)); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError(((Exception) response)); + } else { + responseObserver.onError( + new IllegalArgumentException( + String.format( + "Unrecognized response type %s for method ListSecretVersions, expected %s or %s", + response == null ? "null" : response.getClass().getName(), + ListSecretVersionsResponse.class.getName(), + Exception.class.getName()))); + } + } + + @Override + public void getSecretVersion( + GetSecretVersionRequest request, StreamObserver responseObserver) { + Object response = responses.poll(); + if (response instanceof SecretVersion) { + requests.add(request); + responseObserver.onNext(((SecretVersion) response)); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError(((Exception) response)); + } else { + responseObserver.onError( + new IllegalArgumentException( + String.format( + "Unrecognized response type %s for method GetSecretVersion, expected %s or %s", + response == null ? "null" : response.getClass().getName(), + SecretVersion.class.getName(), + Exception.class.getName()))); + } + } + + @Override + public void accessSecretVersion( + AccessSecretVersionRequest request, + StreamObserver responseObserver) { + Object response = responses.poll(); + if (response instanceof AccessSecretVersionResponse) { + requests.add(request); + responseObserver.onNext(((AccessSecretVersionResponse) response)); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError(((Exception) response)); + } else { + responseObserver.onError( + new IllegalArgumentException( + String.format( + "Unrecognized response type %s for method AccessSecretVersion, expected %s or %s", + response == null ? "null" : response.getClass().getName(), + AccessSecretVersionResponse.class.getName(), + Exception.class.getName()))); + } + } + + @Override + public void disableSecretVersion( + DisableSecretVersionRequest request, StreamObserver responseObserver) { + Object response = responses.poll(); + if (response instanceof SecretVersion) { + requests.add(request); + responseObserver.onNext(((SecretVersion) response)); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError(((Exception) response)); + } else { + responseObserver.onError( + new IllegalArgumentException( + String.format( + "Unrecognized response type %s for method DisableSecretVersion, expected %s or %s", + response == null ? "null" : response.getClass().getName(), + SecretVersion.class.getName(), + Exception.class.getName()))); + } + } + + @Override + public void enableSecretVersion( + EnableSecretVersionRequest request, StreamObserver responseObserver) { + Object response = responses.poll(); + if (response instanceof SecretVersion) { + requests.add(request); + responseObserver.onNext(((SecretVersion) response)); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError(((Exception) response)); + } else { + responseObserver.onError( + new IllegalArgumentException( + String.format( + "Unrecognized response type %s for method EnableSecretVersion, expected %s or %s", + response == null ? "null" : response.getClass().getName(), + SecretVersion.class.getName(), + Exception.class.getName()))); + } + } + + @Override + public void destroySecretVersion( + DestroySecretVersionRequest request, StreamObserver responseObserver) { + Object response = responses.poll(); + if (response instanceof SecretVersion) { + requests.add(request); + responseObserver.onNext(((SecretVersion) response)); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError(((Exception) response)); + } else { + responseObserver.onError( + new IllegalArgumentException( + String.format( + "Unrecognized response type %s for method DestroySecretVersion, expected %s or %s", + response == null ? "null" : response.getClass().getName(), + SecretVersion.class.getName(), + Exception.class.getName()))); + } + } + + @Override + public void setIamPolicy(SetIamPolicyRequest request, StreamObserver responseObserver) { + Object response = responses.poll(); + if (response instanceof Policy) { + requests.add(request); + responseObserver.onNext(((Policy) response)); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError(((Exception) response)); + } else { + responseObserver.onError( + new IllegalArgumentException( + String.format( + "Unrecognized response type %s for method SetIamPolicy, expected %s or %s", + response == null ? "null" : response.getClass().getName(), + Policy.class.getName(), + Exception.class.getName()))); + } + } + + @Override + public void getIamPolicy(GetIamPolicyRequest request, StreamObserver responseObserver) { + Object response = responses.poll(); + if (response instanceof Policy) { + requests.add(request); + responseObserver.onNext(((Policy) response)); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError(((Exception) response)); + } else { + responseObserver.onError( + new IllegalArgumentException( + String.format( + "Unrecognized response type %s for method GetIamPolicy, expected %s or %s", + response == null ? "null" : response.getClass().getName(), + Policy.class.getName(), + Exception.class.getName()))); + } + } + + @Override + public void testIamPermissions( + TestIamPermissionsRequest request, + StreamObserver responseObserver) { + Object response = responses.poll(); + if (response instanceof TestIamPermissionsResponse) { + requests.add(request); + responseObserver.onNext(((TestIamPermissionsResponse) response)); + responseObserver.onCompleted(); + } else if (response instanceof Exception) { + responseObserver.onError(((Exception) response)); + } else { + responseObserver.onError( + new IllegalArgumentException( + String.format( + "Unrecognized response type %s for method TestIamPermissions, expected %s or %s", + response == null ? "null" : response.getClass().getName(), + TestIamPermissionsResponse.class.getName(), + Exception.class.getName()))); + } + } +} diff --git a/java-secretmanager/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceClientHttpJsonTest.java b/java-secretmanager/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceClientHttpJsonTest.java new file mode 100644 index 000000000000..3fb2ec32f509 --- /dev/null +++ b/java-secretmanager/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceClientHttpJsonTest.java @@ -0,0 +1,1345 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1; + +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretVersionsPagedResponse; +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretsPagedResponse; + +import com.google.api.gax.core.NoCredentialsProvider; +import com.google.api.gax.httpjson.GaxHttpJsonProperties; +import com.google.api.gax.httpjson.testing.MockHttpService; +import com.google.api.gax.rpc.ApiClientHeaderProvider; +import com.google.api.gax.rpc.ApiException; +import com.google.api.gax.rpc.ApiExceptionFactory; +import com.google.api.gax.rpc.InvalidArgumentException; +import com.google.api.gax.rpc.StatusCode; +import com.google.api.gax.rpc.testing.FakeStatusCode; +import com.google.cloud.secretmanager.v1beta1.stub.HttpJsonSecretManagerServiceStub; +import com.google.common.collect.Lists; +import com.google.iam.v1.AuditConfig; +import com.google.iam.v1.Binding; +import com.google.iam.v1.GetIamPolicyRequest; +import com.google.iam.v1.GetPolicyOptions; +import com.google.iam.v1.Policy; +import com.google.iam.v1.SetIamPolicyRequest; +import com.google.iam.v1.TestIamPermissionsRequest; +import com.google.iam.v1.TestIamPermissionsResponse; +import com.google.protobuf.ByteString; +import com.google.protobuf.Empty; +import com.google.protobuf.FieldMask; +import com.google.protobuf.Timestamp; +import java.io.IOException; +import java.util.ArrayList; +import java.util.Arrays; +import java.util.HashMap; +import java.util.List; +import javax.annotation.Generated; +import org.junit.After; +import org.junit.AfterClass; +import org.junit.Assert; +import org.junit.Before; +import org.junit.BeforeClass; +import org.junit.Test; + +@Generated("by gapic-generator-java") +public class SecretManagerServiceClientHttpJsonTest { + private static MockHttpService mockService; + private static SecretManagerServiceClient client; + + @BeforeClass + public static void startStaticServer() throws IOException { + mockService = + new MockHttpService( + HttpJsonSecretManagerServiceStub.getMethodDescriptors(), + SecretManagerServiceSettings.getDefaultEndpoint()); + SecretManagerServiceSettings settings = + SecretManagerServiceSettings.newHttpJsonBuilder() + .setTransportChannelProvider( + SecretManagerServiceSettings.defaultHttpJsonTransportProviderBuilder() + .setHttpTransport(mockService) + .build()) + .setCredentialsProvider(NoCredentialsProvider.create()) + .build(); + client = SecretManagerServiceClient.create(settings); + } + + @AfterClass + public static void stopServer() { + client.close(); + } + + @Before + public void setUp() {} + + @After + public void tearDown() throws Exception { + mockService.reset(); + } + + @Test + public void listSecretsTest() throws Exception { + Secret responsesElement = Secret.newBuilder().build(); + ListSecretsResponse expectedResponse = + ListSecretsResponse.newBuilder() + .setNextPageToken("") + .addAllSecrets(Arrays.asList(responsesElement)) + .build(); + mockService.addResponse(expectedResponse); + + ProjectName parent = ProjectName.of("[PROJECT]"); + + ListSecretsPagedResponse pagedListResponse = client.listSecrets(parent); + + List resources = Lists.newArrayList(pagedListResponse.iterateAll()); + + Assert.assertEquals(1, resources.size()); + Assert.assertEquals(expectedResponse.getSecretsList().get(0), resources.get(0)); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void listSecretsExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + ProjectName parent = ProjectName.of("[PROJECT]"); + client.listSecrets(parent); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void listSecretsTest2() throws Exception { + Secret responsesElement = Secret.newBuilder().build(); + ListSecretsResponse expectedResponse = + ListSecretsResponse.newBuilder() + .setNextPageToken("") + .addAllSecrets(Arrays.asList(responsesElement)) + .build(); + mockService.addResponse(expectedResponse); + + String parent = "projects/project-2353"; + + ListSecretsPagedResponse pagedListResponse = client.listSecrets(parent); + + List resources = Lists.newArrayList(pagedListResponse.iterateAll()); + + Assert.assertEquals(1, resources.size()); + Assert.assertEquals(expectedResponse.getSecretsList().get(0), resources.get(0)); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void listSecretsExceptionTest2() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + String parent = "projects/project-2353"; + client.listSecrets(parent); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void createSecretTest() throws Exception { + Secret expectedResponse = + Secret.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setReplication(Replication.newBuilder().build()) + .setCreateTime(Timestamp.newBuilder().build()) + .putAllLabels(new HashMap()) + .build(); + mockService.addResponse(expectedResponse); + + ProjectName parent = ProjectName.of("[PROJECT]"); + String secretId = "secretId945974251"; + Secret secret = Secret.newBuilder().build(); + + Secret actualResponse = client.createSecret(parent, secretId, secret); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void createSecretExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + ProjectName parent = ProjectName.of("[PROJECT]"); + String secretId = "secretId945974251"; + Secret secret = Secret.newBuilder().build(); + client.createSecret(parent, secretId, secret); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void createSecretTest2() throws Exception { + Secret expectedResponse = + Secret.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setReplication(Replication.newBuilder().build()) + .setCreateTime(Timestamp.newBuilder().build()) + .putAllLabels(new HashMap()) + .build(); + mockService.addResponse(expectedResponse); + + String parent = "projects/project-2353"; + String secretId = "secretId945974251"; + Secret secret = Secret.newBuilder().build(); + + Secret actualResponse = client.createSecret(parent, secretId, secret); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void createSecretExceptionTest2() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + String parent = "projects/project-2353"; + String secretId = "secretId945974251"; + Secret secret = Secret.newBuilder().build(); + client.createSecret(parent, secretId, secret); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void addSecretVersionTest() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .build(); + mockService.addResponse(expectedResponse); + + SecretName parent = SecretName.of("[PROJECT]", "[SECRET]"); + SecretPayload payload = SecretPayload.newBuilder().build(); + + SecretVersion actualResponse = client.addSecretVersion(parent, payload); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void addSecretVersionExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + SecretName parent = SecretName.of("[PROJECT]", "[SECRET]"); + SecretPayload payload = SecretPayload.newBuilder().build(); + client.addSecretVersion(parent, payload); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void addSecretVersionTest2() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .build(); + mockService.addResponse(expectedResponse); + + String parent = "projects/project-3502/secrets/secret-3502"; + SecretPayload payload = SecretPayload.newBuilder().build(); + + SecretVersion actualResponse = client.addSecretVersion(parent, payload); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void addSecretVersionExceptionTest2() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + String parent = "projects/project-3502/secrets/secret-3502"; + SecretPayload payload = SecretPayload.newBuilder().build(); + client.addSecretVersion(parent, payload); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void getSecretTest() throws Exception { + Secret expectedResponse = + Secret.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setReplication(Replication.newBuilder().build()) + .setCreateTime(Timestamp.newBuilder().build()) + .putAllLabels(new HashMap()) + .build(); + mockService.addResponse(expectedResponse); + + SecretName name = SecretName.of("[PROJECT]", "[SECRET]"); + + Secret actualResponse = client.getSecret(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void getSecretExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + SecretName name = SecretName.of("[PROJECT]", "[SECRET]"); + client.getSecret(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void getSecretTest2() throws Exception { + Secret expectedResponse = + Secret.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setReplication(Replication.newBuilder().build()) + .setCreateTime(Timestamp.newBuilder().build()) + .putAllLabels(new HashMap()) + .build(); + mockService.addResponse(expectedResponse); + + String name = "projects/project-5249/secrets/secret-5249"; + + Secret actualResponse = client.getSecret(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void getSecretExceptionTest2() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + String name = "projects/project-5249/secrets/secret-5249"; + client.getSecret(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void updateSecretTest() throws Exception { + Secret expectedResponse = + Secret.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setReplication(Replication.newBuilder().build()) + .setCreateTime(Timestamp.newBuilder().build()) + .putAllLabels(new HashMap()) + .build(); + mockService.addResponse(expectedResponse); + + Secret secret = + Secret.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setReplication(Replication.newBuilder().build()) + .setCreateTime(Timestamp.newBuilder().build()) + .putAllLabels(new HashMap()) + .build(); + FieldMask updateMask = FieldMask.newBuilder().build(); + + Secret actualResponse = client.updateSecret(secret, updateMask); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void updateSecretExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + Secret secret = + Secret.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setReplication(Replication.newBuilder().build()) + .setCreateTime(Timestamp.newBuilder().build()) + .putAllLabels(new HashMap()) + .build(); + FieldMask updateMask = FieldMask.newBuilder().build(); + client.updateSecret(secret, updateMask); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void deleteSecretTest() throws Exception { + Empty expectedResponse = Empty.newBuilder().build(); + mockService.addResponse(expectedResponse); + + SecretName name = SecretName.of("[PROJECT]", "[SECRET]"); + + client.deleteSecret(name); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void deleteSecretExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + SecretName name = SecretName.of("[PROJECT]", "[SECRET]"); + client.deleteSecret(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void deleteSecretTest2() throws Exception { + Empty expectedResponse = Empty.newBuilder().build(); + mockService.addResponse(expectedResponse); + + String name = "projects/project-5249/secrets/secret-5249"; + + client.deleteSecret(name); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void deleteSecretExceptionTest2() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + String name = "projects/project-5249/secrets/secret-5249"; + client.deleteSecret(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void listSecretVersionsTest() throws Exception { + SecretVersion responsesElement = SecretVersion.newBuilder().build(); + ListSecretVersionsResponse expectedResponse = + ListSecretVersionsResponse.newBuilder() + .setNextPageToken("") + .addAllVersions(Arrays.asList(responsesElement)) + .build(); + mockService.addResponse(expectedResponse); + + SecretName parent = SecretName.of("[PROJECT]", "[SECRET]"); + + ListSecretVersionsPagedResponse pagedListResponse = client.listSecretVersions(parent); + + List resources = Lists.newArrayList(pagedListResponse.iterateAll()); + + Assert.assertEquals(1, resources.size()); + Assert.assertEquals(expectedResponse.getVersionsList().get(0), resources.get(0)); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void listSecretVersionsExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + SecretName parent = SecretName.of("[PROJECT]", "[SECRET]"); + client.listSecretVersions(parent); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void listSecretVersionsTest2() throws Exception { + SecretVersion responsesElement = SecretVersion.newBuilder().build(); + ListSecretVersionsResponse expectedResponse = + ListSecretVersionsResponse.newBuilder() + .setNextPageToken("") + .addAllVersions(Arrays.asList(responsesElement)) + .build(); + mockService.addResponse(expectedResponse); + + String parent = "projects/project-3502/secrets/secret-3502"; + + ListSecretVersionsPagedResponse pagedListResponse = client.listSecretVersions(parent); + + List resources = Lists.newArrayList(pagedListResponse.iterateAll()); + + Assert.assertEquals(1, resources.size()); + Assert.assertEquals(expectedResponse.getVersionsList().get(0), resources.get(0)); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void listSecretVersionsExceptionTest2() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + String parent = "projects/project-3502/secrets/secret-3502"; + client.listSecretVersions(parent); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void getSecretVersionTest() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .build(); + mockService.addResponse(expectedResponse); + + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + SecretVersion actualResponse = client.getSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void getSecretVersionExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + client.getSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void getSecretVersionTest2() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .build(); + mockService.addResponse(expectedResponse); + + String name = "projects/project-4186/secrets/secret-4186/versions/version-4186"; + + SecretVersion actualResponse = client.getSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void getSecretVersionExceptionTest2() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + String name = "projects/project-4186/secrets/secret-4186/versions/version-4186"; + client.getSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void accessSecretVersionTest() throws Exception { + AccessSecretVersionResponse expectedResponse = + AccessSecretVersionResponse.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setPayload(SecretPayload.newBuilder().build()) + .build(); + mockService.addResponse(expectedResponse); + + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + AccessSecretVersionResponse actualResponse = client.accessSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void accessSecretVersionExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + client.accessSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void accessSecretVersionTest2() throws Exception { + AccessSecretVersionResponse expectedResponse = + AccessSecretVersionResponse.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setPayload(SecretPayload.newBuilder().build()) + .build(); + mockService.addResponse(expectedResponse); + + String name = "projects/project-4186/secrets/secret-4186/versions/version-4186"; + + AccessSecretVersionResponse actualResponse = client.accessSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void accessSecretVersionExceptionTest2() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + String name = "projects/project-4186/secrets/secret-4186/versions/version-4186"; + client.accessSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void disableSecretVersionTest() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .build(); + mockService.addResponse(expectedResponse); + + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + SecretVersion actualResponse = client.disableSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void disableSecretVersionExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + client.disableSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void disableSecretVersionTest2() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .build(); + mockService.addResponse(expectedResponse); + + String name = "projects/project-4186/secrets/secret-4186/versions/version-4186"; + + SecretVersion actualResponse = client.disableSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void disableSecretVersionExceptionTest2() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + String name = "projects/project-4186/secrets/secret-4186/versions/version-4186"; + client.disableSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void enableSecretVersionTest() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .build(); + mockService.addResponse(expectedResponse); + + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + SecretVersion actualResponse = client.enableSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void enableSecretVersionExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + client.enableSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void enableSecretVersionTest2() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .build(); + mockService.addResponse(expectedResponse); + + String name = "projects/project-4186/secrets/secret-4186/versions/version-4186"; + + SecretVersion actualResponse = client.enableSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void enableSecretVersionExceptionTest2() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + String name = "projects/project-4186/secrets/secret-4186/versions/version-4186"; + client.enableSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void destroySecretVersionTest() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .build(); + mockService.addResponse(expectedResponse); + + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + SecretVersion actualResponse = client.destroySecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void destroySecretVersionExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + client.destroySecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void destroySecretVersionTest2() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .build(); + mockService.addResponse(expectedResponse); + + String name = "projects/project-4186/secrets/secret-4186/versions/version-4186"; + + SecretVersion actualResponse = client.destroySecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void destroySecretVersionExceptionTest2() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + String name = "projects/project-4186/secrets/secret-4186/versions/version-4186"; + client.destroySecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void setIamPolicyTest() throws Exception { + Policy expectedResponse = + Policy.newBuilder() + .setVersion(351608024) + .addAllBindings(new ArrayList()) + .addAllAuditConfigs(new ArrayList()) + .setEtag(ByteString.EMPTY) + .build(); + mockService.addResponse(expectedResponse); + + SetIamPolicyRequest request = + SetIamPolicyRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setPolicy(Policy.newBuilder().build()) + .setUpdateMask(FieldMask.newBuilder().build()) + .build(); + + Policy actualResponse = client.setIamPolicy(request); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void setIamPolicyExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + SetIamPolicyRequest request = + SetIamPolicyRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setPolicy(Policy.newBuilder().build()) + .setUpdateMask(FieldMask.newBuilder().build()) + .build(); + client.setIamPolicy(request); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void getIamPolicyTest() throws Exception { + Policy expectedResponse = + Policy.newBuilder() + .setVersion(351608024) + .addAllBindings(new ArrayList()) + .addAllAuditConfigs(new ArrayList()) + .setEtag(ByteString.EMPTY) + .build(); + mockService.addResponse(expectedResponse); + + GetIamPolicyRequest request = + GetIamPolicyRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setOptions(GetPolicyOptions.newBuilder().build()) + .build(); + + Policy actualResponse = client.getIamPolicy(request); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void getIamPolicyExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + GetIamPolicyRequest request = + GetIamPolicyRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setOptions(GetPolicyOptions.newBuilder().build()) + .build(); + client.getIamPolicy(request); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void testIamPermissionsTest() throws Exception { + TestIamPermissionsResponse expectedResponse = + TestIamPermissionsResponse.newBuilder().addAllPermissions(new ArrayList()).build(); + mockService.addResponse(expectedResponse); + + TestIamPermissionsRequest request = + TestIamPermissionsRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .addAllPermissions(new ArrayList()) + .build(); + + TestIamPermissionsResponse actualResponse = client.testIamPermissions(request); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void testIamPermissionsExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + TestIamPermissionsRequest request = + TestIamPermissionsRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .addAllPermissions(new ArrayList()) + .build(); + client.testIamPermissions(request); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } +} diff --git a/java-secretmanager/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceClientTest.java b/java-secretmanager/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceClientTest.java new file mode 100644 index 000000000000..d0fb2d9dff78 --- /dev/null +++ b/java-secretmanager/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceClientTest.java @@ -0,0 +1,1195 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1; + +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretVersionsPagedResponse; +import static com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient.ListSecretsPagedResponse; + +import com.google.api.gax.core.NoCredentialsProvider; +import com.google.api.gax.grpc.GaxGrpcProperties; +import com.google.api.gax.grpc.testing.LocalChannelProvider; +import com.google.api.gax.grpc.testing.MockGrpcService; +import com.google.api.gax.grpc.testing.MockServiceHelper; +import com.google.api.gax.rpc.ApiClientHeaderProvider; +import com.google.api.gax.rpc.InvalidArgumentException; +import com.google.common.collect.Lists; +import com.google.iam.v1.AuditConfig; +import com.google.iam.v1.Binding; +import com.google.iam.v1.GetIamPolicyRequest; +import com.google.iam.v1.GetPolicyOptions; +import com.google.iam.v1.Policy; +import com.google.iam.v1.SetIamPolicyRequest; +import com.google.iam.v1.TestIamPermissionsRequest; +import com.google.iam.v1.TestIamPermissionsResponse; +import com.google.protobuf.AbstractMessage; +import com.google.protobuf.ByteString; +import com.google.protobuf.Empty; +import com.google.protobuf.FieldMask; +import com.google.protobuf.Timestamp; +import io.grpc.StatusRuntimeException; +import java.io.IOException; +import java.util.ArrayList; +import java.util.Arrays; +import java.util.HashMap; +import java.util.List; +import java.util.UUID; +import javax.annotation.Generated; +import org.junit.After; +import org.junit.AfterClass; +import org.junit.Assert; +import org.junit.Before; +import org.junit.BeforeClass; +import org.junit.Test; + +@Generated("by gapic-generator-java") +public class SecretManagerServiceClientTest { + private static MockSecretManagerService mockSecretManagerService; + private static MockServiceHelper mockServiceHelper; + private LocalChannelProvider channelProvider; + private SecretManagerServiceClient client; + + @BeforeClass + public static void startStaticServer() { + mockSecretManagerService = new MockSecretManagerService(); + mockServiceHelper = + new MockServiceHelper( + UUID.randomUUID().toString(), Arrays.asList(mockSecretManagerService)); + mockServiceHelper.start(); + } + + @AfterClass + public static void stopServer() { + mockServiceHelper.stop(); + } + + @Before + public void setUp() throws IOException { + mockServiceHelper.reset(); + channelProvider = mockServiceHelper.createChannelProvider(); + SecretManagerServiceSettings settings = + SecretManagerServiceSettings.newBuilder() + .setTransportChannelProvider(channelProvider) + .setCredentialsProvider(NoCredentialsProvider.create()) + .build(); + client = SecretManagerServiceClient.create(settings); + } + + @After + public void tearDown() throws Exception { + client.close(); + } + + @Test + public void listSecretsTest() throws Exception { + Secret responsesElement = Secret.newBuilder().build(); + ListSecretsResponse expectedResponse = + ListSecretsResponse.newBuilder() + .setNextPageToken("") + .addAllSecrets(Arrays.asList(responsesElement)) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + ProjectName parent = ProjectName.of("[PROJECT]"); + + ListSecretsPagedResponse pagedListResponse = client.listSecrets(parent); + + List resources = Lists.newArrayList(pagedListResponse.iterateAll()); + + Assert.assertEquals(1, resources.size()); + Assert.assertEquals(expectedResponse.getSecretsList().get(0), resources.get(0)); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + ListSecretsRequest actualRequest = ((ListSecretsRequest) actualRequests.get(0)); + + Assert.assertEquals(parent.toString(), actualRequest.getParent()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void listSecretsExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + ProjectName parent = ProjectName.of("[PROJECT]"); + client.listSecrets(parent); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void listSecretsTest2() throws Exception { + Secret responsesElement = Secret.newBuilder().build(); + ListSecretsResponse expectedResponse = + ListSecretsResponse.newBuilder() + .setNextPageToken("") + .addAllSecrets(Arrays.asList(responsesElement)) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + String parent = "parent-995424086"; + + ListSecretsPagedResponse pagedListResponse = client.listSecrets(parent); + + List resources = Lists.newArrayList(pagedListResponse.iterateAll()); + + Assert.assertEquals(1, resources.size()); + Assert.assertEquals(expectedResponse.getSecretsList().get(0), resources.get(0)); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + ListSecretsRequest actualRequest = ((ListSecretsRequest) actualRequests.get(0)); + + Assert.assertEquals(parent, actualRequest.getParent()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void listSecretsExceptionTest2() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + String parent = "parent-995424086"; + client.listSecrets(parent); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void createSecretTest() throws Exception { + Secret expectedResponse = + Secret.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setReplication(Replication.newBuilder().build()) + .setCreateTime(Timestamp.newBuilder().build()) + .putAllLabels(new HashMap()) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + ProjectName parent = ProjectName.of("[PROJECT]"); + String secretId = "secretId945974251"; + Secret secret = Secret.newBuilder().build(); + + Secret actualResponse = client.createSecret(parent, secretId, secret); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + CreateSecretRequest actualRequest = ((CreateSecretRequest) actualRequests.get(0)); + + Assert.assertEquals(parent.toString(), actualRequest.getParent()); + Assert.assertEquals(secretId, actualRequest.getSecretId()); + Assert.assertEquals(secret, actualRequest.getSecret()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void createSecretExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + ProjectName parent = ProjectName.of("[PROJECT]"); + String secretId = "secretId945974251"; + Secret secret = Secret.newBuilder().build(); + client.createSecret(parent, secretId, secret); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void createSecretTest2() throws Exception { + Secret expectedResponse = + Secret.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setReplication(Replication.newBuilder().build()) + .setCreateTime(Timestamp.newBuilder().build()) + .putAllLabels(new HashMap()) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + String parent = "parent-995424086"; + String secretId = "secretId945974251"; + Secret secret = Secret.newBuilder().build(); + + Secret actualResponse = client.createSecret(parent, secretId, secret); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + CreateSecretRequest actualRequest = ((CreateSecretRequest) actualRequests.get(0)); + + Assert.assertEquals(parent, actualRequest.getParent()); + Assert.assertEquals(secretId, actualRequest.getSecretId()); + Assert.assertEquals(secret, actualRequest.getSecret()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void createSecretExceptionTest2() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + String parent = "parent-995424086"; + String secretId = "secretId945974251"; + Secret secret = Secret.newBuilder().build(); + client.createSecret(parent, secretId, secret); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void addSecretVersionTest() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + SecretName parent = SecretName.of("[PROJECT]", "[SECRET]"); + SecretPayload payload = SecretPayload.newBuilder().build(); + + SecretVersion actualResponse = client.addSecretVersion(parent, payload); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + AddSecretVersionRequest actualRequest = ((AddSecretVersionRequest) actualRequests.get(0)); + + Assert.assertEquals(parent.toString(), actualRequest.getParent()); + Assert.assertEquals(payload, actualRequest.getPayload()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void addSecretVersionExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + SecretName parent = SecretName.of("[PROJECT]", "[SECRET]"); + SecretPayload payload = SecretPayload.newBuilder().build(); + client.addSecretVersion(parent, payload); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void addSecretVersionTest2() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + String parent = "parent-995424086"; + SecretPayload payload = SecretPayload.newBuilder().build(); + + SecretVersion actualResponse = client.addSecretVersion(parent, payload); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + AddSecretVersionRequest actualRequest = ((AddSecretVersionRequest) actualRequests.get(0)); + + Assert.assertEquals(parent, actualRequest.getParent()); + Assert.assertEquals(payload, actualRequest.getPayload()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void addSecretVersionExceptionTest2() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + String parent = "parent-995424086"; + SecretPayload payload = SecretPayload.newBuilder().build(); + client.addSecretVersion(parent, payload); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void getSecretTest() throws Exception { + Secret expectedResponse = + Secret.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setReplication(Replication.newBuilder().build()) + .setCreateTime(Timestamp.newBuilder().build()) + .putAllLabels(new HashMap()) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + SecretName name = SecretName.of("[PROJECT]", "[SECRET]"); + + Secret actualResponse = client.getSecret(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + GetSecretRequest actualRequest = ((GetSecretRequest) actualRequests.get(0)); + + Assert.assertEquals(name.toString(), actualRequest.getName()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void getSecretExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + SecretName name = SecretName.of("[PROJECT]", "[SECRET]"); + client.getSecret(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void getSecretTest2() throws Exception { + Secret expectedResponse = + Secret.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setReplication(Replication.newBuilder().build()) + .setCreateTime(Timestamp.newBuilder().build()) + .putAllLabels(new HashMap()) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + String name = "name3373707"; + + Secret actualResponse = client.getSecret(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + GetSecretRequest actualRequest = ((GetSecretRequest) actualRequests.get(0)); + + Assert.assertEquals(name, actualRequest.getName()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void getSecretExceptionTest2() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + String name = "name3373707"; + client.getSecret(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void updateSecretTest() throws Exception { + Secret expectedResponse = + Secret.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setReplication(Replication.newBuilder().build()) + .setCreateTime(Timestamp.newBuilder().build()) + .putAllLabels(new HashMap()) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + Secret secret = Secret.newBuilder().build(); + FieldMask updateMask = FieldMask.newBuilder().build(); + + Secret actualResponse = client.updateSecret(secret, updateMask); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + UpdateSecretRequest actualRequest = ((UpdateSecretRequest) actualRequests.get(0)); + + Assert.assertEquals(secret, actualRequest.getSecret()); + Assert.assertEquals(updateMask, actualRequest.getUpdateMask()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void updateSecretExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + Secret secret = Secret.newBuilder().build(); + FieldMask updateMask = FieldMask.newBuilder().build(); + client.updateSecret(secret, updateMask); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void deleteSecretTest() throws Exception { + Empty expectedResponse = Empty.newBuilder().build(); + mockSecretManagerService.addResponse(expectedResponse); + + SecretName name = SecretName.of("[PROJECT]", "[SECRET]"); + + client.deleteSecret(name); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + DeleteSecretRequest actualRequest = ((DeleteSecretRequest) actualRequests.get(0)); + + Assert.assertEquals(name.toString(), actualRequest.getName()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void deleteSecretExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + SecretName name = SecretName.of("[PROJECT]", "[SECRET]"); + client.deleteSecret(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void deleteSecretTest2() throws Exception { + Empty expectedResponse = Empty.newBuilder().build(); + mockSecretManagerService.addResponse(expectedResponse); + + String name = "name3373707"; + + client.deleteSecret(name); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + DeleteSecretRequest actualRequest = ((DeleteSecretRequest) actualRequests.get(0)); + + Assert.assertEquals(name, actualRequest.getName()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void deleteSecretExceptionTest2() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + String name = "name3373707"; + client.deleteSecret(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void listSecretVersionsTest() throws Exception { + SecretVersion responsesElement = SecretVersion.newBuilder().build(); + ListSecretVersionsResponse expectedResponse = + ListSecretVersionsResponse.newBuilder() + .setNextPageToken("") + .addAllVersions(Arrays.asList(responsesElement)) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + SecretName parent = SecretName.of("[PROJECT]", "[SECRET]"); + + ListSecretVersionsPagedResponse pagedListResponse = client.listSecretVersions(parent); + + List resources = Lists.newArrayList(pagedListResponse.iterateAll()); + + Assert.assertEquals(1, resources.size()); + Assert.assertEquals(expectedResponse.getVersionsList().get(0), resources.get(0)); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + ListSecretVersionsRequest actualRequest = ((ListSecretVersionsRequest) actualRequests.get(0)); + + Assert.assertEquals(parent.toString(), actualRequest.getParent()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void listSecretVersionsExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + SecretName parent = SecretName.of("[PROJECT]", "[SECRET]"); + client.listSecretVersions(parent); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void listSecretVersionsTest2() throws Exception { + SecretVersion responsesElement = SecretVersion.newBuilder().build(); + ListSecretVersionsResponse expectedResponse = + ListSecretVersionsResponse.newBuilder() + .setNextPageToken("") + .addAllVersions(Arrays.asList(responsesElement)) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + String parent = "parent-995424086"; + + ListSecretVersionsPagedResponse pagedListResponse = client.listSecretVersions(parent); + + List resources = Lists.newArrayList(pagedListResponse.iterateAll()); + + Assert.assertEquals(1, resources.size()); + Assert.assertEquals(expectedResponse.getVersionsList().get(0), resources.get(0)); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + ListSecretVersionsRequest actualRequest = ((ListSecretVersionsRequest) actualRequests.get(0)); + + Assert.assertEquals(parent, actualRequest.getParent()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void listSecretVersionsExceptionTest2() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + String parent = "parent-995424086"; + client.listSecretVersions(parent); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void getSecretVersionTest() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + SecretVersion actualResponse = client.getSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + GetSecretVersionRequest actualRequest = ((GetSecretVersionRequest) actualRequests.get(0)); + + Assert.assertEquals(name.toString(), actualRequest.getName()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void getSecretVersionExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + client.getSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void getSecretVersionTest2() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + String name = "name3373707"; + + SecretVersion actualResponse = client.getSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + GetSecretVersionRequest actualRequest = ((GetSecretVersionRequest) actualRequests.get(0)); + + Assert.assertEquals(name, actualRequest.getName()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void getSecretVersionExceptionTest2() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + String name = "name3373707"; + client.getSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void accessSecretVersionTest() throws Exception { + AccessSecretVersionResponse expectedResponse = + AccessSecretVersionResponse.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setPayload(SecretPayload.newBuilder().build()) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + AccessSecretVersionResponse actualResponse = client.accessSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + AccessSecretVersionRequest actualRequest = ((AccessSecretVersionRequest) actualRequests.get(0)); + + Assert.assertEquals(name.toString(), actualRequest.getName()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void accessSecretVersionExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + client.accessSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void accessSecretVersionTest2() throws Exception { + AccessSecretVersionResponse expectedResponse = + AccessSecretVersionResponse.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setPayload(SecretPayload.newBuilder().build()) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + String name = "name3373707"; + + AccessSecretVersionResponse actualResponse = client.accessSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + AccessSecretVersionRequest actualRequest = ((AccessSecretVersionRequest) actualRequests.get(0)); + + Assert.assertEquals(name, actualRequest.getName()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void accessSecretVersionExceptionTest2() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + String name = "name3373707"; + client.accessSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void disableSecretVersionTest() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + SecretVersion actualResponse = client.disableSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + DisableSecretVersionRequest actualRequest = + ((DisableSecretVersionRequest) actualRequests.get(0)); + + Assert.assertEquals(name.toString(), actualRequest.getName()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void disableSecretVersionExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + client.disableSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void disableSecretVersionTest2() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + String name = "name3373707"; + + SecretVersion actualResponse = client.disableSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + DisableSecretVersionRequest actualRequest = + ((DisableSecretVersionRequest) actualRequests.get(0)); + + Assert.assertEquals(name, actualRequest.getName()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void disableSecretVersionExceptionTest2() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + String name = "name3373707"; + client.disableSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void enableSecretVersionTest() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + SecretVersion actualResponse = client.enableSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + EnableSecretVersionRequest actualRequest = ((EnableSecretVersionRequest) actualRequests.get(0)); + + Assert.assertEquals(name.toString(), actualRequest.getName()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void enableSecretVersionExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + client.enableSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void enableSecretVersionTest2() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + String name = "name3373707"; + + SecretVersion actualResponse = client.enableSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + EnableSecretVersionRequest actualRequest = ((EnableSecretVersionRequest) actualRequests.get(0)); + + Assert.assertEquals(name, actualRequest.getName()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void enableSecretVersionExceptionTest2() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + String name = "name3373707"; + client.enableSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void destroySecretVersionTest() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + SecretVersion actualResponse = client.destroySecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + DestroySecretVersionRequest actualRequest = + ((DestroySecretVersionRequest) actualRequests.get(0)); + + Assert.assertEquals(name.toString(), actualRequest.getName()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void destroySecretVersionExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + client.destroySecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void destroySecretVersionTest2() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + String name = "name3373707"; + + SecretVersion actualResponse = client.destroySecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + DestroySecretVersionRequest actualRequest = + ((DestroySecretVersionRequest) actualRequests.get(0)); + + Assert.assertEquals(name, actualRequest.getName()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void destroySecretVersionExceptionTest2() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + String name = "name3373707"; + client.destroySecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void setIamPolicyTest() throws Exception { + Policy expectedResponse = + Policy.newBuilder() + .setVersion(351608024) + .addAllBindings(new ArrayList()) + .addAllAuditConfigs(new ArrayList()) + .setEtag(ByteString.EMPTY) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + SetIamPolicyRequest request = + SetIamPolicyRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setPolicy(Policy.newBuilder().build()) + .setUpdateMask(FieldMask.newBuilder().build()) + .build(); + + Policy actualResponse = client.setIamPolicy(request); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + SetIamPolicyRequest actualRequest = ((SetIamPolicyRequest) actualRequests.get(0)); + + Assert.assertEquals(request.getResource(), actualRequest.getResource()); + Assert.assertEquals(request.getPolicy(), actualRequest.getPolicy()); + Assert.assertEquals(request.getUpdateMask(), actualRequest.getUpdateMask()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void setIamPolicyExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + SetIamPolicyRequest request = + SetIamPolicyRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setPolicy(Policy.newBuilder().build()) + .setUpdateMask(FieldMask.newBuilder().build()) + .build(); + client.setIamPolicy(request); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void getIamPolicyTest() throws Exception { + Policy expectedResponse = + Policy.newBuilder() + .setVersion(351608024) + .addAllBindings(new ArrayList()) + .addAllAuditConfigs(new ArrayList()) + .setEtag(ByteString.EMPTY) + .build(); + mockSecretManagerService.addResponse(expectedResponse); + + GetIamPolicyRequest request = + GetIamPolicyRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setOptions(GetPolicyOptions.newBuilder().build()) + .build(); + + Policy actualResponse = client.getIamPolicy(request); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + GetIamPolicyRequest actualRequest = ((GetIamPolicyRequest) actualRequests.get(0)); + + Assert.assertEquals(request.getResource(), actualRequest.getResource()); + Assert.assertEquals(request.getOptions(), actualRequest.getOptions()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void getIamPolicyExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + GetIamPolicyRequest request = + GetIamPolicyRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setOptions(GetPolicyOptions.newBuilder().build()) + .build(); + client.getIamPolicy(request); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void testIamPermissionsTest() throws Exception { + TestIamPermissionsResponse expectedResponse = + TestIamPermissionsResponse.newBuilder().addAllPermissions(new ArrayList()).build(); + mockSecretManagerService.addResponse(expectedResponse); + + TestIamPermissionsRequest request = + TestIamPermissionsRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .addAllPermissions(new ArrayList()) + .build(); + + TestIamPermissionsResponse actualResponse = client.testIamPermissions(request); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockSecretManagerService.getRequests(); + Assert.assertEquals(1, actualRequests.size()); + TestIamPermissionsRequest actualRequest = ((TestIamPermissionsRequest) actualRequests.get(0)); + + Assert.assertEquals(request.getResource(), actualRequest.getResource()); + Assert.assertEquals(request.getPermissionsList(), actualRequest.getPermissionsList()); + Assert.assertTrue( + channelProvider.isHeaderSent( + ApiClientHeaderProvider.getDefaultApiClientHeaderKey(), + GaxGrpcProperties.getDefaultApiClientHeaderPattern())); + } + + @Test + public void testIamPermissionsExceptionTest() throws Exception { + StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT); + mockSecretManagerService.addException(exception); + + try { + TestIamPermissionsRequest request = + TestIamPermissionsRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .addAllPermissions(new ArrayList()) + .build(); + client.testIamPermissions(request); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } +} diff --git a/java-secretmanager/grpc-google-cloud-secretmanager-v1beta1/pom.xml b/java-secretmanager/grpc-google-cloud-secretmanager-v1beta1/pom.xml new file mode 100644 index 000000000000..67571ce4833c --- /dev/null +++ b/java-secretmanager/grpc-google-cloud-secretmanager-v1beta1/pom.xml @@ -0,0 +1,45 @@ + + 4.0.0 + com.google.api.grpc + grpc-google-cloud-secretmanager-v1beta1 + 2.57.0-SNAPSHOT + grpc-google-cloud-secretmanager-v1beta1 + GRPC library for google-cloud-secretmanager + + com.google.cloud + google-cloud-secretmanager-parent + 2.57.0-SNAPSHOT + + + + io.grpc + grpc-api + + + io.grpc + grpc-stub + + + io.grpc + grpc-protobuf + + + com.google.protobuf + protobuf-java + + + com.google.api.grpc + proto-google-common-protos + + + com.google.api.grpc + proto-google-cloud-secretmanager-v1beta1 + + + com.google.guava + guava + + + diff --git a/java-secretmanager/grpc-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceGrpc.java b/java-secretmanager/grpc-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceGrpc.java new file mode 100644 index 000000000000..d0d9806501a9 --- /dev/null +++ b/java-secretmanager/grpc-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretManagerServiceGrpc.java @@ -0,0 +1,2168 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +package com.google.cloud.secretmanager.v1beta1; + +import static io.grpc.MethodDescriptor.generateFullMethodName; + +/** + * + * + *
+ * Secret Manager Service
+ * Manages secrets and operations using those secrets. Implements a REST
+ * model with the following objects:
+ * * [Secret][google.cloud.secrets.v1beta1.Secret]
+ * * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
+ * 
+ */ +@javax.annotation.Generated( + value = "by gRPC proto compiler", + comments = "Source: google/cloud/secrets/v1beta1/service.proto") +@io.grpc.stub.annotations.GrpcGenerated +public final class SecretManagerServiceGrpc { + + private SecretManagerServiceGrpc() {} + + public static final java.lang.String SERVICE_NAME = + "google.cloud.secrets.v1beta1.SecretManagerService"; + + // Static method descriptors that strictly reflect the proto. + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.ListSecretsRequest, + com.google.cloud.secretmanager.v1beta1.ListSecretsResponse> + getListSecretsMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "ListSecrets", + requestType = com.google.cloud.secretmanager.v1beta1.ListSecretsRequest.class, + responseType = com.google.cloud.secretmanager.v1beta1.ListSecretsResponse.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.ListSecretsRequest, + com.google.cloud.secretmanager.v1beta1.ListSecretsResponse> + getListSecretsMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.ListSecretsRequest, + com.google.cloud.secretmanager.v1beta1.ListSecretsResponse> + getListSecretsMethod; + if ((getListSecretsMethod = SecretManagerServiceGrpc.getListSecretsMethod) == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getListSecretsMethod = SecretManagerServiceGrpc.getListSecretsMethod) == null) { + SecretManagerServiceGrpc.getListSecretsMethod = + getListSecretsMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName(generateFullMethodName(SERVICE_NAME, "ListSecrets")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secretmanager.v1beta1.ListSecretsRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secretmanager.v1beta1.ListSecretsResponse + .getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("ListSecrets")) + .build(); + } + } + } + return getListSecretsMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.CreateSecretRequest, + com.google.cloud.secretmanager.v1beta1.Secret> + getCreateSecretMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "CreateSecret", + requestType = com.google.cloud.secretmanager.v1beta1.CreateSecretRequest.class, + responseType = com.google.cloud.secretmanager.v1beta1.Secret.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.CreateSecretRequest, + com.google.cloud.secretmanager.v1beta1.Secret> + getCreateSecretMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.CreateSecretRequest, + com.google.cloud.secretmanager.v1beta1.Secret> + getCreateSecretMethod; + if ((getCreateSecretMethod = SecretManagerServiceGrpc.getCreateSecretMethod) == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getCreateSecretMethod = SecretManagerServiceGrpc.getCreateSecretMethod) == null) { + SecretManagerServiceGrpc.getCreateSecretMethod = + getCreateSecretMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName(generateFullMethodName(SERVICE_NAME, "CreateSecret")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secretmanager.v1beta1.CreateSecretRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secretmanager.v1beta1.Secret.getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("CreateSecret")) + .build(); + } + } + } + return getCreateSecretMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.SecretVersion> + getAddSecretVersionMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "AddSecretVersion", + requestType = com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest.class, + responseType = com.google.cloud.secretmanager.v1beta1.SecretVersion.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.SecretVersion> + getAddSecretVersionMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.SecretVersion> + getAddSecretVersionMethod; + if ((getAddSecretVersionMethod = SecretManagerServiceGrpc.getAddSecretVersionMethod) == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getAddSecretVersionMethod = SecretManagerServiceGrpc.getAddSecretVersionMethod) + == null) { + SecretManagerServiceGrpc.getAddSecretVersionMethod = + getAddSecretVersionMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName(generateFullMethodName(SERVICE_NAME, "AddSecretVersion")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secretmanager.v1beta1.SecretVersion + .getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("AddSecretVersion")) + .build(); + } + } + } + return getAddSecretVersionMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.GetSecretRequest, + com.google.cloud.secretmanager.v1beta1.Secret> + getGetSecretMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "GetSecret", + requestType = com.google.cloud.secretmanager.v1beta1.GetSecretRequest.class, + responseType = com.google.cloud.secretmanager.v1beta1.Secret.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.GetSecretRequest, + com.google.cloud.secretmanager.v1beta1.Secret> + getGetSecretMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.GetSecretRequest, + com.google.cloud.secretmanager.v1beta1.Secret> + getGetSecretMethod; + if ((getGetSecretMethod = SecretManagerServiceGrpc.getGetSecretMethod) == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getGetSecretMethod = SecretManagerServiceGrpc.getGetSecretMethod) == null) { + SecretManagerServiceGrpc.getGetSecretMethod = + getGetSecretMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName(generateFullMethodName(SERVICE_NAME, "GetSecret")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secretmanager.v1beta1.GetSecretRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secretmanager.v1beta1.Secret.getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("GetSecret")) + .build(); + } + } + } + return getGetSecretMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest, + com.google.cloud.secretmanager.v1beta1.Secret> + getUpdateSecretMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "UpdateSecret", + requestType = com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest.class, + responseType = com.google.cloud.secretmanager.v1beta1.Secret.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest, + com.google.cloud.secretmanager.v1beta1.Secret> + getUpdateSecretMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest, + com.google.cloud.secretmanager.v1beta1.Secret> + getUpdateSecretMethod; + if ((getUpdateSecretMethod = SecretManagerServiceGrpc.getUpdateSecretMethod) == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getUpdateSecretMethod = SecretManagerServiceGrpc.getUpdateSecretMethod) == null) { + SecretManagerServiceGrpc.getUpdateSecretMethod = + getUpdateSecretMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName(generateFullMethodName(SERVICE_NAME, "UpdateSecret")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secretmanager.v1beta1.Secret.getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("UpdateSecret")) + .build(); + } + } + } + return getUpdateSecretMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest, com.google.protobuf.Empty> + getDeleteSecretMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "DeleteSecret", + requestType = com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest.class, + responseType = com.google.protobuf.Empty.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest, com.google.protobuf.Empty> + getDeleteSecretMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest, com.google.protobuf.Empty> + getDeleteSecretMethod; + if ((getDeleteSecretMethod = SecretManagerServiceGrpc.getDeleteSecretMethod) == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getDeleteSecretMethod = SecretManagerServiceGrpc.getDeleteSecretMethod) == null) { + SecretManagerServiceGrpc.getDeleteSecretMethod = + getDeleteSecretMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName(generateFullMethodName(SERVICE_NAME, "DeleteSecret")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.protobuf.Empty.getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("DeleteSecret")) + .build(); + } + } + } + return getDeleteSecretMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest, + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse> + getListSecretVersionsMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "ListSecretVersions", + requestType = com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest.class, + responseType = com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest, + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse> + getListSecretVersionsMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest, + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse> + getListSecretVersionsMethod; + if ((getListSecretVersionsMethod = SecretManagerServiceGrpc.getListSecretVersionsMethod) + == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getListSecretVersionsMethod = SecretManagerServiceGrpc.getListSecretVersionsMethod) + == null) { + SecretManagerServiceGrpc.getListSecretVersionsMethod = + getListSecretVersionsMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName(generateFullMethodName(SERVICE_NAME, "ListSecretVersions")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse + .getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("ListSecretVersions")) + .build(); + } + } + } + return getListSecretVersionsMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.SecretVersion> + getGetSecretVersionMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "GetSecretVersion", + requestType = com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest.class, + responseType = com.google.cloud.secretmanager.v1beta1.SecretVersion.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.SecretVersion> + getGetSecretVersionMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.SecretVersion> + getGetSecretVersionMethod; + if ((getGetSecretVersionMethod = SecretManagerServiceGrpc.getGetSecretVersionMethod) == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getGetSecretVersionMethod = SecretManagerServiceGrpc.getGetSecretVersionMethod) + == null) { + SecretManagerServiceGrpc.getGetSecretVersionMethod = + getGetSecretVersionMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName(generateFullMethodName(SERVICE_NAME, "GetSecretVersion")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secretmanager.v1beta1.SecretVersion + .getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("GetSecretVersion")) + .build(); + } + } + } + return getGetSecretVersionMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse> + getAccessSecretVersionMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "AccessSecretVersion", + requestType = com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest.class, + responseType = com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse> + getAccessSecretVersionMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse> + getAccessSecretVersionMethod; + if ((getAccessSecretVersionMethod = SecretManagerServiceGrpc.getAccessSecretVersionMethod) + == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getAccessSecretVersionMethod = SecretManagerServiceGrpc.getAccessSecretVersionMethod) + == null) { + SecretManagerServiceGrpc.getAccessSecretVersionMethod = + getAccessSecretVersionMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + generateFullMethodName(SERVICE_NAME, "AccessSecretVersion")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse + .getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("AccessSecretVersion")) + .build(); + } + } + } + return getAccessSecretVersionMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.SecretVersion> + getDisableSecretVersionMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "DisableSecretVersion", + requestType = com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest.class, + responseType = com.google.cloud.secretmanager.v1beta1.SecretVersion.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.SecretVersion> + getDisableSecretVersionMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.SecretVersion> + getDisableSecretVersionMethod; + if ((getDisableSecretVersionMethod = SecretManagerServiceGrpc.getDisableSecretVersionMethod) + == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getDisableSecretVersionMethod = SecretManagerServiceGrpc.getDisableSecretVersionMethod) + == null) { + SecretManagerServiceGrpc.getDisableSecretVersionMethod = + getDisableSecretVersionMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + generateFullMethodName(SERVICE_NAME, "DisableSecretVersion")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secretmanager.v1beta1.SecretVersion + .getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("DisableSecretVersion")) + .build(); + } + } + } + return getDisableSecretVersionMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.SecretVersion> + getEnableSecretVersionMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "EnableSecretVersion", + requestType = com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest.class, + responseType = com.google.cloud.secretmanager.v1beta1.SecretVersion.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.SecretVersion> + getEnableSecretVersionMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.SecretVersion> + getEnableSecretVersionMethod; + if ((getEnableSecretVersionMethod = SecretManagerServiceGrpc.getEnableSecretVersionMethod) + == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getEnableSecretVersionMethod = SecretManagerServiceGrpc.getEnableSecretVersionMethod) + == null) { + SecretManagerServiceGrpc.getEnableSecretVersionMethod = + getEnableSecretVersionMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + generateFullMethodName(SERVICE_NAME, "EnableSecretVersion")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secretmanager.v1beta1.SecretVersion + .getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("EnableSecretVersion")) + .build(); + } + } + } + return getEnableSecretVersionMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.SecretVersion> + getDestroySecretVersionMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "DestroySecretVersion", + requestType = com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest.class, + responseType = com.google.cloud.secretmanager.v1beta1.SecretVersion.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.SecretVersion> + getDestroySecretVersionMethod() { + io.grpc.MethodDescriptor< + com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.SecretVersion> + getDestroySecretVersionMethod; + if ((getDestroySecretVersionMethod = SecretManagerServiceGrpc.getDestroySecretVersionMethod) + == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getDestroySecretVersionMethod = SecretManagerServiceGrpc.getDestroySecretVersionMethod) + == null) { + SecretManagerServiceGrpc.getDestroySecretVersionMethod = + getDestroySecretVersionMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName( + generateFullMethodName(SERVICE_NAME, "DestroySecretVersion")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest + .getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.cloud.secretmanager.v1beta1.SecretVersion + .getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("DestroySecretVersion")) + .build(); + } + } + } + return getDestroySecretVersionMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.iam.v1.SetIamPolicyRequest, com.google.iam.v1.Policy> + getSetIamPolicyMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "SetIamPolicy", + requestType = com.google.iam.v1.SetIamPolicyRequest.class, + responseType = com.google.iam.v1.Policy.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.iam.v1.SetIamPolicyRequest, com.google.iam.v1.Policy> + getSetIamPolicyMethod() { + io.grpc.MethodDescriptor + getSetIamPolicyMethod; + if ((getSetIamPolicyMethod = SecretManagerServiceGrpc.getSetIamPolicyMethod) == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getSetIamPolicyMethod = SecretManagerServiceGrpc.getSetIamPolicyMethod) == null) { + SecretManagerServiceGrpc.getSetIamPolicyMethod = + getSetIamPolicyMethod = + io.grpc.MethodDescriptor + .newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName(generateFullMethodName(SERVICE_NAME, "SetIamPolicy")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.iam.v1.SetIamPolicyRequest.getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.iam.v1.Policy.getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("SetIamPolicy")) + .build(); + } + } + } + return getSetIamPolicyMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.iam.v1.GetIamPolicyRequest, com.google.iam.v1.Policy> + getGetIamPolicyMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "GetIamPolicy", + requestType = com.google.iam.v1.GetIamPolicyRequest.class, + responseType = com.google.iam.v1.Policy.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.iam.v1.GetIamPolicyRequest, com.google.iam.v1.Policy> + getGetIamPolicyMethod() { + io.grpc.MethodDescriptor + getGetIamPolicyMethod; + if ((getGetIamPolicyMethod = SecretManagerServiceGrpc.getGetIamPolicyMethod) == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getGetIamPolicyMethod = SecretManagerServiceGrpc.getGetIamPolicyMethod) == null) { + SecretManagerServiceGrpc.getGetIamPolicyMethod = + getGetIamPolicyMethod = + io.grpc.MethodDescriptor + .newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName(generateFullMethodName(SERVICE_NAME, "GetIamPolicy")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.iam.v1.GetIamPolicyRequest.getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.iam.v1.Policy.getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("GetIamPolicy")) + .build(); + } + } + } + return getGetIamPolicyMethod; + } + + private static volatile io.grpc.MethodDescriptor< + com.google.iam.v1.TestIamPermissionsRequest, com.google.iam.v1.TestIamPermissionsResponse> + getTestIamPermissionsMethod; + + @io.grpc.stub.annotations.RpcMethod( + fullMethodName = SERVICE_NAME + '/' + "TestIamPermissions", + requestType = com.google.iam.v1.TestIamPermissionsRequest.class, + responseType = com.google.iam.v1.TestIamPermissionsResponse.class, + methodType = io.grpc.MethodDescriptor.MethodType.UNARY) + public static io.grpc.MethodDescriptor< + com.google.iam.v1.TestIamPermissionsRequest, com.google.iam.v1.TestIamPermissionsResponse> + getTestIamPermissionsMethod() { + io.grpc.MethodDescriptor< + com.google.iam.v1.TestIamPermissionsRequest, + com.google.iam.v1.TestIamPermissionsResponse> + getTestIamPermissionsMethod; + if ((getTestIamPermissionsMethod = SecretManagerServiceGrpc.getTestIamPermissionsMethod) + == null) { + synchronized (SecretManagerServiceGrpc.class) { + if ((getTestIamPermissionsMethod = SecretManagerServiceGrpc.getTestIamPermissionsMethod) + == null) { + SecretManagerServiceGrpc.getTestIamPermissionsMethod = + getTestIamPermissionsMethod = + io.grpc.MethodDescriptor + . + newBuilder() + .setType(io.grpc.MethodDescriptor.MethodType.UNARY) + .setFullMethodName(generateFullMethodName(SERVICE_NAME, "TestIamPermissions")) + .setSampledToLocalTracing(true) + .setRequestMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.iam.v1.TestIamPermissionsRequest.getDefaultInstance())) + .setResponseMarshaller( + io.grpc.protobuf.ProtoUtils.marshaller( + com.google.iam.v1.TestIamPermissionsResponse.getDefaultInstance())) + .setSchemaDescriptor( + new SecretManagerServiceMethodDescriptorSupplier("TestIamPermissions")) + .build(); + } + } + } + return getTestIamPermissionsMethod; + } + + /** Creates a new async stub that supports all call types for the service */ + public static SecretManagerServiceStub newStub(io.grpc.Channel channel) { + io.grpc.stub.AbstractStub.StubFactory factory = + new io.grpc.stub.AbstractStub.StubFactory() { + @java.lang.Override + public SecretManagerServiceStub newStub( + io.grpc.Channel channel, io.grpc.CallOptions callOptions) { + return new SecretManagerServiceStub(channel, callOptions); + } + }; + return SecretManagerServiceStub.newStub(factory, channel); + } + + /** + * Creates a new blocking-style stub that supports unary and streaming output calls on the service + */ + public static SecretManagerServiceBlockingStub newBlockingStub(io.grpc.Channel channel) { + io.grpc.stub.AbstractStub.StubFactory factory = + new io.grpc.stub.AbstractStub.StubFactory() { + @java.lang.Override + public SecretManagerServiceBlockingStub newStub( + io.grpc.Channel channel, io.grpc.CallOptions callOptions) { + return new SecretManagerServiceBlockingStub(channel, callOptions); + } + }; + return SecretManagerServiceBlockingStub.newStub(factory, channel); + } + + /** Creates a new ListenableFuture-style stub that supports unary calls on the service */ + public static SecretManagerServiceFutureStub newFutureStub(io.grpc.Channel channel) { + io.grpc.stub.AbstractStub.StubFactory factory = + new io.grpc.stub.AbstractStub.StubFactory() { + @java.lang.Override + public SecretManagerServiceFutureStub newStub( + io.grpc.Channel channel, io.grpc.CallOptions callOptions) { + return new SecretManagerServiceFutureStub(channel, callOptions); + } + }; + return SecretManagerServiceFutureStub.newStub(factory, channel); + } + + /** + * + * + *
+   * Secret Manager Service
+   * Manages secrets and operations using those secrets. Implements a REST
+   * model with the following objects:
+   * * [Secret][google.cloud.secrets.v1beta1.Secret]
+   * * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
+   * 
+ */ + public interface AsyncService { + + /** + * + * + *
+     * Lists [Secrets][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + default void listSecrets( + com.google.cloud.secretmanager.v1beta1.ListSecretsRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( + getListSecretsMethod(), responseObserver); + } + + /** + * + * + *
+     * Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + default void createSecret( + com.google.cloud.secretmanager.v1beta1.CreateSecretRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( + getCreateSecretMethod(), responseObserver); + } + + /** + * + * + *
+     * Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret data and attaches
+     * it to an existing [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + default void addSecretVersion( + com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( + getAddSecretVersionMethod(), responseObserver); + } + + /** + * + * + *
+     * Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + default void getSecret( + com.google.cloud.secretmanager.v1beta1.GetSecretRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall(getGetSecretMethod(), responseObserver); + } + + /** + * + * + *
+     * Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + default void updateSecret( + com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( + getUpdateSecretMethod(), responseObserver); + } + + /** + * + * + *
+     * Deletes a [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + default void deleteSecret( + com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest request, + io.grpc.stub.StreamObserver responseObserver) { + io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( + getDeleteSecretMethod(), responseObserver); + } + + /** + * + * + *
+     * Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return secret
+     * data.
+     * 
+ */ + default void listSecretVersions( + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest request, + io.grpc.stub.StreamObserver< + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse> + responseObserver) { + io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( + getListSecretVersionsMethod(), responseObserver); + } + + /** + * + * + *
+     * Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + default void getSecretVersion( + com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( + getGetSecretVersionMethod(), responseObserver); + } + + /** + * + * + *
+     * Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the secret data.
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + default void accessSecretVersion( + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest request, + io.grpc.stub.StreamObserver< + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse> + responseObserver) { + io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( + getAccessSecretVersionMethod(), responseObserver); + } + + /** + * + * + *
+     * Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED].
+     * 
+ */ + default void disableSecretVersion( + com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( + getDisableSecretVersionMethod(), responseObserver); + } + + /** + * + * + *
+     * Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED].
+     * 
+ */ + default void enableSecretVersion( + com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( + getEnableSecretVersionMethod(), responseObserver); + } + + /** + * + * + *
+     * Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably destroys the
+     * secret data.
+     * 
+ */ + default void destroySecretVersion( + com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( + getDestroySecretVersionMethod(), responseObserver); + } + + /** + * + * + *
+     * Sets the access control policy on the specified secret. Replaces any
+     * existing policy.
+     * Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced according
+     * to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + default void setIamPolicy( + com.google.iam.v1.SetIamPolicyRequest request, + io.grpc.stub.StreamObserver responseObserver) { + io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( + getSetIamPolicyMethod(), responseObserver); + } + + /** + * + * + *
+     * Gets the access control policy for a secret.
+     * Returns empty policy if the secret exists and does not have a policy set.
+     * 
+ */ + default void getIamPolicy( + com.google.iam.v1.GetIamPolicyRequest request, + io.grpc.stub.StreamObserver responseObserver) { + io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( + getGetIamPolicyMethod(), responseObserver); + } + + /** + * + * + *
+     * Returns permissions that a caller has for the specified secret.
+     * If the secret does not exist, this call returns an empty set of
+     * permissions, not a NOT_FOUND error.
+     * Note: This operation is designed to be used for building permission-aware
+     * UIs and command-line tools, not for authorization checking. This operation
+     * may "fail open" without warning.
+     * 
+ */ + default void testIamPermissions( + com.google.iam.v1.TestIamPermissionsRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( + getTestIamPermissionsMethod(), responseObserver); + } + } + + /** + * Base class for the server implementation of the service SecretManagerService. + * + *
+   * Secret Manager Service
+   * Manages secrets and operations using those secrets. Implements a REST
+   * model with the following objects:
+   * * [Secret][google.cloud.secrets.v1beta1.Secret]
+   * * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
+   * 
+ */ + public abstract static class SecretManagerServiceImplBase + implements io.grpc.BindableService, AsyncService { + + @java.lang.Override + public final io.grpc.ServerServiceDefinition bindService() { + return SecretManagerServiceGrpc.bindService(this); + } + } + + /** + * A stub to allow clients to do asynchronous rpc calls to service SecretManagerService. + * + *
+   * Secret Manager Service
+   * Manages secrets and operations using those secrets. Implements a REST
+   * model with the following objects:
+   * * [Secret][google.cloud.secrets.v1beta1.Secret]
+   * * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
+   * 
+ */ + public static final class SecretManagerServiceStub + extends io.grpc.stub.AbstractAsyncStub { + private SecretManagerServiceStub(io.grpc.Channel channel, io.grpc.CallOptions callOptions) { + super(channel, callOptions); + } + + @java.lang.Override + protected SecretManagerServiceStub build( + io.grpc.Channel channel, io.grpc.CallOptions callOptions) { + return new SecretManagerServiceStub(channel, callOptions); + } + + /** + * + * + *
+     * Lists [Secrets][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public void listSecrets( + com.google.cloud.secretmanager.v1beta1.ListSecretsRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + io.grpc.stub.ClientCalls.asyncUnaryCall( + getChannel().newCall(getListSecretsMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + public void createSecret( + com.google.cloud.secretmanager.v1beta1.CreateSecretRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + io.grpc.stub.ClientCalls.asyncUnaryCall( + getChannel().newCall(getCreateSecretMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret data and attaches
+     * it to an existing [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public void addSecretVersion( + com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + io.grpc.stub.ClientCalls.asyncUnaryCall( + getChannel().newCall(getAddSecretVersionMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public void getSecret( + com.google.cloud.secretmanager.v1beta1.GetSecretRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + io.grpc.stub.ClientCalls.asyncUnaryCall( + getChannel().newCall(getGetSecretMethod(), getCallOptions()), request, responseObserver); + } + + /** + * + * + *
+     * Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public void updateSecret( + com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + io.grpc.stub.ClientCalls.asyncUnaryCall( + getChannel().newCall(getUpdateSecretMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Deletes a [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public void deleteSecret( + com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest request, + io.grpc.stub.StreamObserver responseObserver) { + io.grpc.stub.ClientCalls.asyncUnaryCall( + getChannel().newCall(getDeleteSecretMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return secret
+     * data.
+     * 
+ */ + public void listSecretVersions( + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest request, + io.grpc.stub.StreamObserver< + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse> + responseObserver) { + io.grpc.stub.ClientCalls.asyncUnaryCall( + getChannel().newCall(getListSecretVersionsMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + public void getSecretVersion( + com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + io.grpc.stub.ClientCalls.asyncUnaryCall( + getChannel().newCall(getGetSecretVersionMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the secret data.
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + public void accessSecretVersion( + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest request, + io.grpc.stub.StreamObserver< + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse> + responseObserver) { + io.grpc.stub.ClientCalls.asyncUnaryCall( + getChannel().newCall(getAccessSecretVersionMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED].
+     * 
+ */ + public void disableSecretVersion( + com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + io.grpc.stub.ClientCalls.asyncUnaryCall( + getChannel().newCall(getDisableSecretVersionMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED].
+     * 
+ */ + public void enableSecretVersion( + com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + io.grpc.stub.ClientCalls.asyncUnaryCall( + getChannel().newCall(getEnableSecretVersionMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably destroys the
+     * secret data.
+     * 
+ */ + public void destroySecretVersion( + com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + io.grpc.stub.ClientCalls.asyncUnaryCall( + getChannel().newCall(getDestroySecretVersionMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Sets the access control policy on the specified secret. Replaces any
+     * existing policy.
+     * Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced according
+     * to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public void setIamPolicy( + com.google.iam.v1.SetIamPolicyRequest request, + io.grpc.stub.StreamObserver responseObserver) { + io.grpc.stub.ClientCalls.asyncUnaryCall( + getChannel().newCall(getSetIamPolicyMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Gets the access control policy for a secret.
+     * Returns empty policy if the secret exists and does not have a policy set.
+     * 
+ */ + public void getIamPolicy( + com.google.iam.v1.GetIamPolicyRequest request, + io.grpc.stub.StreamObserver responseObserver) { + io.grpc.stub.ClientCalls.asyncUnaryCall( + getChannel().newCall(getGetIamPolicyMethod(), getCallOptions()), + request, + responseObserver); + } + + /** + * + * + *
+     * Returns permissions that a caller has for the specified secret.
+     * If the secret does not exist, this call returns an empty set of
+     * permissions, not a NOT_FOUND error.
+     * Note: This operation is designed to be used for building permission-aware
+     * UIs and command-line tools, not for authorization checking. This operation
+     * may "fail open" without warning.
+     * 
+ */ + public void testIamPermissions( + com.google.iam.v1.TestIamPermissionsRequest request, + io.grpc.stub.StreamObserver + responseObserver) { + io.grpc.stub.ClientCalls.asyncUnaryCall( + getChannel().newCall(getTestIamPermissionsMethod(), getCallOptions()), + request, + responseObserver); + } + } + + /** + * A stub to allow clients to do synchronous rpc calls to service SecretManagerService. + * + *
+   * Secret Manager Service
+   * Manages secrets and operations using those secrets. Implements a REST
+   * model with the following objects:
+   * * [Secret][google.cloud.secrets.v1beta1.Secret]
+   * * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
+   * 
+ */ + public static final class SecretManagerServiceBlockingStub + extends io.grpc.stub.AbstractBlockingStub { + private SecretManagerServiceBlockingStub( + io.grpc.Channel channel, io.grpc.CallOptions callOptions) { + super(channel, callOptions); + } + + @java.lang.Override + protected SecretManagerServiceBlockingStub build( + io.grpc.Channel channel, io.grpc.CallOptions callOptions) { + return new SecretManagerServiceBlockingStub(channel, callOptions); + } + + /** + * + * + *
+     * Lists [Secrets][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.cloud.secretmanager.v1beta1.ListSecretsResponse listSecrets( + com.google.cloud.secretmanager.v1beta1.ListSecretsRequest request) { + return io.grpc.stub.ClientCalls.blockingUnaryCall( + getChannel(), getListSecretsMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + public com.google.cloud.secretmanager.v1beta1.Secret createSecret( + com.google.cloud.secretmanager.v1beta1.CreateSecretRequest request) { + return io.grpc.stub.ClientCalls.blockingUnaryCall( + getChannel(), getCreateSecretMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret data and attaches
+     * it to an existing [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.cloud.secretmanager.v1beta1.SecretVersion addSecretVersion( + com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest request) { + return io.grpc.stub.ClientCalls.blockingUnaryCall( + getChannel(), getAddSecretVersionMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.cloud.secretmanager.v1beta1.Secret getSecret( + com.google.cloud.secretmanager.v1beta1.GetSecretRequest request) { + return io.grpc.stub.ClientCalls.blockingUnaryCall( + getChannel(), getGetSecretMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.cloud.secretmanager.v1beta1.Secret updateSecret( + com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest request) { + return io.grpc.stub.ClientCalls.blockingUnaryCall( + getChannel(), getUpdateSecretMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Deletes a [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.protobuf.Empty deleteSecret( + com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest request) { + return io.grpc.stub.ClientCalls.blockingUnaryCall( + getChannel(), getDeleteSecretMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return secret
+     * data.
+     * 
+ */ + public com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse listSecretVersions( + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest request) { + return io.grpc.stub.ClientCalls.blockingUnaryCall( + getChannel(), getListSecretVersionsMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + public com.google.cloud.secretmanager.v1beta1.SecretVersion getSecretVersion( + com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest request) { + return io.grpc.stub.ClientCalls.blockingUnaryCall( + getChannel(), getGetSecretVersionMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the secret data.
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + public com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse accessSecretVersion( + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest request) { + return io.grpc.stub.ClientCalls.blockingUnaryCall( + getChannel(), getAccessSecretVersionMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED].
+     * 
+ */ + public com.google.cloud.secretmanager.v1beta1.SecretVersion disableSecretVersion( + com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest request) { + return io.grpc.stub.ClientCalls.blockingUnaryCall( + getChannel(), getDisableSecretVersionMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED].
+     * 
+ */ + public com.google.cloud.secretmanager.v1beta1.SecretVersion enableSecretVersion( + com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest request) { + return io.grpc.stub.ClientCalls.blockingUnaryCall( + getChannel(), getEnableSecretVersionMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably destroys the
+     * secret data.
+     * 
+ */ + public com.google.cloud.secretmanager.v1beta1.SecretVersion destroySecretVersion( + com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest request) { + return io.grpc.stub.ClientCalls.blockingUnaryCall( + getChannel(), getDestroySecretVersionMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Sets the access control policy on the specified secret. Replaces any
+     * existing policy.
+     * Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced according
+     * to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.iam.v1.Policy setIamPolicy(com.google.iam.v1.SetIamPolicyRequest request) { + return io.grpc.stub.ClientCalls.blockingUnaryCall( + getChannel(), getSetIamPolicyMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Gets the access control policy for a secret.
+     * Returns empty policy if the secret exists and does not have a policy set.
+     * 
+ */ + public com.google.iam.v1.Policy getIamPolicy(com.google.iam.v1.GetIamPolicyRequest request) { + return io.grpc.stub.ClientCalls.blockingUnaryCall( + getChannel(), getGetIamPolicyMethod(), getCallOptions(), request); + } + + /** + * + * + *
+     * Returns permissions that a caller has for the specified secret.
+     * If the secret does not exist, this call returns an empty set of
+     * permissions, not a NOT_FOUND error.
+     * Note: This operation is designed to be used for building permission-aware
+     * UIs and command-line tools, not for authorization checking. This operation
+     * may "fail open" without warning.
+     * 
+ */ + public com.google.iam.v1.TestIamPermissionsResponse testIamPermissions( + com.google.iam.v1.TestIamPermissionsRequest request) { + return io.grpc.stub.ClientCalls.blockingUnaryCall( + getChannel(), getTestIamPermissionsMethod(), getCallOptions(), request); + } + } + + /** + * A stub to allow clients to do ListenableFuture-style rpc calls to service SecretManagerService. + * + *
+   * Secret Manager Service
+   * Manages secrets and operations using those secrets. Implements a REST
+   * model with the following objects:
+   * * [Secret][google.cloud.secrets.v1beta1.Secret]
+   * * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
+   * 
+ */ + public static final class SecretManagerServiceFutureStub + extends io.grpc.stub.AbstractFutureStub { + private SecretManagerServiceFutureStub( + io.grpc.Channel channel, io.grpc.CallOptions callOptions) { + super(channel, callOptions); + } + + @java.lang.Override + protected SecretManagerServiceFutureStub build( + io.grpc.Channel channel, io.grpc.CallOptions callOptions) { + return new SecretManagerServiceFutureStub(channel, callOptions); + } + + /** + * + * + *
+     * Lists [Secrets][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.cloud.secretmanager.v1beta1.ListSecretsResponse> + listSecrets(com.google.cloud.secretmanager.v1beta1.ListSecretsRequest request) { + return io.grpc.stub.ClientCalls.futureUnaryCall( + getChannel().newCall(getListSecretsMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.cloud.secretmanager.v1beta1.Secret> + createSecret(com.google.cloud.secretmanager.v1beta1.CreateSecretRequest request) { + return io.grpc.stub.ClientCalls.futureUnaryCall( + getChannel().newCall(getCreateSecretMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret data and attaches
+     * it to an existing [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.cloud.secretmanager.v1beta1.SecretVersion> + addSecretVersion(com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest request) { + return io.grpc.stub.ClientCalls.futureUnaryCall( + getChannel().newCall(getAddSecretVersionMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.cloud.secretmanager.v1beta1.Secret> + getSecret(com.google.cloud.secretmanager.v1beta1.GetSecretRequest request) { + return io.grpc.stub.ClientCalls.futureUnaryCall( + getChannel().newCall(getGetSecretMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.cloud.secretmanager.v1beta1.Secret> + updateSecret(com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest request) { + return io.grpc.stub.ClientCalls.futureUnaryCall( + getChannel().newCall(getUpdateSecretMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Deletes a [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture + deleteSecret(com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest request) { + return io.grpc.stub.ClientCalls.futureUnaryCall( + getChannel().newCall(getDeleteSecretMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return secret
+     * data.
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse> + listSecretVersions( + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest request) { + return io.grpc.stub.ClientCalls.futureUnaryCall( + getChannel().newCall(getListSecretVersionsMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.cloud.secretmanager.v1beta1.SecretVersion> + getSecretVersion(com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest request) { + return io.grpc.stub.ClientCalls.futureUnaryCall( + getChannel().newCall(getGetSecretVersionMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the secret data.
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse> + accessSecretVersion( + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest request) { + return io.grpc.stub.ClientCalls.futureUnaryCall( + getChannel().newCall(getAccessSecretVersionMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED].
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.cloud.secretmanager.v1beta1.SecretVersion> + disableSecretVersion( + com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest request) { + return io.grpc.stub.ClientCalls.futureUnaryCall( + getChannel().newCall(getDisableSecretVersionMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED].
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.cloud.secretmanager.v1beta1.SecretVersion> + enableSecretVersion( + com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest request) { + return io.grpc.stub.ClientCalls.futureUnaryCall( + getChannel().newCall(getEnableSecretVersionMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably destroys the
+     * secret data.
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.cloud.secretmanager.v1beta1.SecretVersion> + destroySecretVersion( + com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest request) { + return io.grpc.stub.ClientCalls.futureUnaryCall( + getChannel().newCall(getDestroySecretVersionMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Sets the access control policy on the specified secret. Replaces any
+     * existing policy.
+     * Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced according
+     * to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture + setIamPolicy(com.google.iam.v1.SetIamPolicyRequest request) { + return io.grpc.stub.ClientCalls.futureUnaryCall( + getChannel().newCall(getSetIamPolicyMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Gets the access control policy for a secret.
+     * Returns empty policy if the secret exists and does not have a policy set.
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture + getIamPolicy(com.google.iam.v1.GetIamPolicyRequest request) { + return io.grpc.stub.ClientCalls.futureUnaryCall( + getChannel().newCall(getGetIamPolicyMethod(), getCallOptions()), request); + } + + /** + * + * + *
+     * Returns permissions that a caller has for the specified secret.
+     * If the secret does not exist, this call returns an empty set of
+     * permissions, not a NOT_FOUND error.
+     * Note: This operation is designed to be used for building permission-aware
+     * UIs and command-line tools, not for authorization checking. This operation
+     * may "fail open" without warning.
+     * 
+ */ + public com.google.common.util.concurrent.ListenableFuture< + com.google.iam.v1.TestIamPermissionsResponse> + testIamPermissions(com.google.iam.v1.TestIamPermissionsRequest request) { + return io.grpc.stub.ClientCalls.futureUnaryCall( + getChannel().newCall(getTestIamPermissionsMethod(), getCallOptions()), request); + } + } + + private static final int METHODID_LIST_SECRETS = 0; + private static final int METHODID_CREATE_SECRET = 1; + private static final int METHODID_ADD_SECRET_VERSION = 2; + private static final int METHODID_GET_SECRET = 3; + private static final int METHODID_UPDATE_SECRET = 4; + private static final int METHODID_DELETE_SECRET = 5; + private static final int METHODID_LIST_SECRET_VERSIONS = 6; + private static final int METHODID_GET_SECRET_VERSION = 7; + private static final int METHODID_ACCESS_SECRET_VERSION = 8; + private static final int METHODID_DISABLE_SECRET_VERSION = 9; + private static final int METHODID_ENABLE_SECRET_VERSION = 10; + private static final int METHODID_DESTROY_SECRET_VERSION = 11; + private static final int METHODID_SET_IAM_POLICY = 12; + private static final int METHODID_GET_IAM_POLICY = 13; + private static final int METHODID_TEST_IAM_PERMISSIONS = 14; + + private static final class MethodHandlers + implements io.grpc.stub.ServerCalls.UnaryMethod, + io.grpc.stub.ServerCalls.ServerStreamingMethod, + io.grpc.stub.ServerCalls.ClientStreamingMethod, + io.grpc.stub.ServerCalls.BidiStreamingMethod { + private final AsyncService serviceImpl; + private final int methodId; + + MethodHandlers(AsyncService serviceImpl, int methodId) { + this.serviceImpl = serviceImpl; + this.methodId = methodId; + } + + @java.lang.Override + @java.lang.SuppressWarnings("unchecked") + public void invoke(Req request, io.grpc.stub.StreamObserver responseObserver) { + switch (methodId) { + case METHODID_LIST_SECRETS: + serviceImpl.listSecrets( + (com.google.cloud.secretmanager.v1beta1.ListSecretsRequest) request, + (io.grpc.stub.StreamObserver< + com.google.cloud.secretmanager.v1beta1.ListSecretsResponse>) + responseObserver); + break; + case METHODID_CREATE_SECRET: + serviceImpl.createSecret( + (com.google.cloud.secretmanager.v1beta1.CreateSecretRequest) request, + (io.grpc.stub.StreamObserver) + responseObserver); + break; + case METHODID_ADD_SECRET_VERSION: + serviceImpl.addSecretVersion( + (com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest) request, + (io.grpc.stub.StreamObserver) + responseObserver); + break; + case METHODID_GET_SECRET: + serviceImpl.getSecret( + (com.google.cloud.secretmanager.v1beta1.GetSecretRequest) request, + (io.grpc.stub.StreamObserver) + responseObserver); + break; + case METHODID_UPDATE_SECRET: + serviceImpl.updateSecret( + (com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest) request, + (io.grpc.stub.StreamObserver) + responseObserver); + break; + case METHODID_DELETE_SECRET: + serviceImpl.deleteSecret( + (com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest) request, + (io.grpc.stub.StreamObserver) responseObserver); + break; + case METHODID_LIST_SECRET_VERSIONS: + serviceImpl.listSecretVersions( + (com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest) request, + (io.grpc.stub.StreamObserver< + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse>) + responseObserver); + break; + case METHODID_GET_SECRET_VERSION: + serviceImpl.getSecretVersion( + (com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest) request, + (io.grpc.stub.StreamObserver) + responseObserver); + break; + case METHODID_ACCESS_SECRET_VERSION: + serviceImpl.accessSecretVersion( + (com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest) request, + (io.grpc.stub.StreamObserver< + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse>) + responseObserver); + break; + case METHODID_DISABLE_SECRET_VERSION: + serviceImpl.disableSecretVersion( + (com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest) request, + (io.grpc.stub.StreamObserver) + responseObserver); + break; + case METHODID_ENABLE_SECRET_VERSION: + serviceImpl.enableSecretVersion( + (com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest) request, + (io.grpc.stub.StreamObserver) + responseObserver); + break; + case METHODID_DESTROY_SECRET_VERSION: + serviceImpl.destroySecretVersion( + (com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest) request, + (io.grpc.stub.StreamObserver) + responseObserver); + break; + case METHODID_SET_IAM_POLICY: + serviceImpl.setIamPolicy( + (com.google.iam.v1.SetIamPolicyRequest) request, + (io.grpc.stub.StreamObserver) responseObserver); + break; + case METHODID_GET_IAM_POLICY: + serviceImpl.getIamPolicy( + (com.google.iam.v1.GetIamPolicyRequest) request, + (io.grpc.stub.StreamObserver) responseObserver); + break; + case METHODID_TEST_IAM_PERMISSIONS: + serviceImpl.testIamPermissions( + (com.google.iam.v1.TestIamPermissionsRequest) request, + (io.grpc.stub.StreamObserver) + responseObserver); + break; + default: + throw new AssertionError(); + } + } + + @java.lang.Override + @java.lang.SuppressWarnings("unchecked") + public io.grpc.stub.StreamObserver invoke( + io.grpc.stub.StreamObserver responseObserver) { + switch (methodId) { + default: + throw new AssertionError(); + } + } + } + + public static final io.grpc.ServerServiceDefinition bindService(AsyncService service) { + return io.grpc.ServerServiceDefinition.builder(getServiceDescriptor()) + .addMethod( + getListSecretsMethod(), + io.grpc.stub.ServerCalls.asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secretmanager.v1beta1.ListSecretsRequest, + com.google.cloud.secretmanager.v1beta1.ListSecretsResponse>( + service, METHODID_LIST_SECRETS))) + .addMethod( + getCreateSecretMethod(), + io.grpc.stub.ServerCalls.asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secretmanager.v1beta1.CreateSecretRequest, + com.google.cloud.secretmanager.v1beta1.Secret>( + service, METHODID_CREATE_SECRET))) + .addMethod( + getAddSecretVersionMethod(), + io.grpc.stub.ServerCalls.asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.SecretVersion>( + service, METHODID_ADD_SECRET_VERSION))) + .addMethod( + getGetSecretMethod(), + io.grpc.stub.ServerCalls.asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secretmanager.v1beta1.GetSecretRequest, + com.google.cloud.secretmanager.v1beta1.Secret>(service, METHODID_GET_SECRET))) + .addMethod( + getUpdateSecretMethod(), + io.grpc.stub.ServerCalls.asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest, + com.google.cloud.secretmanager.v1beta1.Secret>( + service, METHODID_UPDATE_SECRET))) + .addMethod( + getDeleteSecretMethod(), + io.grpc.stub.ServerCalls.asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest, + com.google.protobuf.Empty>(service, METHODID_DELETE_SECRET))) + .addMethod( + getListSecretVersionsMethod(), + io.grpc.stub.ServerCalls.asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest, + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse>( + service, METHODID_LIST_SECRET_VERSIONS))) + .addMethod( + getGetSecretVersionMethod(), + io.grpc.stub.ServerCalls.asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.SecretVersion>( + service, METHODID_GET_SECRET_VERSION))) + .addMethod( + getAccessSecretVersionMethod(), + io.grpc.stub.ServerCalls.asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse>( + service, METHODID_ACCESS_SECRET_VERSION))) + .addMethod( + getDisableSecretVersionMethod(), + io.grpc.stub.ServerCalls.asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.SecretVersion>( + service, METHODID_DISABLE_SECRET_VERSION))) + .addMethod( + getEnableSecretVersionMethod(), + io.grpc.stub.ServerCalls.asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.SecretVersion>( + service, METHODID_ENABLE_SECRET_VERSION))) + .addMethod( + getDestroySecretVersionMethod(), + io.grpc.stub.ServerCalls.asyncUnaryCall( + new MethodHandlers< + com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest, + com.google.cloud.secretmanager.v1beta1.SecretVersion>( + service, METHODID_DESTROY_SECRET_VERSION))) + .addMethod( + getSetIamPolicyMethod(), + io.grpc.stub.ServerCalls.asyncUnaryCall( + new MethodHandlers( + service, METHODID_SET_IAM_POLICY))) + .addMethod( + getGetIamPolicyMethod(), + io.grpc.stub.ServerCalls.asyncUnaryCall( + new MethodHandlers( + service, METHODID_GET_IAM_POLICY))) + .addMethod( + getTestIamPermissionsMethod(), + io.grpc.stub.ServerCalls.asyncUnaryCall( + new MethodHandlers< + com.google.iam.v1.TestIamPermissionsRequest, + com.google.iam.v1.TestIamPermissionsResponse>( + service, METHODID_TEST_IAM_PERMISSIONS))) + .build(); + } + + private abstract static class SecretManagerServiceBaseDescriptorSupplier + implements io.grpc.protobuf.ProtoFileDescriptorSupplier, + io.grpc.protobuf.ProtoServiceDescriptorSupplier { + SecretManagerServiceBaseDescriptorSupplier() {} + + @java.lang.Override + public com.google.protobuf.Descriptors.FileDescriptor getFileDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto.getDescriptor(); + } + + @java.lang.Override + public com.google.protobuf.Descriptors.ServiceDescriptor getServiceDescriptor() { + return getFileDescriptor().findServiceByName("SecretManagerService"); + } + } + + private static final class SecretManagerServiceFileDescriptorSupplier + extends SecretManagerServiceBaseDescriptorSupplier { + SecretManagerServiceFileDescriptorSupplier() {} + } + + private static final class SecretManagerServiceMethodDescriptorSupplier + extends SecretManagerServiceBaseDescriptorSupplier + implements io.grpc.protobuf.ProtoMethodDescriptorSupplier { + private final java.lang.String methodName; + + SecretManagerServiceMethodDescriptorSupplier(java.lang.String methodName) { + this.methodName = methodName; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.MethodDescriptor getMethodDescriptor() { + return getServiceDescriptor().findMethodByName(methodName); + } + } + + private static volatile io.grpc.ServiceDescriptor serviceDescriptor; + + public static io.grpc.ServiceDescriptor getServiceDescriptor() { + io.grpc.ServiceDescriptor result = serviceDescriptor; + if (result == null) { + synchronized (SecretManagerServiceGrpc.class) { + result = serviceDescriptor; + if (result == null) { + serviceDescriptor = + result = + io.grpc.ServiceDescriptor.newBuilder(SERVICE_NAME) + .setSchemaDescriptor(new SecretManagerServiceFileDescriptorSupplier()) + .addMethod(getListSecretsMethod()) + .addMethod(getCreateSecretMethod()) + .addMethod(getAddSecretVersionMethod()) + .addMethod(getGetSecretMethod()) + .addMethod(getUpdateSecretMethod()) + .addMethod(getDeleteSecretMethod()) + .addMethod(getListSecretVersionsMethod()) + .addMethod(getGetSecretVersionMethod()) + .addMethod(getAccessSecretVersionMethod()) + .addMethod(getDisableSecretVersionMethod()) + .addMethod(getEnableSecretVersionMethod()) + .addMethod(getDestroySecretVersionMethod()) + .addMethod(getSetIamPolicyMethod()) + .addMethod(getGetIamPolicyMethod()) + .addMethod(getTestIamPermissionsMethod()) + .build(); + } + } + } + return result; + } +} diff --git a/java-secretmanager/pom.xml b/java-secretmanager/pom.xml index abb460a6cb8c..4aacb4ee2804 100644 --- a/java-secretmanager/pom.xml +++ b/java-secretmanager/pom.xml @@ -31,6 +31,16 @@ proto-google-cloud-secretmanager-v1 2.57.0-SNAPSHOT + + com.google.api.grpc + proto-google-cloud-secretmanager-v1beta1 + 2.57.0-SNAPSHOT + + + com.google.api.grpc + grpc-google-cloud-secretmanager-v1beta1 + 2.57.0-SNAPSHOT + com.google.api.grpc proto-google-cloud-secretmanager-v1beta2 @@ -58,8 +68,10 @@ google-cloud-secretmanager grpc-google-cloud-secretmanager-v1 grpc-google-cloud-secretmanager-v1beta2 + grpc-google-cloud-secretmanager-v1beta1 proto-google-cloud-secretmanager-v1 proto-google-cloud-secretmanager-v1beta2 + proto-google-cloud-secretmanager-v1beta1 google-cloud-secretmanager-bom diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/clirr-ignored-differences.xml b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/clirr-ignored-differences.xml new file mode 100644 index 000000000000..70e35c15384c --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/clirr-ignored-differences.xml @@ -0,0 +1,5 @@ + + + + + diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/pom.xml b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/pom.xml new file mode 100644 index 000000000000..02d07eca46da --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/pom.xml @@ -0,0 +1,37 @@ + + 4.0.0 + com.google.api.grpc + proto-google-cloud-secretmanager-v1beta1 + 2.57.0-SNAPSHOT + proto-google-cloud-secretmanager-v1beta1 + Proto library for google-cloud-secretmanager + + com.google.cloud + google-cloud-secretmanager-parent + 2.57.0-SNAPSHOT + + + + com.google.protobuf + protobuf-java + + + com.google.api.grpc + proto-google-common-protos + + + com.google.api.grpc + proto-google-iam-v1 + + + com.google.api + api-common + + + com.google.guava + guava + + + diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AccessSecretVersionRequest.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AccessSecretVersionRequest.java new file mode 100644 index 000000000000..b367222db437 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AccessSecretVersionRequest.java @@ -0,0 +1,656 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.AccessSecretVersionRequest} + */ +public final class AccessSecretVersionRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.AccessSecretVersionRequest) + AccessSecretVersionRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use AccessSecretVersionRequest.newBuilder() to construct. + private AccessSecretVersionRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private AccessSecretVersionRequest() { + name_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new AccessSecretVersionRequest(); + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest.class, + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest.Builder.class); + } + + public static final int NAME_FIELD_NUMBER = 1; + + @SuppressWarnings("serial") + private volatile java.lang.Object name_ = ""; + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + @java.lang.Override + public java.lang.String getName() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } + } + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + @java.lang.Override + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); + } + getUnknownFields().writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); + } + size += getUnknownFields().getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest)) { + return super.equals(obj); + } + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest other = + (com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest) obj; + + if (!getName().equals(other.getName())) return false; + if (!getUnknownFields().equals(other.getUnknownFields())) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + NAME_FIELD_NUMBER; + hash = (53 * hash) + getName().hashCode(); + hash = (29 * hash) + getUnknownFields().hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest parseFrom( + byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest + parseDelimitedFrom(java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest + parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.AccessSecretVersionRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.AccessSecretVersionRequest) + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest.class, + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest.Builder.class); + } + + // Construct using + // com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest.newBuilder() + private Builder() {} + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + } + + @java.lang.Override + public Builder clear() { + super.clear(); + bitField0_ = 0; + name_ = ""; + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest + getDefaultInstanceForType() { + return com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest build() { + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest buildPartial() { + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest result = + new com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest(this); + if (bitField0_ != 0) { + buildPartial0(result); + } + onBuilt(); + return result; + } + + private void buildPartial0( + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest result) { + int from_bitField0_ = bitField0_; + if (((from_bitField0_ & 0x00000001) != 0)) { + result.name_ = name_; + } + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest) { + return mergeFrom((com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom( + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest other) { + if (other + == com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest.getDefaultInstance()) + return this; + if (!other.getName().isEmpty()) { + name_ = other.name_; + bitField0_ |= 0x00000001; + onChanged(); + } + this.mergeUnknownFields(other.getUnknownFields()); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + name_ = input.readStringRequireUtf8(); + bitField0_ |= 0x00000001; + break; + } // case 10 + default: + { + if (!super.parseUnknownField(input, extensionRegistry, tag)) { + done = true; // was an endgroup tag + } + break; + } // default: + } // switch (tag) + } // while (!done) + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.unwrapIOException(); + } finally { + onChanged(); + } // finally + return this; + } + + private int bitField0_; + + private java.lang.Object name_ = ""; + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The name to set. + * @return This builder for chaining. + */ + public Builder setName(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + name_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return This builder for chaining. + */ + public Builder clearName() { + name_ = getDefaultInstance().getName(); + bitField0_ = (bitField0_ & ~0x00000001); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The bytes for name to set. + * @return This builder for chaining. + */ + public Builder setNameBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + name_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.AccessSecretVersionRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.AccessSecretVersionRequest) + private static final com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest + DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest(); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest + getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public AccessSecretVersionRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + Builder builder = newBuilder(); + try { + builder.mergeFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(builder.buildPartial()); + } catch (com.google.protobuf.UninitializedMessageException e) { + throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial()); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e) + .setUnfinishedMessage(builder.buildPartial()); + } + return builder.buildPartial(); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest + getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AccessSecretVersionRequestOrBuilder.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AccessSecretVersionRequestOrBuilder.java new file mode 100644 index 000000000000..2897ccc24212 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AccessSecretVersionRequestOrBuilder.java @@ -0,0 +1,57 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +public interface AccessSecretVersionRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.AccessSecretVersionRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + java.lang.String getName(); + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + com.google.protobuf.ByteString getNameBytes(); +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AccessSecretVersionResponse.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AccessSecretVersionResponse.java new file mode 100644 index 000000000000..d830d03ff570 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AccessSecretVersionResponse.java @@ -0,0 +1,925 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +/** + * + * + *
+ * Response message for [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.AccessSecretVersionResponse} + */ +public final class AccessSecretVersionResponse extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.AccessSecretVersionResponse) + AccessSecretVersionResponseOrBuilder { + private static final long serialVersionUID = 0L; + // Use AccessSecretVersionResponse.newBuilder() to construct. + private AccessSecretVersionResponse(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private AccessSecretVersionResponse() { + name_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new AccessSecretVersionResponse(); + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionResponse_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionResponse_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse.class, + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse.Builder.class); + } + + private int bitField0_; + public static final int NAME_FIELD_NUMBER = 1; + + @SuppressWarnings("serial") + private volatile java.lang.Object name_ = ""; + /** + * + * + *
+   * The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * string name = 1 [(.google.api.resource_reference) = { ... } + * + * @return The name. + */ + @java.lang.Override + public java.lang.String getName() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } + } + /** + * + * + *
+   * The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * string name = 1 [(.google.api.resource_reference) = { ... } + * + * @return The bytes for name. + */ + @java.lang.Override + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + public static final int PAYLOAD_FIELD_NUMBER = 2; + private com.google.cloud.secretmanager.v1beta1.SecretPayload payload_; + /** + * + * + *
+   * Secret payload
+   * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + * + * @return Whether the payload field is set. + */ + @java.lang.Override + public boolean hasPayload() { + return ((bitField0_ & 0x00000001) != 0); + } + /** + * + * + *
+   * Secret payload
+   * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + * + * @return The payload. + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.SecretPayload getPayload() { + return payload_ == null + ? com.google.cloud.secretmanager.v1beta1.SecretPayload.getDefaultInstance() + : payload_; + } + /** + * + * + *
+   * Secret payload
+   * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.SecretPayloadOrBuilder getPayloadOrBuilder() { + return payload_ == null + ? com.google.cloud.secretmanager.v1beta1.SecretPayload.getDefaultInstance() + : payload_; + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); + } + if (((bitField0_ & 0x00000001) != 0)) { + output.writeMessage(2, getPayload()); + } + getUnknownFields().writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); + } + if (((bitField0_ & 0x00000001) != 0)) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(2, getPayload()); + } + size += getUnknownFields().getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse)) { + return super.equals(obj); + } + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse other = + (com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse) obj; + + if (!getName().equals(other.getName())) return false; + if (hasPayload() != other.hasPayload()) return false; + if (hasPayload()) { + if (!getPayload().equals(other.getPayload())) return false; + } + if (!getUnknownFields().equals(other.getUnknownFields())) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + NAME_FIELD_NUMBER; + hash = (53 * hash) + getName().hashCode(); + if (hasPayload()) { + hash = (37 * hash) + PAYLOAD_FIELD_NUMBER; + hash = (53 * hash) + getPayload().hashCode(); + } + hash = (29 * hash) + getUnknownFields().hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse parseFrom( + byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse + parseDelimitedFrom(java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse + parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Response message for [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.AccessSecretVersionResponse} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.AccessSecretVersionResponse) + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponseOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionResponse_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionResponse_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse.class, + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse.Builder.class); + } + + // Construct using + // com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) { + getPayloadFieldBuilder(); + } + } + + @java.lang.Override + public Builder clear() { + super.clear(); + bitField0_ = 0; + name_ = ""; + payload_ = null; + if (payloadBuilder_ != null) { + payloadBuilder_.dispose(); + payloadBuilder_ = null; + } + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionResponse_descriptor; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse + getDefaultInstanceForType() { + return com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse + .getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse build() { + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse buildPartial() { + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse result = + new com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse(this); + if (bitField0_ != 0) { + buildPartial0(result); + } + onBuilt(); + return result; + } + + private void buildPartial0( + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse result) { + int from_bitField0_ = bitField0_; + if (((from_bitField0_ & 0x00000001) != 0)) { + result.name_ = name_; + } + int to_bitField0_ = 0; + if (((from_bitField0_ & 0x00000002) != 0)) { + result.payload_ = payloadBuilder_ == null ? payload_ : payloadBuilder_.build(); + to_bitField0_ |= 0x00000001; + } + result.bitField0_ |= to_bitField0_; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse) { + return mergeFrom( + (com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom( + com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse other) { + if (other + == com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse + .getDefaultInstance()) return this; + if (!other.getName().isEmpty()) { + name_ = other.name_; + bitField0_ |= 0x00000001; + onChanged(); + } + if (other.hasPayload()) { + mergePayload(other.getPayload()); + } + this.mergeUnknownFields(other.getUnknownFields()); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + name_ = input.readStringRequireUtf8(); + bitField0_ |= 0x00000001; + break; + } // case 10 + case 18: + { + input.readMessage(getPayloadFieldBuilder().getBuilder(), extensionRegistry); + bitField0_ |= 0x00000002; + break; + } // case 18 + default: + { + if (!super.parseUnknownField(input, extensionRegistry, tag)) { + done = true; // was an endgroup tag + } + break; + } // default: + } // switch (tag) + } // while (!done) + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.unwrapIOException(); + } finally { + onChanged(); + } // finally + return this; + } + + private int bitField0_; + + private java.lang.Object name_ = ""; + /** + * + * + *
+     * The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * string name = 1 [(.google.api.resource_reference) = { ... } + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * string name = 1 [(.google.api.resource_reference) = { ... } + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * string name = 1 [(.google.api.resource_reference) = { ... } + * + * @param value The name to set. + * @return This builder for chaining. + */ + public Builder setName(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + name_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + /** + * + * + *
+     * The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * string name = 1 [(.google.api.resource_reference) = { ... } + * + * @return This builder for chaining. + */ + public Builder clearName() { + name_ = getDefaultInstance().getName(); + bitField0_ = (bitField0_ & ~0x00000001); + onChanged(); + return this; + } + /** + * + * + *
+     * The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * string name = 1 [(.google.api.resource_reference) = { ... } + * + * @param value The bytes for name to set. + * @return This builder for chaining. + */ + public Builder setNameBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + name_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + + private com.google.cloud.secretmanager.v1beta1.SecretPayload payload_; + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.SecretPayload, + com.google.cloud.secretmanager.v1beta1.SecretPayload.Builder, + com.google.cloud.secretmanager.v1beta1.SecretPayloadOrBuilder> + payloadBuilder_; + /** + * + * + *
+     * Secret payload
+     * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + * + * @return Whether the payload field is set. + */ + public boolean hasPayload() { + return ((bitField0_ & 0x00000002) != 0); + } + /** + * + * + *
+     * Secret payload
+     * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + * + * @return The payload. + */ + public com.google.cloud.secretmanager.v1beta1.SecretPayload getPayload() { + if (payloadBuilder_ == null) { + return payload_ == null + ? com.google.cloud.secretmanager.v1beta1.SecretPayload.getDefaultInstance() + : payload_; + } else { + return payloadBuilder_.getMessage(); + } + } + /** + * + * + *
+     * Secret payload
+     * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + */ + public Builder setPayload(com.google.cloud.secretmanager.v1beta1.SecretPayload value) { + if (payloadBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + payload_ = value; + } else { + payloadBuilder_.setMessage(value); + } + bitField0_ |= 0x00000002; + onChanged(); + return this; + } + /** + * + * + *
+     * Secret payload
+     * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + */ + public Builder setPayload( + com.google.cloud.secretmanager.v1beta1.SecretPayload.Builder builderForValue) { + if (payloadBuilder_ == null) { + payload_ = builderForValue.build(); + } else { + payloadBuilder_.setMessage(builderForValue.build()); + } + bitField0_ |= 0x00000002; + onChanged(); + return this; + } + /** + * + * + *
+     * Secret payload
+     * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + */ + public Builder mergePayload(com.google.cloud.secretmanager.v1beta1.SecretPayload value) { + if (payloadBuilder_ == null) { + if (((bitField0_ & 0x00000002) != 0) + && payload_ != null + && payload_ + != com.google.cloud.secretmanager.v1beta1.SecretPayload.getDefaultInstance()) { + getPayloadBuilder().mergeFrom(value); + } else { + payload_ = value; + } + } else { + payloadBuilder_.mergeFrom(value); + } + if (payload_ != null) { + bitField0_ |= 0x00000002; + onChanged(); + } + return this; + } + /** + * + * + *
+     * Secret payload
+     * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + */ + public Builder clearPayload() { + bitField0_ = (bitField0_ & ~0x00000002); + payload_ = null; + if (payloadBuilder_ != null) { + payloadBuilder_.dispose(); + payloadBuilder_ = null; + } + onChanged(); + return this; + } + /** + * + * + *
+     * Secret payload
+     * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + */ + public com.google.cloud.secretmanager.v1beta1.SecretPayload.Builder getPayloadBuilder() { + bitField0_ |= 0x00000002; + onChanged(); + return getPayloadFieldBuilder().getBuilder(); + } + /** + * + * + *
+     * Secret payload
+     * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + */ + public com.google.cloud.secretmanager.v1beta1.SecretPayloadOrBuilder getPayloadOrBuilder() { + if (payloadBuilder_ != null) { + return payloadBuilder_.getMessageOrBuilder(); + } else { + return payload_ == null + ? com.google.cloud.secretmanager.v1beta1.SecretPayload.getDefaultInstance() + : payload_; + } + } + /** + * + * + *
+     * Secret payload
+     * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + */ + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.SecretPayload, + com.google.cloud.secretmanager.v1beta1.SecretPayload.Builder, + com.google.cloud.secretmanager.v1beta1.SecretPayloadOrBuilder> + getPayloadFieldBuilder() { + if (payloadBuilder_ == null) { + payloadBuilder_ = + new com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.SecretPayload, + com.google.cloud.secretmanager.v1beta1.SecretPayload.Builder, + com.google.cloud.secretmanager.v1beta1.SecretPayloadOrBuilder>( + getPayload(), getParentForChildren(), isClean()); + payload_ = null; + } + return payloadBuilder_; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.AccessSecretVersionResponse) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.AccessSecretVersionResponse) + private static final com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse + DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse(); + } + + public static com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse + getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public AccessSecretVersionResponse parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + Builder builder = newBuilder(); + try { + builder.mergeFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(builder.buildPartial()); + } catch (com.google.protobuf.UninitializedMessageException e) { + throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial()); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e) + .setUnfinishedMessage(builder.buildPartial()); + } + return builder.buildPartial(); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse + getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AccessSecretVersionResponseOrBuilder.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AccessSecretVersionResponseOrBuilder.java new file mode 100644 index 000000000000..fa08c0b053e2 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AccessSecretVersionResponseOrBuilder.java @@ -0,0 +1,88 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +public interface AccessSecretVersionResponseOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.AccessSecretVersionResponse) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * string name = 1 [(.google.api.resource_reference) = { ... } + * + * @return The name. + */ + java.lang.String getName(); + /** + * + * + *
+   * The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * string name = 1 [(.google.api.resource_reference) = { ... } + * + * @return The bytes for name. + */ + com.google.protobuf.ByteString getNameBytes(); + + /** + * + * + *
+   * Secret payload
+   * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + * + * @return Whether the payload field is set. + */ + boolean hasPayload(); + /** + * + * + *
+   * Secret payload
+   * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + * + * @return The payload. + */ + com.google.cloud.secretmanager.v1beta1.SecretPayload getPayload(); + /** + * + * + *
+   * Secret payload
+   * 
+ * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2; + */ + com.google.cloud.secretmanager.v1beta1.SecretPayloadOrBuilder getPayloadOrBuilder(); +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AddSecretVersionRequest.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AddSecretVersionRequest.java new file mode 100644 index 000000000000..bb4835faecd5 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AddSecretVersionRequest.java @@ -0,0 +1,958 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.AddSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AddSecretVersion].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.AddSecretVersionRequest} + */ +public final class AddSecretVersionRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.AddSecretVersionRequest) + AddSecretVersionRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use AddSecretVersionRequest.newBuilder() to construct. + private AddSecretVersionRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private AddSecretVersionRequest() { + parent_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new AddSecretVersionRequest(); + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_AddSecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_AddSecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest.class, + com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest.Builder.class); + } + + private int bitField0_; + public static final int PARENT_FIELD_NUMBER = 1; + + @SuppressWarnings("serial") + private volatile java.lang.Object parent_ = ""; + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + @java.lang.Override + public java.lang.String getParent() { + java.lang.Object ref = parent_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + parent_ = s; + return s; + } + } + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + @java.lang.Override + public com.google.protobuf.ByteString getParentBytes() { + java.lang.Object ref = parent_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + parent_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + public static final int PAYLOAD_FIELD_NUMBER = 2; + private com.google.cloud.secretmanager.v1beta1.SecretPayload payload_; + /** + * + * + *
+   * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the payload field is set. + */ + @java.lang.Override + public boolean hasPayload() { + return ((bitField0_ & 0x00000001) != 0); + } + /** + * + * + *
+   * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return The payload. + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.SecretPayload getPayload() { + return payload_ == null + ? com.google.cloud.secretmanager.v1beta1.SecretPayload.getDefaultInstance() + : payload_; + } + /** + * + * + *
+   * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.SecretPayloadOrBuilder getPayloadOrBuilder() { + return payload_ == null + ? com.google.cloud.secretmanager.v1beta1.SecretPayload.getDefaultInstance() + : payload_; + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, parent_); + } + if (((bitField0_ & 0x00000001) != 0)) { + output.writeMessage(2, getPayload()); + } + getUnknownFields().writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, parent_); + } + if (((bitField0_ & 0x00000001) != 0)) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(2, getPayload()); + } + size += getUnknownFields().getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest)) { + return super.equals(obj); + } + com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest other = + (com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest) obj; + + if (!getParent().equals(other.getParent())) return false; + if (hasPayload() != other.hasPayload()) return false; + if (hasPayload()) { + if (!getPayload().equals(other.getPayload())) return false; + } + if (!getUnknownFields().equals(other.getUnknownFields())) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + PARENT_FIELD_NUMBER; + hash = (53 * hash) + getParent().hashCode(); + if (hasPayload()) { + hash = (37 * hash) + PAYLOAD_FIELD_NUMBER; + hash = (53 * hash) + getPayload().hashCode(); + } + hash = (29 * hash) + getUnknownFields().hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest parseFrom( + byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.AddSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AddSecretVersion].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.AddSecretVersionRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.AddSecretVersionRequest) + com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_AddSecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_AddSecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest.class, + com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest.Builder.class); + } + + // Construct using com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) { + getPayloadFieldBuilder(); + } + } + + @java.lang.Override + public Builder clear() { + super.clear(); + bitField0_ = 0; + parent_ = ""; + payload_ = null; + if (payloadBuilder_ != null) { + payloadBuilder_.dispose(); + payloadBuilder_ = null; + } + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_AddSecretVersionRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest + getDefaultInstanceForType() { + return com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest build() { + com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest buildPartial() { + com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest result = + new com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest(this); + if (bitField0_ != 0) { + buildPartial0(result); + } + onBuilt(); + return result; + } + + private void buildPartial0( + com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest result) { + int from_bitField0_ = bitField0_; + if (((from_bitField0_ & 0x00000001) != 0)) { + result.parent_ = parent_; + } + int to_bitField0_ = 0; + if (((from_bitField0_ & 0x00000002) != 0)) { + result.payload_ = payloadBuilder_ == null ? payload_ : payloadBuilder_.build(); + to_bitField0_ |= 0x00000001; + } + result.bitField0_ |= to_bitField0_; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest) { + return mergeFrom((com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest other) { + if (other + == com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest.getDefaultInstance()) + return this; + if (!other.getParent().isEmpty()) { + parent_ = other.parent_; + bitField0_ |= 0x00000001; + onChanged(); + } + if (other.hasPayload()) { + mergePayload(other.getPayload()); + } + this.mergeUnknownFields(other.getUnknownFields()); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + parent_ = input.readStringRequireUtf8(); + bitField0_ |= 0x00000001; + break; + } // case 10 + case 18: + { + input.readMessage(getPayloadFieldBuilder().getBuilder(), extensionRegistry); + bitField0_ |= 0x00000002; + break; + } // case 18 + default: + { + if (!super.parseUnknownField(input, extensionRegistry, tag)) { + done = true; // was an endgroup tag + } + break; + } // default: + } // switch (tag) + } // while (!done) + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.unwrapIOException(); + } finally { + onChanged(); + } // finally + return this; + } + + private int bitField0_; + + private java.lang.Object parent_ = ""; + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + public java.lang.String getParent() { + java.lang.Object ref = parent_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + parent_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + public com.google.protobuf.ByteString getParentBytes() { + java.lang.Object ref = parent_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + parent_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The parent to set. + * @return This builder for chaining. + */ + public Builder setParent(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + parent_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return This builder for chaining. + */ + public Builder clearParent() { + parent_ = getDefaultInstance().getParent(); + bitField0_ = (bitField0_ & ~0x00000001); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The bytes for parent to set. + * @return This builder for chaining. + */ + public Builder setParentBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + parent_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + + private com.google.cloud.secretmanager.v1beta1.SecretPayload payload_; + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.SecretPayload, + com.google.cloud.secretmanager.v1beta1.SecretPayload.Builder, + com.google.cloud.secretmanager.v1beta1.SecretPayloadOrBuilder> + payloadBuilder_; + /** + * + * + *
+     * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the payload field is set. + */ + public boolean hasPayload() { + return ((bitField0_ & 0x00000002) != 0); + } + /** + * + * + *
+     * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return The payload. + */ + public com.google.cloud.secretmanager.v1beta1.SecretPayload getPayload() { + if (payloadBuilder_ == null) { + return payload_ == null + ? com.google.cloud.secretmanager.v1beta1.SecretPayload.getDefaultInstance() + : payload_; + } else { + return payloadBuilder_.getMessage(); + } + } + /** + * + * + *
+     * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder setPayload(com.google.cloud.secretmanager.v1beta1.SecretPayload value) { + if (payloadBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + payload_ = value; + } else { + payloadBuilder_.setMessage(value); + } + bitField0_ |= 0x00000002; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder setPayload( + com.google.cloud.secretmanager.v1beta1.SecretPayload.Builder builderForValue) { + if (payloadBuilder_ == null) { + payload_ = builderForValue.build(); + } else { + payloadBuilder_.setMessage(builderForValue.build()); + } + bitField0_ |= 0x00000002; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder mergePayload(com.google.cloud.secretmanager.v1beta1.SecretPayload value) { + if (payloadBuilder_ == null) { + if (((bitField0_ & 0x00000002) != 0) + && payload_ != null + && payload_ + != com.google.cloud.secretmanager.v1beta1.SecretPayload.getDefaultInstance()) { + getPayloadBuilder().mergeFrom(value); + } else { + payload_ = value; + } + } else { + payloadBuilder_.mergeFrom(value); + } + if (payload_ != null) { + bitField0_ |= 0x00000002; + onChanged(); + } + return this; + } + /** + * + * + *
+     * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder clearPayload() { + bitField0_ = (bitField0_ & ~0x00000002); + payload_ = null; + if (payloadBuilder_ != null) { + payloadBuilder_.dispose(); + payloadBuilder_ = null; + } + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secretmanager.v1beta1.SecretPayload.Builder getPayloadBuilder() { + bitField0_ |= 0x00000002; + onChanged(); + return getPayloadFieldBuilder().getBuilder(); + } + /** + * + * + *
+     * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secretmanager.v1beta1.SecretPayloadOrBuilder getPayloadOrBuilder() { + if (payloadBuilder_ != null) { + return payloadBuilder_.getMessageOrBuilder(); + } else { + return payload_ == null + ? com.google.cloud.secretmanager.v1beta1.SecretPayload.getDefaultInstance() + : payload_; + } + } + /** + * + * + *
+     * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.SecretPayload, + com.google.cloud.secretmanager.v1beta1.SecretPayload.Builder, + com.google.cloud.secretmanager.v1beta1.SecretPayloadOrBuilder> + getPayloadFieldBuilder() { + if (payloadBuilder_ == null) { + payloadBuilder_ = + new com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.SecretPayload, + com.google.cloud.secretmanager.v1beta1.SecretPayload.Builder, + com.google.cloud.secretmanager.v1beta1.SecretPayloadOrBuilder>( + getPayload(), getParentForChildren(), isClean()); + payload_ = null; + } + return payloadBuilder_; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.AddSecretVersionRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.AddSecretVersionRequest) + private static final com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest + DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest(); + } + + public static com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest + getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public AddSecretVersionRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + Builder builder = newBuilder(); + try { + builder.mergeFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(builder.buildPartial()); + } catch (com.google.protobuf.UninitializedMessageException e) { + throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial()); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e) + .setUnfinishedMessage(builder.buildPartial()); + } + return builder.buildPartial(); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest + getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AddSecretVersionRequestOrBuilder.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AddSecretVersionRequestOrBuilder.java new file mode 100644 index 000000000000..e65d8729fa5c --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/AddSecretVersionRequestOrBuilder.java @@ -0,0 +1,98 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +public interface AddSecretVersionRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.AddSecretVersionRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + java.lang.String getParent(); + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + com.google.protobuf.ByteString getParentBytes(); + + /** + * + * + *
+   * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the payload field is set. + */ + boolean hasPayload(); + /** + * + * + *
+   * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return The payload. + */ + com.google.cloud.secretmanager.v1beta1.SecretPayload getPayload(); + /** + * + * + *
+   * Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretPayload payload = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + com.google.cloud.secretmanager.v1beta1.SecretPayloadOrBuilder getPayloadOrBuilder(); +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/CreateSecretRequest.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/CreateSecretRequest.java new file mode 100644 index 000000000000..cfb3b0b808f0 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/CreateSecretRequest.java @@ -0,0 +1,1161 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.CreateSecret][google.cloud.secrets.v1beta1.SecretManagerService.CreateSecret].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.CreateSecretRequest} + */ +public final class CreateSecretRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.CreateSecretRequest) + CreateSecretRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use CreateSecretRequest.newBuilder() to construct. + private CreateSecretRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private CreateSecretRequest() { + parent_ = ""; + secretId_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new CreateSecretRequest(); + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_CreateSecretRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_CreateSecretRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.CreateSecretRequest.class, + com.google.cloud.secretmanager.v1beta1.CreateSecretRequest.Builder.class); + } + + private int bitField0_; + public static final int PARENT_FIELD_NUMBER = 1; + + @SuppressWarnings("serial") + private volatile java.lang.Object parent_ = ""; + /** + * + * + *
+   * Required. The resource name of the project to associate with the
+   * [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + @java.lang.Override + public java.lang.String getParent() { + java.lang.Object ref = parent_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + parent_ = s; + return s; + } + } + /** + * + * + *
+   * Required. The resource name of the project to associate with the
+   * [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + @java.lang.Override + public com.google.protobuf.ByteString getParentBytes() { + java.lang.Object ref = parent_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + parent_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + public static final int SECRET_ID_FIELD_NUMBER = 2; + + @SuppressWarnings("serial") + private volatile java.lang.Object secretId_ = ""; + /** + * + * + *
+   * Required. This must be unique within the project.
+   *
+   * A secret ID is a string with a maximum length of 255 characters and can
+   * contain uppercase and lowercase letters, numerals, and the hyphen (`-`) and
+   * underscore (`_`) characters.
+   * 
+ * + * string secret_id = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * @return The secretId. + */ + @java.lang.Override + public java.lang.String getSecretId() { + java.lang.Object ref = secretId_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + secretId_ = s; + return s; + } + } + /** + * + * + *
+   * Required. This must be unique within the project.
+   *
+   * A secret ID is a string with a maximum length of 255 characters and can
+   * contain uppercase and lowercase letters, numerals, and the hyphen (`-`) and
+   * underscore (`_`) characters.
+   * 
+ * + * string secret_id = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * @return The bytes for secretId. + */ + @java.lang.Override + public com.google.protobuf.ByteString getSecretIdBytes() { + java.lang.Object ref = secretId_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + secretId_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + public static final int SECRET_FIELD_NUMBER = 3; + private com.google.cloud.secretmanager.v1beta1.Secret secret_; + /** + * + * + *
+   * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the secret field is set. + */ + @java.lang.Override + public boolean hasSecret() { + return ((bitField0_ & 0x00000001) != 0); + } + /** + * + * + *
+   * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return The secret. + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Secret getSecret() { + return secret_ == null + ? com.google.cloud.secretmanager.v1beta1.Secret.getDefaultInstance() + : secret_; + } + /** + * + * + *
+   * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.SecretOrBuilder getSecretOrBuilder() { + return secret_ == null + ? com.google.cloud.secretmanager.v1beta1.Secret.getDefaultInstance() + : secret_; + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, parent_); + } + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(secretId_)) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 2, secretId_); + } + if (((bitField0_ & 0x00000001) != 0)) { + output.writeMessage(3, getSecret()); + } + getUnknownFields().writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, parent_); + } + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(secretId_)) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(2, secretId_); + } + if (((bitField0_ & 0x00000001) != 0)) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(3, getSecret()); + } + size += getUnknownFields().getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secretmanager.v1beta1.CreateSecretRequest)) { + return super.equals(obj); + } + com.google.cloud.secretmanager.v1beta1.CreateSecretRequest other = + (com.google.cloud.secretmanager.v1beta1.CreateSecretRequest) obj; + + if (!getParent().equals(other.getParent())) return false; + if (!getSecretId().equals(other.getSecretId())) return false; + if (hasSecret() != other.hasSecret()) return false; + if (hasSecret()) { + if (!getSecret().equals(other.getSecret())) return false; + } + if (!getUnknownFields().equals(other.getUnknownFields())) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + PARENT_FIELD_NUMBER; + hash = (53 * hash) + getParent().hashCode(); + hash = (37 * hash) + SECRET_ID_FIELD_NUMBER; + hash = (53 * hash) + getSecretId().hashCode(); + if (hasSecret()) { + hash = (37 * hash) + SECRET_FIELD_NUMBER; + hash = (53 * hash) + getSecret().hashCode(); + } + hash = (29 * hash) + getUnknownFields().hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secretmanager.v1beta1.CreateSecretRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.CreateSecretRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.CreateSecretRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.CreateSecretRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.CreateSecretRequest parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.CreateSecretRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.CreateSecretRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.CreateSecretRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.CreateSecretRequest parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.CreateSecretRequest parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.CreateSecretRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.CreateSecretRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secretmanager.v1beta1.CreateSecretRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.CreateSecret][google.cloud.secrets.v1beta1.SecretManagerService.CreateSecret].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.CreateSecretRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.CreateSecretRequest) + com.google.cloud.secretmanager.v1beta1.CreateSecretRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_CreateSecretRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_CreateSecretRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.CreateSecretRequest.class, + com.google.cloud.secretmanager.v1beta1.CreateSecretRequest.Builder.class); + } + + // Construct using com.google.cloud.secretmanager.v1beta1.CreateSecretRequest.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) { + getSecretFieldBuilder(); + } + } + + @java.lang.Override + public Builder clear() { + super.clear(); + bitField0_ = 0; + parent_ = ""; + secretId_ = ""; + secret_ = null; + if (secretBuilder_ != null) { + secretBuilder_.dispose(); + secretBuilder_ = null; + } + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_CreateSecretRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.CreateSecretRequest getDefaultInstanceForType() { + return com.google.cloud.secretmanager.v1beta1.CreateSecretRequest.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.CreateSecretRequest build() { + com.google.cloud.secretmanager.v1beta1.CreateSecretRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.CreateSecretRequest buildPartial() { + com.google.cloud.secretmanager.v1beta1.CreateSecretRequest result = + new com.google.cloud.secretmanager.v1beta1.CreateSecretRequest(this); + if (bitField0_ != 0) { + buildPartial0(result); + } + onBuilt(); + return result; + } + + private void buildPartial0(com.google.cloud.secretmanager.v1beta1.CreateSecretRequest result) { + int from_bitField0_ = bitField0_; + if (((from_bitField0_ & 0x00000001) != 0)) { + result.parent_ = parent_; + } + if (((from_bitField0_ & 0x00000002) != 0)) { + result.secretId_ = secretId_; + } + int to_bitField0_ = 0; + if (((from_bitField0_ & 0x00000004) != 0)) { + result.secret_ = secretBuilder_ == null ? secret_ : secretBuilder_.build(); + to_bitField0_ |= 0x00000001; + } + result.bitField0_ |= to_bitField0_; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secretmanager.v1beta1.CreateSecretRequest) { + return mergeFrom((com.google.cloud.secretmanager.v1beta1.CreateSecretRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secretmanager.v1beta1.CreateSecretRequest other) { + if (other == com.google.cloud.secretmanager.v1beta1.CreateSecretRequest.getDefaultInstance()) + return this; + if (!other.getParent().isEmpty()) { + parent_ = other.parent_; + bitField0_ |= 0x00000001; + onChanged(); + } + if (!other.getSecretId().isEmpty()) { + secretId_ = other.secretId_; + bitField0_ |= 0x00000002; + onChanged(); + } + if (other.hasSecret()) { + mergeSecret(other.getSecret()); + } + this.mergeUnknownFields(other.getUnknownFields()); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + parent_ = input.readStringRequireUtf8(); + bitField0_ |= 0x00000001; + break; + } // case 10 + case 18: + { + secretId_ = input.readStringRequireUtf8(); + bitField0_ |= 0x00000002; + break; + } // case 18 + case 26: + { + input.readMessage(getSecretFieldBuilder().getBuilder(), extensionRegistry); + bitField0_ |= 0x00000004; + break; + } // case 26 + default: + { + if (!super.parseUnknownField(input, extensionRegistry, tag)) { + done = true; // was an endgroup tag + } + break; + } // default: + } // switch (tag) + } // while (!done) + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.unwrapIOException(); + } finally { + onChanged(); + } // finally + return this; + } + + private int bitField0_; + + private java.lang.Object parent_ = ""; + /** + * + * + *
+     * Required. The resource name of the project to associate with the
+     * [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + public java.lang.String getParent() { + java.lang.Object ref = parent_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + parent_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the project to associate with the
+     * [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + public com.google.protobuf.ByteString getParentBytes() { + java.lang.Object ref = parent_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + parent_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the project to associate with the
+     * [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The parent to set. + * @return This builder for chaining. + */ + public Builder setParent(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + parent_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the project to associate with the
+     * [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return This builder for chaining. + */ + public Builder clearParent() { + parent_ = getDefaultInstance().getParent(); + bitField0_ = (bitField0_ & ~0x00000001); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the project to associate with the
+     * [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The bytes for parent to set. + * @return This builder for chaining. + */ + public Builder setParentBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + parent_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + + private java.lang.Object secretId_ = ""; + /** + * + * + *
+     * Required. This must be unique within the project.
+     *
+     * A secret ID is a string with a maximum length of 255 characters and can
+     * contain uppercase and lowercase letters, numerals, and the hyphen (`-`) and
+     * underscore (`_`) characters.
+     * 
+ * + * string secret_id = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * @return The secretId. + */ + public java.lang.String getSecretId() { + java.lang.Object ref = secretId_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + secretId_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. This must be unique within the project.
+     *
+     * A secret ID is a string with a maximum length of 255 characters and can
+     * contain uppercase and lowercase letters, numerals, and the hyphen (`-`) and
+     * underscore (`_`) characters.
+     * 
+ * + * string secret_id = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * @return The bytes for secretId. + */ + public com.google.protobuf.ByteString getSecretIdBytes() { + java.lang.Object ref = secretId_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + secretId_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. This must be unique within the project.
+     *
+     * A secret ID is a string with a maximum length of 255 characters and can
+     * contain uppercase and lowercase letters, numerals, and the hyphen (`-`) and
+     * underscore (`_`) characters.
+     * 
+ * + * string secret_id = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * @param value The secretId to set. + * @return This builder for chaining. + */ + public Builder setSecretId(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + secretId_ = value; + bitField0_ |= 0x00000002; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. This must be unique within the project.
+     *
+     * A secret ID is a string with a maximum length of 255 characters and can
+     * contain uppercase and lowercase letters, numerals, and the hyphen (`-`) and
+     * underscore (`_`) characters.
+     * 
+ * + * string secret_id = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * @return This builder for chaining. + */ + public Builder clearSecretId() { + secretId_ = getDefaultInstance().getSecretId(); + bitField0_ = (bitField0_ & ~0x00000002); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. This must be unique within the project.
+     *
+     * A secret ID is a string with a maximum length of 255 characters and can
+     * contain uppercase and lowercase letters, numerals, and the hyphen (`-`) and
+     * underscore (`_`) characters.
+     * 
+ * + * string secret_id = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * @param value The bytes for secretId to set. + * @return This builder for chaining. + */ + public Builder setSecretIdBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + secretId_ = value; + bitField0_ |= 0x00000002; + onChanged(); + return this; + } + + private com.google.cloud.secretmanager.v1beta1.Secret secret_; + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.Secret, + com.google.cloud.secretmanager.v1beta1.Secret.Builder, + com.google.cloud.secretmanager.v1beta1.SecretOrBuilder> + secretBuilder_; + /** + * + * + *
+     * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the secret field is set. + */ + public boolean hasSecret() { + return ((bitField0_ & 0x00000004) != 0); + } + /** + * + * + *
+     * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return The secret. + */ + public com.google.cloud.secretmanager.v1beta1.Secret getSecret() { + if (secretBuilder_ == null) { + return secret_ == null + ? com.google.cloud.secretmanager.v1beta1.Secret.getDefaultInstance() + : secret_; + } else { + return secretBuilder_.getMessage(); + } + } + /** + * + * + *
+     * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder setSecret(com.google.cloud.secretmanager.v1beta1.Secret value) { + if (secretBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + secret_ = value; + } else { + secretBuilder_.setMessage(value); + } + bitField0_ |= 0x00000004; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder setSecret( + com.google.cloud.secretmanager.v1beta1.Secret.Builder builderForValue) { + if (secretBuilder_ == null) { + secret_ = builderForValue.build(); + } else { + secretBuilder_.setMessage(builderForValue.build()); + } + bitField0_ |= 0x00000004; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder mergeSecret(com.google.cloud.secretmanager.v1beta1.Secret value) { + if (secretBuilder_ == null) { + if (((bitField0_ & 0x00000004) != 0) + && secret_ != null + && secret_ != com.google.cloud.secretmanager.v1beta1.Secret.getDefaultInstance()) { + getSecretBuilder().mergeFrom(value); + } else { + secret_ = value; + } + } else { + secretBuilder_.mergeFrom(value); + } + if (secret_ != null) { + bitField0_ |= 0x00000004; + onChanged(); + } + return this; + } + /** + * + * + *
+     * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder clearSecret() { + bitField0_ = (bitField0_ & ~0x00000004); + secret_ = null; + if (secretBuilder_ != null) { + secretBuilder_.dispose(); + secretBuilder_ = null; + } + onChanged(); + return this; + } + /** + * + * + *
+     * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secretmanager.v1beta1.Secret.Builder getSecretBuilder() { + bitField0_ |= 0x00000004; + onChanged(); + return getSecretFieldBuilder().getBuilder(); + } + /** + * + * + *
+     * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secretmanager.v1beta1.SecretOrBuilder getSecretOrBuilder() { + if (secretBuilder_ != null) { + return secretBuilder_.getMessageOrBuilder(); + } else { + return secret_ == null + ? com.google.cloud.secretmanager.v1beta1.Secret.getDefaultInstance() + : secret_; + } + } + /** + * + * + *
+     * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * + */ + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.Secret, + com.google.cloud.secretmanager.v1beta1.Secret.Builder, + com.google.cloud.secretmanager.v1beta1.SecretOrBuilder> + getSecretFieldBuilder() { + if (secretBuilder_ == null) { + secretBuilder_ = + new com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.Secret, + com.google.cloud.secretmanager.v1beta1.Secret.Builder, + com.google.cloud.secretmanager.v1beta1.SecretOrBuilder>( + getSecret(), getParentForChildren(), isClean()); + secret_ = null; + } + return secretBuilder_; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.CreateSecretRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.CreateSecretRequest) + private static final com.google.cloud.secretmanager.v1beta1.CreateSecretRequest DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secretmanager.v1beta1.CreateSecretRequest(); + } + + public static com.google.cloud.secretmanager.v1beta1.CreateSecretRequest getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public CreateSecretRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + Builder builder = newBuilder(); + try { + builder.mergeFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(builder.buildPartial()); + } catch (com.google.protobuf.UninitializedMessageException e) { + throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial()); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e) + .setUnfinishedMessage(builder.buildPartial()); + } + return builder.buildPartial(); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.CreateSecretRequest getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/CreateSecretRequestOrBuilder.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/CreateSecretRequestOrBuilder.java new file mode 100644 index 000000000000..c27f18ee46c0 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/CreateSecretRequestOrBuilder.java @@ -0,0 +1,131 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +public interface CreateSecretRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.CreateSecretRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. The resource name of the project to associate with the
+   * [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + java.lang.String getParent(); + /** + * + * + *
+   * Required. The resource name of the project to associate with the
+   * [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + com.google.protobuf.ByteString getParentBytes(); + + /** + * + * + *
+   * Required. This must be unique within the project.
+   *
+   * A secret ID is a string with a maximum length of 255 characters and can
+   * contain uppercase and lowercase letters, numerals, and the hyphen (`-`) and
+   * underscore (`_`) characters.
+   * 
+ * + * string secret_id = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * @return The secretId. + */ + java.lang.String getSecretId(); + /** + * + * + *
+   * Required. This must be unique within the project.
+   *
+   * A secret ID is a string with a maximum length of 255 characters and can
+   * contain uppercase and lowercase letters, numerals, and the hyphen (`-`) and
+   * underscore (`_`) characters.
+   * 
+ * + * string secret_id = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * @return The bytes for secretId. + */ + com.google.protobuf.ByteString getSecretIdBytes(); + + /** + * + * + *
+   * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the secret field is set. + */ + boolean hasSecret(); + /** + * + * + *
+   * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return The secret. + */ + com.google.cloud.secretmanager.v1beta1.Secret getSecret(); + /** + * + * + *
+   * Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 3 [(.google.api.field_behavior) = REQUIRED]; + * + */ + com.google.cloud.secretmanager.v1beta1.SecretOrBuilder getSecretOrBuilder(); +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DeleteSecretRequest.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DeleteSecretRequest.java new file mode 100644 index 000000000000..1e2d2d93901a --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DeleteSecretRequest.java @@ -0,0 +1,647 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.DeleteSecret][google.cloud.secrets.v1beta1.SecretManagerService.DeleteSecret].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.DeleteSecretRequest} + */ +public final class DeleteSecretRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.DeleteSecretRequest) + DeleteSecretRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use DeleteSecretRequest.newBuilder() to construct. + private DeleteSecretRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private DeleteSecretRequest() { + name_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new DeleteSecretRequest(); + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_DeleteSecretRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_DeleteSecretRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest.class, + com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest.Builder.class); + } + + public static final int NAME_FIELD_NUMBER = 1; + + @SuppressWarnings("serial") + private volatile java.lang.Object name_ = ""; + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format
+   * `projects/*/secrets/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + @java.lang.Override + public java.lang.String getName() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } + } + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format
+   * `projects/*/secrets/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + @java.lang.Override + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); + } + getUnknownFields().writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); + } + size += getUnknownFields().getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest)) { + return super.equals(obj); + } + com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest other = + (com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest) obj; + + if (!getName().equals(other.getName())) return false; + if (!getUnknownFields().equals(other.getUnknownFields())) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + NAME_FIELD_NUMBER; + hash = (53 * hash) + getName().hashCode(); + hash = (29 * hash) + getUnknownFields().hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.DeleteSecret][google.cloud.secrets.v1beta1.SecretManagerService.DeleteSecret].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.DeleteSecretRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.DeleteSecretRequest) + com.google.cloud.secretmanager.v1beta1.DeleteSecretRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_DeleteSecretRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_DeleteSecretRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest.class, + com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest.Builder.class); + } + + // Construct using com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest.newBuilder() + private Builder() {} + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + } + + @java.lang.Override + public Builder clear() { + super.clear(); + bitField0_ = 0; + name_ = ""; + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_DeleteSecretRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest getDefaultInstanceForType() { + return com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest build() { + com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest buildPartial() { + com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest result = + new com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest(this); + if (bitField0_ != 0) { + buildPartial0(result); + } + onBuilt(); + return result; + } + + private void buildPartial0(com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest result) { + int from_bitField0_ = bitField0_; + if (((from_bitField0_ & 0x00000001) != 0)) { + result.name_ = name_; + } + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest) { + return mergeFrom((com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest other) { + if (other == com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest.getDefaultInstance()) + return this; + if (!other.getName().isEmpty()) { + name_ = other.name_; + bitField0_ |= 0x00000001; + onChanged(); + } + this.mergeUnknownFields(other.getUnknownFields()); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + name_ = input.readStringRequireUtf8(); + bitField0_ |= 0x00000001; + break; + } // case 10 + default: + { + if (!super.parseUnknownField(input, extensionRegistry, tag)) { + done = true; // was an endgroup tag + } + break; + } // default: + } // switch (tag) + } // while (!done) + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.unwrapIOException(); + } finally { + onChanged(); + } // finally + return this; + } + + private int bitField0_; + + private java.lang.Object name_ = ""; + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format
+     * `projects/*/secrets/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format
+     * `projects/*/secrets/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format
+     * `projects/*/secrets/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The name to set. + * @return This builder for chaining. + */ + public Builder setName(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + name_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format
+     * `projects/*/secrets/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return This builder for chaining. + */ + public Builder clearName() { + name_ = getDefaultInstance().getName(); + bitField0_ = (bitField0_ & ~0x00000001); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format
+     * `projects/*/secrets/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The bytes for name to set. + * @return This builder for chaining. + */ + public Builder setNameBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + name_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.DeleteSecretRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.DeleteSecretRequest) + private static final com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest(); + } + + public static com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public DeleteSecretRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + Builder builder = newBuilder(); + try { + builder.mergeFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(builder.buildPartial()); + } catch (com.google.protobuf.UninitializedMessageException e) { + throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial()); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e) + .setUnfinishedMessage(builder.buildPartial()); + } + return builder.buildPartial(); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DeleteSecretRequestOrBuilder.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DeleteSecretRequestOrBuilder.java new file mode 100644 index 000000000000..86be5daafea1 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DeleteSecretRequestOrBuilder.java @@ -0,0 +1,57 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +public interface DeleteSecretRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.DeleteSecretRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format
+   * `projects/*/secrets/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + java.lang.String getName(); + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format
+   * `projects/*/secrets/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + com.google.protobuf.ByteString getNameBytes(); +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DestroySecretVersionRequest.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DestroySecretVersionRequest.java new file mode 100644 index 000000000000..a1a1278ca638 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DestroySecretVersionRequest.java @@ -0,0 +1,658 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.DestroySecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DestroySecretVersion].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.DestroySecretVersionRequest} + */ +public final class DestroySecretVersionRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.DestroySecretVersionRequest) + DestroySecretVersionRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use DestroySecretVersionRequest.newBuilder() to construct. + private DestroySecretVersionRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private DestroySecretVersionRequest() { + name_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new DestroySecretVersionRequest(); + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_DestroySecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_DestroySecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest.class, + com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest.Builder.class); + } + + public static final int NAME_FIELD_NUMBER = 1; + + @SuppressWarnings("serial") + private volatile java.lang.Object name_ = ""; + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + @java.lang.Override + public java.lang.String getName() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } + } + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + @java.lang.Override + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); + } + getUnknownFields().writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); + } + size += getUnknownFields().getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest)) { + return super.equals(obj); + } + com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest other = + (com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest) obj; + + if (!getName().equals(other.getName())) return false; + if (!getUnknownFields().equals(other.getUnknownFields())) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + NAME_FIELD_NUMBER; + hash = (53 * hash) + getName().hashCode(); + hash = (29 * hash) + getUnknownFields().hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest parseFrom( + byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest + parseDelimitedFrom(java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest + parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.DestroySecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DestroySecretVersion].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.DestroySecretVersionRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.DestroySecretVersionRequest) + com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_DestroySecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_DestroySecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest.class, + com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest.Builder.class); + } + + // Construct using + // com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest.newBuilder() + private Builder() {} + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + } + + @java.lang.Override + public Builder clear() { + super.clear(); + bitField0_ = 0; + name_ = ""; + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_DestroySecretVersionRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest + getDefaultInstanceForType() { + return com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest + .getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest build() { + com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest buildPartial() { + com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest result = + new com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest(this); + if (bitField0_ != 0) { + buildPartial0(result); + } + onBuilt(); + return result; + } + + private void buildPartial0( + com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest result) { + int from_bitField0_ = bitField0_; + if (((from_bitField0_ & 0x00000001) != 0)) { + result.name_ = name_; + } + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest) { + return mergeFrom( + (com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom( + com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest other) { + if (other + == com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest + .getDefaultInstance()) return this; + if (!other.getName().isEmpty()) { + name_ = other.name_; + bitField0_ |= 0x00000001; + onChanged(); + } + this.mergeUnknownFields(other.getUnknownFields()); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + name_ = input.readStringRequireUtf8(); + bitField0_ |= 0x00000001; + break; + } // case 10 + default: + { + if (!super.parseUnknownField(input, extensionRegistry, tag)) { + done = true; // was an endgroup tag + } + break; + } // default: + } // switch (tag) + } // while (!done) + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.unwrapIOException(); + } finally { + onChanged(); + } // finally + return this; + } + + private int bitField0_; + + private java.lang.Object name_ = ""; + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The name to set. + * @return This builder for chaining. + */ + public Builder setName(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + name_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return This builder for chaining. + */ + public Builder clearName() { + name_ = getDefaultInstance().getName(); + bitField0_ = (bitField0_ & ~0x00000001); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The bytes for name to set. + * @return This builder for chaining. + */ + public Builder setNameBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + name_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.DestroySecretVersionRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.DestroySecretVersionRequest) + private static final com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest + DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest(); + } + + public static com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest + getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public DestroySecretVersionRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + Builder builder = newBuilder(); + try { + builder.mergeFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(builder.buildPartial()); + } catch (com.google.protobuf.UninitializedMessageException e) { + throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial()); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e) + .setUnfinishedMessage(builder.buildPartial()); + } + return builder.buildPartial(); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest + getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DestroySecretVersionRequestOrBuilder.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DestroySecretVersionRequestOrBuilder.java new file mode 100644 index 000000000000..8ac7006fd123 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DestroySecretVersionRequestOrBuilder.java @@ -0,0 +1,57 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +public interface DestroySecretVersionRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.DestroySecretVersionRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + java.lang.String getName(); + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + com.google.protobuf.ByteString getNameBytes(); +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DisableSecretVersionRequest.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DisableSecretVersionRequest.java new file mode 100644 index 000000000000..df406658a5a6 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DisableSecretVersionRequest.java @@ -0,0 +1,658 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.DisableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DisableSecretVersion].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.DisableSecretVersionRequest} + */ +public final class DisableSecretVersionRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.DisableSecretVersionRequest) + DisableSecretVersionRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use DisableSecretVersionRequest.newBuilder() to construct. + private DisableSecretVersionRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private DisableSecretVersionRequest() { + name_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new DisableSecretVersionRequest(); + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_DisableSecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_DisableSecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest.class, + com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest.Builder.class); + } + + public static final int NAME_FIELD_NUMBER = 1; + + @SuppressWarnings("serial") + private volatile java.lang.Object name_ = ""; + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + @java.lang.Override + public java.lang.String getName() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } + } + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + @java.lang.Override + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); + } + getUnknownFields().writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); + } + size += getUnknownFields().getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest)) { + return super.equals(obj); + } + com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest other = + (com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest) obj; + + if (!getName().equals(other.getName())) return false; + if (!getUnknownFields().equals(other.getUnknownFields())) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + NAME_FIELD_NUMBER; + hash = (53 * hash) + getName().hashCode(); + hash = (29 * hash) + getUnknownFields().hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest parseFrom( + byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest + parseDelimitedFrom(java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest + parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.DisableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DisableSecretVersion].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.DisableSecretVersionRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.DisableSecretVersionRequest) + com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_DisableSecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_DisableSecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest.class, + com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest.Builder.class); + } + + // Construct using + // com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest.newBuilder() + private Builder() {} + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + } + + @java.lang.Override + public Builder clear() { + super.clear(); + bitField0_ = 0; + name_ = ""; + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_DisableSecretVersionRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest + getDefaultInstanceForType() { + return com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest + .getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest build() { + com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest buildPartial() { + com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest result = + new com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest(this); + if (bitField0_ != 0) { + buildPartial0(result); + } + onBuilt(); + return result; + } + + private void buildPartial0( + com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest result) { + int from_bitField0_ = bitField0_; + if (((from_bitField0_ & 0x00000001) != 0)) { + result.name_ = name_; + } + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest) { + return mergeFrom( + (com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom( + com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest other) { + if (other + == com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest + .getDefaultInstance()) return this; + if (!other.getName().isEmpty()) { + name_ = other.name_; + bitField0_ |= 0x00000001; + onChanged(); + } + this.mergeUnknownFields(other.getUnknownFields()); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + name_ = input.readStringRequireUtf8(); + bitField0_ |= 0x00000001; + break; + } // case 10 + default: + { + if (!super.parseUnknownField(input, extensionRegistry, tag)) { + done = true; // was an endgroup tag + } + break; + } // default: + } // switch (tag) + } // while (!done) + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.unwrapIOException(); + } finally { + onChanged(); + } // finally + return this; + } + + private int bitField0_; + + private java.lang.Object name_ = ""; + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The name to set. + * @return This builder for chaining. + */ + public Builder setName(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + name_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return This builder for chaining. + */ + public Builder clearName() { + name_ = getDefaultInstance().getName(); + bitField0_ = (bitField0_ & ~0x00000001); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The bytes for name to set. + * @return This builder for chaining. + */ + public Builder setNameBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + name_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.DisableSecretVersionRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.DisableSecretVersionRequest) + private static final com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest + DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest(); + } + + public static com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest + getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public DisableSecretVersionRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + Builder builder = newBuilder(); + try { + builder.mergeFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(builder.buildPartial()); + } catch (com.google.protobuf.UninitializedMessageException e) { + throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial()); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e) + .setUnfinishedMessage(builder.buildPartial()); + } + return builder.buildPartial(); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest + getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DisableSecretVersionRequestOrBuilder.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DisableSecretVersionRequestOrBuilder.java new file mode 100644 index 000000000000..191340ae74e3 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/DisableSecretVersionRequestOrBuilder.java @@ -0,0 +1,57 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +public interface DisableSecretVersionRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.DisableSecretVersionRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + java.lang.String getName(); + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + com.google.protobuf.ByteString getNameBytes(); +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/EnableSecretVersionRequest.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/EnableSecretVersionRequest.java new file mode 100644 index 000000000000..409f169fd2a2 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/EnableSecretVersionRequest.java @@ -0,0 +1,656 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.EnableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.EnableSecretVersion].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.EnableSecretVersionRequest} + */ +public final class EnableSecretVersionRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.EnableSecretVersionRequest) + EnableSecretVersionRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use EnableSecretVersionRequest.newBuilder() to construct. + private EnableSecretVersionRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private EnableSecretVersionRequest() { + name_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new EnableSecretVersionRequest(); + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_EnableSecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_EnableSecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest.class, + com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest.Builder.class); + } + + public static final int NAME_FIELD_NUMBER = 1; + + @SuppressWarnings("serial") + private volatile java.lang.Object name_ = ""; + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + @java.lang.Override + public java.lang.String getName() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } + } + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + @java.lang.Override + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); + } + getUnknownFields().writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); + } + size += getUnknownFields().getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest)) { + return super.equals(obj); + } + com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest other = + (com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest) obj; + + if (!getName().equals(other.getName())) return false; + if (!getUnknownFields().equals(other.getUnknownFields())) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + NAME_FIELD_NUMBER; + hash = (53 * hash) + getName().hashCode(); + hash = (29 * hash) + getUnknownFields().hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest parseFrom( + byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest + parseDelimitedFrom(java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest + parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.EnableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.EnableSecretVersion].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.EnableSecretVersionRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.EnableSecretVersionRequest) + com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_EnableSecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_EnableSecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest.class, + com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest.Builder.class); + } + + // Construct using + // com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest.newBuilder() + private Builder() {} + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + } + + @java.lang.Override + public Builder clear() { + super.clear(); + bitField0_ = 0; + name_ = ""; + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_EnableSecretVersionRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest + getDefaultInstanceForType() { + return com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest build() { + com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest buildPartial() { + com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest result = + new com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest(this); + if (bitField0_ != 0) { + buildPartial0(result); + } + onBuilt(); + return result; + } + + private void buildPartial0( + com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest result) { + int from_bitField0_ = bitField0_; + if (((from_bitField0_ & 0x00000001) != 0)) { + result.name_ = name_; + } + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest) { + return mergeFrom((com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom( + com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest other) { + if (other + == com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest.getDefaultInstance()) + return this; + if (!other.getName().isEmpty()) { + name_ = other.name_; + bitField0_ |= 0x00000001; + onChanged(); + } + this.mergeUnknownFields(other.getUnknownFields()); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + name_ = input.readStringRequireUtf8(); + bitField0_ |= 0x00000001; + break; + } // case 10 + default: + { + if (!super.parseUnknownField(input, extensionRegistry, tag)) { + done = true; // was an endgroup tag + } + break; + } // default: + } // switch (tag) + } // while (!done) + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.unwrapIOException(); + } finally { + onChanged(); + } // finally + return this; + } + + private int bitField0_; + + private java.lang.Object name_ = ""; + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The name to set. + * @return This builder for chaining. + */ + public Builder setName(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + name_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return This builder for chaining. + */ + public Builder clearName() { + name_ = getDefaultInstance().getName(); + bitField0_ = (bitField0_ & ~0x00000001); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format
+     * `projects/*/secrets/*/versions/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The bytes for name to set. + * @return This builder for chaining. + */ + public Builder setNameBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + name_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.EnableSecretVersionRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.EnableSecretVersionRequest) + private static final com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest + DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest(); + } + + public static com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest + getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public EnableSecretVersionRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + Builder builder = newBuilder(); + try { + builder.mergeFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(builder.buildPartial()); + } catch (com.google.protobuf.UninitializedMessageException e) { + throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial()); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e) + .setUnfinishedMessage(builder.buildPartial()); + } + return builder.buildPartial(); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest + getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/EnableSecretVersionRequestOrBuilder.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/EnableSecretVersionRequestOrBuilder.java new file mode 100644 index 000000000000..67f5c8af7111 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/EnableSecretVersionRequestOrBuilder.java @@ -0,0 +1,57 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +public interface EnableSecretVersionRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.EnableSecretVersionRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + java.lang.String getName(); + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format
+   * `projects/*/secrets/*/versions/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + com.google.protobuf.ByteString getNameBytes(); +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/GetSecretRequest.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/GetSecretRequest.java new file mode 100644 index 000000000000..e1244a0d2510 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/GetSecretRequest.java @@ -0,0 +1,640 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.GetSecret][google.cloud.secrets.v1beta1.SecretManagerService.GetSecret].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.GetSecretRequest} + */ +public final class GetSecretRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.GetSecretRequest) + GetSecretRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use GetSecretRequest.newBuilder() to construct. + private GetSecretRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private GetSecretRequest() { + name_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new GetSecretRequest(); + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_GetSecretRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_GetSecretRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.GetSecretRequest.class, + com.google.cloud.secretmanager.v1beta1.GetSecretRequest.Builder.class); + } + + public static final int NAME_FIELD_NUMBER = 1; + + @SuppressWarnings("serial") + private volatile java.lang.Object name_ = ""; + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + @java.lang.Override + public java.lang.String getName() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } + } + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + @java.lang.Override + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); + } + getUnknownFields().writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); + } + size += getUnknownFields().getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secretmanager.v1beta1.GetSecretRequest)) { + return super.equals(obj); + } + com.google.cloud.secretmanager.v1beta1.GetSecretRequest other = + (com.google.cloud.secretmanager.v1beta1.GetSecretRequest) obj; + + if (!getName().equals(other.getName())) return false; + if (!getUnknownFields().equals(other.getUnknownFields())) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + NAME_FIELD_NUMBER; + hash = (53 * hash) + getName().hashCode(); + hash = (29 * hash) + getUnknownFields().hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretRequest parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretRequest parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretRequest parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secretmanager.v1beta1.GetSecretRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.GetSecret][google.cloud.secrets.v1beta1.SecretManagerService.GetSecret].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.GetSecretRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.GetSecretRequest) + com.google.cloud.secretmanager.v1beta1.GetSecretRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_GetSecretRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_GetSecretRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.GetSecretRequest.class, + com.google.cloud.secretmanager.v1beta1.GetSecretRequest.Builder.class); + } + + // Construct using com.google.cloud.secretmanager.v1beta1.GetSecretRequest.newBuilder() + private Builder() {} + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + } + + @java.lang.Override + public Builder clear() { + super.clear(); + bitField0_ = 0; + name_ = ""; + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_GetSecretRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.GetSecretRequest getDefaultInstanceForType() { + return com.google.cloud.secretmanager.v1beta1.GetSecretRequest.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.GetSecretRequest build() { + com.google.cloud.secretmanager.v1beta1.GetSecretRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.GetSecretRequest buildPartial() { + com.google.cloud.secretmanager.v1beta1.GetSecretRequest result = + new com.google.cloud.secretmanager.v1beta1.GetSecretRequest(this); + if (bitField0_ != 0) { + buildPartial0(result); + } + onBuilt(); + return result; + } + + private void buildPartial0(com.google.cloud.secretmanager.v1beta1.GetSecretRequest result) { + int from_bitField0_ = bitField0_; + if (((from_bitField0_ & 0x00000001) != 0)) { + result.name_ = name_; + } + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secretmanager.v1beta1.GetSecretRequest) { + return mergeFrom((com.google.cloud.secretmanager.v1beta1.GetSecretRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secretmanager.v1beta1.GetSecretRequest other) { + if (other == com.google.cloud.secretmanager.v1beta1.GetSecretRequest.getDefaultInstance()) + return this; + if (!other.getName().isEmpty()) { + name_ = other.name_; + bitField0_ |= 0x00000001; + onChanged(); + } + this.mergeUnknownFields(other.getUnknownFields()); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + name_ = input.readStringRequireUtf8(); + bitField0_ |= 0x00000001; + break; + } // case 10 + default: + { + if (!super.parseUnknownField(input, extensionRegistry, tag)) { + done = true; // was an endgroup tag + } + break; + } // default: + } // switch (tag) + } // while (!done) + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.unwrapIOException(); + } finally { + onChanged(); + } // finally + return this; + } + + private int bitField0_; + + private java.lang.Object name_ = ""; + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The name to set. + * @return This builder for chaining. + */ + public Builder setName(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + name_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return This builder for chaining. + */ + public Builder clearName() { + name_ = getDefaultInstance().getName(); + bitField0_ = (bitField0_ & ~0x00000001); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`.
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The bytes for name to set. + * @return This builder for chaining. + */ + public Builder setNameBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + name_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.GetSecretRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.GetSecretRequest) + private static final com.google.cloud.secretmanager.v1beta1.GetSecretRequest DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secretmanager.v1beta1.GetSecretRequest(); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretRequest getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public GetSecretRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + Builder builder = newBuilder(); + try { + builder.mergeFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(builder.buildPartial()); + } catch (com.google.protobuf.UninitializedMessageException e) { + throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial()); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e) + .setUnfinishedMessage(builder.buildPartial()); + } + return builder.buildPartial(); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.GetSecretRequest getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/GetSecretRequestOrBuilder.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/GetSecretRequestOrBuilder.java new file mode 100644 index 000000000000..fb7a5272fd9c --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/GetSecretRequestOrBuilder.java @@ -0,0 +1,55 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +public interface GetSecretRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.GetSecretRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + java.lang.String getName(); + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`.
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + com.google.protobuf.ByteString getNameBytes(); +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/GetSecretVersionRequest.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/GetSecretVersionRequest.java new file mode 100644 index 000000000000..29faabf663f0 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/GetSecretVersionRequest.java @@ -0,0 +1,667 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.GetSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.GetSecretVersion].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.GetSecretVersionRequest} + */ +public final class GetSecretVersionRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.GetSecretVersionRequest) + GetSecretVersionRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use GetSecretVersionRequest.newBuilder() to construct. + private GetSecretVersionRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private GetSecretVersionRequest() { + name_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new GetSecretVersionRequest(); + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_GetSecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_GetSecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest.class, + com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest.Builder.class); + } + + public static final int NAME_FIELD_NUMBER = 1; + + @SuppressWarnings("serial") + private volatile java.lang.Object name_ = ""; + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + @java.lang.Override + public java.lang.String getName() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } + } + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + @java.lang.Override + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); + } + getUnknownFields().writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); + } + size += getUnknownFields().getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest)) { + return super.equals(obj); + } + com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest other = + (com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest) obj; + + if (!getName().equals(other.getName())) return false; + if (!getUnknownFields().equals(other.getUnknownFields())) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + NAME_FIELD_NUMBER; + hash = (53 * hash) + getName().hashCode(); + hash = (29 * hash) + getUnknownFields().hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest parseFrom( + byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.GetSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.GetSecretVersion].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.GetSecretVersionRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.GetSecretVersionRequest) + com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_GetSecretVersionRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_GetSecretVersionRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest.class, + com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest.Builder.class); + } + + // Construct using com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest.newBuilder() + private Builder() {} + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + } + + @java.lang.Override + public Builder clear() { + super.clear(); + bitField0_ = 0; + name_ = ""; + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_GetSecretVersionRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest + getDefaultInstanceForType() { + return com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest build() { + com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest buildPartial() { + com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest result = + new com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest(this); + if (bitField0_ != 0) { + buildPartial0(result); + } + onBuilt(); + return result; + } + + private void buildPartial0( + com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest result) { + int from_bitField0_ = bitField0_; + if (((from_bitField0_ & 0x00000001) != 0)) { + result.name_ = name_; + } + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest) { + return mergeFrom((com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest other) { + if (other + == com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest.getDefaultInstance()) + return this; + if (!other.getName().isEmpty()) { + name_ = other.name_; + bitField0_ |= 0x00000001; + onChanged(); + } + this.mergeUnknownFields(other.getUnknownFields()); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + name_ = input.readStringRequireUtf8(); + bitField0_ |= 0x00000001; + break; + } // case 10 + default: + { + if (!super.parseUnknownField(input, extensionRegistry, tag)) { + done = true; // was an endgroup tag + } + break; + } // default: + } // switch (tag) + } // while (!done) + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.unwrapIOException(); + } finally { + onChanged(); + } // finally + return this; + } + + private int bitField0_; + + private java.lang.Object name_ = ""; + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The name to set. + * @return This builder for chaining. + */ + public Builder setName(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + name_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return This builder for chaining. + */ + public Builder clearName() { + name_ = getDefaultInstance().getName(); + bitField0_ = (bitField0_ & ~0x00000001); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+     * `projects/*/secrets/*/versions/*`.
+     * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The bytes for name to set. + * @return This builder for chaining. + */ + public Builder setNameBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + name_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.GetSecretVersionRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.GetSecretVersionRequest) + private static final com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest + DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest(); + } + + public static com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest + getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public GetSecretVersionRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + Builder builder = newBuilder(); + try { + builder.mergeFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(builder.buildPartial()); + } catch (com.google.protobuf.UninitializedMessageException e) { + throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial()); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e) + .setUnfinishedMessage(builder.buildPartial()); + } + return builder.buildPartial(); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest + getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/GetSecretVersionRequestOrBuilder.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/GetSecretVersionRequestOrBuilder.java new file mode 100644 index 000000000000..cb64336cce73 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/GetSecretVersionRequestOrBuilder.java @@ -0,0 +1,61 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +public interface GetSecretVersionRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.GetSecretVersionRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The name. + */ + java.lang.String getName(); + /** + * + * + *
+   * Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
+   * `projects/*/secrets/*/versions/*`.
+   * `projects/*/secrets/*/versions/latest` is an alias to the `latest`
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * string name = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for name. + */ + com.google.protobuf.ByteString getNameBytes(); +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretVersionsRequest.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretVersionsRequest.java new file mode 100644 index 000000000000..ae5dbe944ad6 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretVersionsRequest.java @@ -0,0 +1,951 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.ListSecretVersionsRequest} + */ +public final class ListSecretVersionsRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.ListSecretVersionsRequest) + ListSecretVersionsRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use ListSecretVersionsRequest.newBuilder() to construct. + private ListSecretVersionsRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private ListSecretVersionsRequest() { + parent_ = ""; + pageToken_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new ListSecretVersionsRequest(); + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest.class, + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest.Builder.class); + } + + public static final int PARENT_FIELD_NUMBER = 1; + + @SuppressWarnings("serial") + private volatile java.lang.Object parent_ = ""; + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the
+   * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format
+   * `projects/*/secrets/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + @java.lang.Override + public java.lang.String getParent() { + java.lang.Object ref = parent_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + parent_ = s; + return s; + } + } + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the
+   * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format
+   * `projects/*/secrets/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + @java.lang.Override + public com.google.protobuf.ByteString getParentBytes() { + java.lang.Object ref = parent_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + parent_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + public static final int PAGE_SIZE_FIELD_NUMBER = 2; + private int pageSize_ = 0; + /** + * + * + *
+   * Optional. The maximum number of results to be returned in a single page. If
+   * set to 0, the server decides the number of results to return. If the
+   * number is greater than 25000, it is capped at 25000.
+   * 
+ * + * int32 page_size = 2 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageSize. + */ + @java.lang.Override + public int getPageSize() { + return pageSize_; + } + + public static final int PAGE_TOKEN_FIELD_NUMBER = 3; + + @SuppressWarnings("serial") + private volatile java.lang.Object pageToken_ = ""; + /** + * + * + *
+   * Optional. Pagination token, returned earlier via
+   * ListSecretVersionsResponse.next_page_token][].
+   * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageToken. + */ + @java.lang.Override + public java.lang.String getPageToken() { + java.lang.Object ref = pageToken_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + pageToken_ = s; + return s; + } + } + /** + * + * + *
+   * Optional. Pagination token, returned earlier via
+   * ListSecretVersionsResponse.next_page_token][].
+   * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The bytes for pageToken. + */ + @java.lang.Override + public com.google.protobuf.ByteString getPageTokenBytes() { + java.lang.Object ref = pageToken_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + pageToken_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, parent_); + } + if (pageSize_ != 0) { + output.writeInt32(2, pageSize_); + } + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(pageToken_)) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 3, pageToken_); + } + getUnknownFields().writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, parent_); + } + if (pageSize_ != 0) { + size += com.google.protobuf.CodedOutputStream.computeInt32Size(2, pageSize_); + } + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(pageToken_)) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(3, pageToken_); + } + size += getUnknownFields().getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest)) { + return super.equals(obj); + } + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest other = + (com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest) obj; + + if (!getParent().equals(other.getParent())) return false; + if (getPageSize() != other.getPageSize()) return false; + if (!getPageToken().equals(other.getPageToken())) return false; + if (!getUnknownFields().equals(other.getUnknownFields())) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + PARENT_FIELD_NUMBER; + hash = (53 * hash) + getParent().hashCode(); + hash = (37 * hash) + PAGE_SIZE_FIELD_NUMBER; + hash = (53 * hash) + getPageSize(); + hash = (37 * hash) + PAGE_TOKEN_FIELD_NUMBER; + hash = (53 * hash) + getPageToken().hashCode(); + hash = (29 * hash) + getUnknownFields().hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest parseFrom( + byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.ListSecretVersionsRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.ListSecretVersionsRequest) + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest.class, + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest.Builder.class); + } + + // Construct using com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest.newBuilder() + private Builder() {} + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + } + + @java.lang.Override + public Builder clear() { + super.clear(); + bitField0_ = 0; + parent_ = ""; + pageSize_ = 0; + pageToken_ = ""; + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest + getDefaultInstanceForType() { + return com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest build() { + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest buildPartial() { + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest result = + new com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest(this); + if (bitField0_ != 0) { + buildPartial0(result); + } + onBuilt(); + return result; + } + + private void buildPartial0( + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest result) { + int from_bitField0_ = bitField0_; + if (((from_bitField0_ & 0x00000001) != 0)) { + result.parent_ = parent_; + } + if (((from_bitField0_ & 0x00000002) != 0)) { + result.pageSize_ = pageSize_; + } + if (((from_bitField0_ & 0x00000004) != 0)) { + result.pageToken_ = pageToken_; + } + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest) { + return mergeFrom((com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom( + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest other) { + if (other + == com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest.getDefaultInstance()) + return this; + if (!other.getParent().isEmpty()) { + parent_ = other.parent_; + bitField0_ |= 0x00000001; + onChanged(); + } + if (other.getPageSize() != 0) { + setPageSize(other.getPageSize()); + } + if (!other.getPageToken().isEmpty()) { + pageToken_ = other.pageToken_; + bitField0_ |= 0x00000004; + onChanged(); + } + this.mergeUnknownFields(other.getUnknownFields()); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + parent_ = input.readStringRequireUtf8(); + bitField0_ |= 0x00000001; + break; + } // case 10 + case 16: + { + pageSize_ = input.readInt32(); + bitField0_ |= 0x00000002; + break; + } // case 16 + case 26: + { + pageToken_ = input.readStringRequireUtf8(); + bitField0_ |= 0x00000004; + break; + } // case 26 + default: + { + if (!super.parseUnknownField(input, extensionRegistry, tag)) { + done = true; // was an endgroup tag + } + break; + } // default: + } // switch (tag) + } // while (!done) + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.unwrapIOException(); + } finally { + onChanged(); + } // finally + return this; + } + + private int bitField0_; + + private java.lang.Object parent_ = ""; + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the
+     * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format
+     * `projects/*/secrets/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + public java.lang.String getParent() { + java.lang.Object ref = parent_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + parent_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the
+     * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format
+     * `projects/*/secrets/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + public com.google.protobuf.ByteString getParentBytes() { + java.lang.Object ref = parent_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + parent_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the
+     * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format
+     * `projects/*/secrets/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The parent to set. + * @return This builder for chaining. + */ + public Builder setParent(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + parent_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the
+     * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format
+     * `projects/*/secrets/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return This builder for chaining. + */ + public Builder clearParent() { + parent_ = getDefaultInstance().getParent(); + bitField0_ = (bitField0_ & ~0x00000001); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the
+     * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format
+     * `projects/*/secrets/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The bytes for parent to set. + * @return This builder for chaining. + */ + public Builder setParentBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + parent_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + + private int pageSize_; + /** + * + * + *
+     * Optional. The maximum number of results to be returned in a single page. If
+     * set to 0, the server decides the number of results to return. If the
+     * number is greater than 25000, it is capped at 25000.
+     * 
+ * + * int32 page_size = 2 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageSize. + */ + @java.lang.Override + public int getPageSize() { + return pageSize_; + } + /** + * + * + *
+     * Optional. The maximum number of results to be returned in a single page. If
+     * set to 0, the server decides the number of results to return. If the
+     * number is greater than 25000, it is capped at 25000.
+     * 
+ * + * int32 page_size = 2 [(.google.api.field_behavior) = OPTIONAL]; + * + * @param value The pageSize to set. + * @return This builder for chaining. + */ + public Builder setPageSize(int value) { + + pageSize_ = value; + bitField0_ |= 0x00000002; + onChanged(); + return this; + } + /** + * + * + *
+     * Optional. The maximum number of results to be returned in a single page. If
+     * set to 0, the server decides the number of results to return. If the
+     * number is greater than 25000, it is capped at 25000.
+     * 
+ * + * int32 page_size = 2 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return This builder for chaining. + */ + public Builder clearPageSize() { + bitField0_ = (bitField0_ & ~0x00000002); + pageSize_ = 0; + onChanged(); + return this; + } + + private java.lang.Object pageToken_ = ""; + /** + * + * + *
+     * Optional. Pagination token, returned earlier via
+     * ListSecretVersionsResponse.next_page_token][].
+     * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageToken. + */ + public java.lang.String getPageToken() { + java.lang.Object ref = pageToken_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + pageToken_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Optional. Pagination token, returned earlier via
+     * ListSecretVersionsResponse.next_page_token][].
+     * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The bytes for pageToken. + */ + public com.google.protobuf.ByteString getPageTokenBytes() { + java.lang.Object ref = pageToken_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + pageToken_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Optional. Pagination token, returned earlier via
+     * ListSecretVersionsResponse.next_page_token][].
+     * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @param value The pageToken to set. + * @return This builder for chaining. + */ + public Builder setPageToken(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + pageToken_ = value; + bitField0_ |= 0x00000004; + onChanged(); + return this; + } + /** + * + * + *
+     * Optional. Pagination token, returned earlier via
+     * ListSecretVersionsResponse.next_page_token][].
+     * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return This builder for chaining. + */ + public Builder clearPageToken() { + pageToken_ = getDefaultInstance().getPageToken(); + bitField0_ = (bitField0_ & ~0x00000004); + onChanged(); + return this; + } + /** + * + * + *
+     * Optional. Pagination token, returned earlier via
+     * ListSecretVersionsResponse.next_page_token][].
+     * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @param value The bytes for pageToken to set. + * @return This builder for chaining. + */ + public Builder setPageTokenBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + pageToken_ = value; + bitField0_ |= 0x00000004; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.ListSecretVersionsRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.ListSecretVersionsRequest) + private static final com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest + DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest(); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest + getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public ListSecretVersionsRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + Builder builder = newBuilder(); + try { + builder.mergeFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(builder.buildPartial()); + } catch (com.google.protobuf.UninitializedMessageException e) { + throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial()); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e) + .setUnfinishedMessage(builder.buildPartial()); + } + return builder.buildPartial(); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest + getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretVersionsRequestOrBuilder.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretVersionsRequestOrBuilder.java new file mode 100644 index 000000000000..988930d34560 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretVersionsRequestOrBuilder.java @@ -0,0 +1,101 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +public interface ListSecretVersionsRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.ListSecretVersionsRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the
+   * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format
+   * `projects/*/secrets/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + java.lang.String getParent(); + /** + * + * + *
+   * Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the
+   * [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format
+   * `projects/*/secrets/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + com.google.protobuf.ByteString getParentBytes(); + + /** + * + * + *
+   * Optional. The maximum number of results to be returned in a single page. If
+   * set to 0, the server decides the number of results to return. If the
+   * number is greater than 25000, it is capped at 25000.
+   * 
+ * + * int32 page_size = 2 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageSize. + */ + int getPageSize(); + + /** + * + * + *
+   * Optional. Pagination token, returned earlier via
+   * ListSecretVersionsResponse.next_page_token][].
+   * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageToken. + */ + java.lang.String getPageToken(); + /** + * + * + *
+   * Optional. Pagination token, returned earlier via
+   * ListSecretVersionsResponse.next_page_token][].
+   * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The bytes for pageToken. + */ + com.google.protobuf.ByteString getPageTokenBytes(); +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretVersionsResponse.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretVersionsResponse.java new file mode 100644 index 000000000000..54195a469bc7 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretVersionsResponse.java @@ -0,0 +1,1262 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +/** + * + * + *
+ * Response message for [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.ListSecretVersionsResponse} + */ +public final class ListSecretVersionsResponse extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.ListSecretVersionsResponse) + ListSecretVersionsResponseOrBuilder { + private static final long serialVersionUID = 0L; + // Use ListSecretVersionsResponse.newBuilder() to construct. + private ListSecretVersionsResponse(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private ListSecretVersionsResponse() { + versions_ = java.util.Collections.emptyList(); + nextPageToken_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new ListSecretVersionsResponse(); + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsResponse_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsResponse_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse.class, + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse.Builder.class); + } + + public static final int VERSIONS_FIELD_NUMBER = 1; + + @SuppressWarnings("serial") + private java.util.List versions_; + /** + * + * + *
+   * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+   * create_time (newest first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + @java.lang.Override + public java.util.List getVersionsList() { + return versions_; + } + /** + * + * + *
+   * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+   * create_time (newest first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + @java.lang.Override + public java.util.List + getVersionsOrBuilderList() { + return versions_; + } + /** + * + * + *
+   * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+   * create_time (newest first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + @java.lang.Override + public int getVersionsCount() { + return versions_.size(); + } + /** + * + * + *
+   * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+   * create_time (newest first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.SecretVersion getVersions(int index) { + return versions_.get(index); + } + /** + * + * + *
+   * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+   * create_time (newest first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.SecretVersionOrBuilder getVersionsOrBuilder( + int index) { + return versions_.get(index); + } + + public static final int NEXT_PAGE_TOKEN_FIELD_NUMBER = 2; + + @SuppressWarnings("serial") + private volatile java.lang.Object nextPageToken_ = ""; + /** + * + * + *
+   * A token to retrieve the next page of results. Pass this value in
+   * [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page.
+   * 
+ * + * string next_page_token = 2; + * + * @return The nextPageToken. + */ + @java.lang.Override + public java.lang.String getNextPageToken() { + java.lang.Object ref = nextPageToken_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + nextPageToken_ = s; + return s; + } + } + /** + * + * + *
+   * A token to retrieve the next page of results. Pass this value in
+   * [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page.
+   * 
+ * + * string next_page_token = 2; + * + * @return The bytes for nextPageToken. + */ + @java.lang.Override + public com.google.protobuf.ByteString getNextPageTokenBytes() { + java.lang.Object ref = nextPageToken_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + nextPageToken_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + public static final int TOTAL_SIZE_FIELD_NUMBER = 3; + private int totalSize_ = 0; + /** + * + * + *
+   * The total number of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * int32 total_size = 3; + * + * @return The totalSize. + */ + @java.lang.Override + public int getTotalSize() { + return totalSize_; + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + for (int i = 0; i < versions_.size(); i++) { + output.writeMessage(1, versions_.get(i)); + } + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(nextPageToken_)) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 2, nextPageToken_); + } + if (totalSize_ != 0) { + output.writeInt32(3, totalSize_); + } + getUnknownFields().writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + for (int i = 0; i < versions_.size(); i++) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(1, versions_.get(i)); + } + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(nextPageToken_)) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(2, nextPageToken_); + } + if (totalSize_ != 0) { + size += com.google.protobuf.CodedOutputStream.computeInt32Size(3, totalSize_); + } + size += getUnknownFields().getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse)) { + return super.equals(obj); + } + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse other = + (com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse) obj; + + if (!getVersionsList().equals(other.getVersionsList())) return false; + if (!getNextPageToken().equals(other.getNextPageToken())) return false; + if (getTotalSize() != other.getTotalSize()) return false; + if (!getUnknownFields().equals(other.getUnknownFields())) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + if (getVersionsCount() > 0) { + hash = (37 * hash) + VERSIONS_FIELD_NUMBER; + hash = (53 * hash) + getVersionsList().hashCode(); + } + hash = (37 * hash) + NEXT_PAGE_TOKEN_FIELD_NUMBER; + hash = (53 * hash) + getNextPageToken().hashCode(); + hash = (37 * hash) + TOTAL_SIZE_FIELD_NUMBER; + hash = (53 * hash) + getTotalSize(); + hash = (29 * hash) + getUnknownFields().hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse parseFrom( + byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse + parseDelimitedFrom(java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse + parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Response message for [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.ListSecretVersionsResponse} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.ListSecretVersionsResponse) + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponseOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsResponse_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsResponse_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse.class, + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse.Builder.class); + } + + // Construct using + // com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse.newBuilder() + private Builder() {} + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + } + + @java.lang.Override + public Builder clear() { + super.clear(); + bitField0_ = 0; + if (versionsBuilder_ == null) { + versions_ = java.util.Collections.emptyList(); + } else { + versions_ = null; + versionsBuilder_.clear(); + } + bitField0_ = (bitField0_ & ~0x00000001); + nextPageToken_ = ""; + totalSize_ = 0; + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsResponse_descriptor; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse + getDefaultInstanceForType() { + return com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse build() { + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse buildPartial() { + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse result = + new com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse(this); + buildPartialRepeatedFields(result); + if (bitField0_ != 0) { + buildPartial0(result); + } + onBuilt(); + return result; + } + + private void buildPartialRepeatedFields( + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse result) { + if (versionsBuilder_ == null) { + if (((bitField0_ & 0x00000001) != 0)) { + versions_ = java.util.Collections.unmodifiableList(versions_); + bitField0_ = (bitField0_ & ~0x00000001); + } + result.versions_ = versions_; + } else { + result.versions_ = versionsBuilder_.build(); + } + } + + private void buildPartial0( + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse result) { + int from_bitField0_ = bitField0_; + if (((from_bitField0_ & 0x00000002) != 0)) { + result.nextPageToken_ = nextPageToken_; + } + if (((from_bitField0_ & 0x00000004) != 0)) { + result.totalSize_ = totalSize_; + } + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse) { + return mergeFrom((com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom( + com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse other) { + if (other + == com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse.getDefaultInstance()) + return this; + if (versionsBuilder_ == null) { + if (!other.versions_.isEmpty()) { + if (versions_.isEmpty()) { + versions_ = other.versions_; + bitField0_ = (bitField0_ & ~0x00000001); + } else { + ensureVersionsIsMutable(); + versions_.addAll(other.versions_); + } + onChanged(); + } + } else { + if (!other.versions_.isEmpty()) { + if (versionsBuilder_.isEmpty()) { + versionsBuilder_.dispose(); + versionsBuilder_ = null; + versions_ = other.versions_; + bitField0_ = (bitField0_ & ~0x00000001); + versionsBuilder_ = + com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders + ? getVersionsFieldBuilder() + : null; + } else { + versionsBuilder_.addAllMessages(other.versions_); + } + } + } + if (!other.getNextPageToken().isEmpty()) { + nextPageToken_ = other.nextPageToken_; + bitField0_ |= 0x00000002; + onChanged(); + } + if (other.getTotalSize() != 0) { + setTotalSize(other.getTotalSize()); + } + this.mergeUnknownFields(other.getUnknownFields()); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + com.google.cloud.secretmanager.v1beta1.SecretVersion m = + input.readMessage( + com.google.cloud.secretmanager.v1beta1.SecretVersion.parser(), + extensionRegistry); + if (versionsBuilder_ == null) { + ensureVersionsIsMutable(); + versions_.add(m); + } else { + versionsBuilder_.addMessage(m); + } + break; + } // case 10 + case 18: + { + nextPageToken_ = input.readStringRequireUtf8(); + bitField0_ |= 0x00000002; + break; + } // case 18 + case 24: + { + totalSize_ = input.readInt32(); + bitField0_ |= 0x00000004; + break; + } // case 24 + default: + { + if (!super.parseUnknownField(input, extensionRegistry, tag)) { + done = true; // was an endgroup tag + } + break; + } // default: + } // switch (tag) + } // while (!done) + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.unwrapIOException(); + } finally { + onChanged(); + } // finally + return this; + } + + private int bitField0_; + + private java.util.List versions_ = + java.util.Collections.emptyList(); + + private void ensureVersionsIsMutable() { + if (!((bitField0_ & 0x00000001) != 0)) { + versions_ = + new java.util.ArrayList( + versions_); + bitField0_ |= 0x00000001; + } + } + + private com.google.protobuf.RepeatedFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.SecretVersion, + com.google.cloud.secretmanager.v1beta1.SecretVersion.Builder, + com.google.cloud.secretmanager.v1beta1.SecretVersionOrBuilder> + versionsBuilder_; + + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public java.util.List getVersionsList() { + if (versionsBuilder_ == null) { + return java.util.Collections.unmodifiableList(versions_); + } else { + return versionsBuilder_.getMessageList(); + } + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public int getVersionsCount() { + if (versionsBuilder_ == null) { + return versions_.size(); + } else { + return versionsBuilder_.getCount(); + } + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public com.google.cloud.secretmanager.v1beta1.SecretVersion getVersions(int index) { + if (versionsBuilder_ == null) { + return versions_.get(index); + } else { + return versionsBuilder_.getMessage(index); + } + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public Builder setVersions( + int index, com.google.cloud.secretmanager.v1beta1.SecretVersion value) { + if (versionsBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + ensureVersionsIsMutable(); + versions_.set(index, value); + onChanged(); + } else { + versionsBuilder_.setMessage(index, value); + } + return this; + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public Builder setVersions( + int index, com.google.cloud.secretmanager.v1beta1.SecretVersion.Builder builderForValue) { + if (versionsBuilder_ == null) { + ensureVersionsIsMutable(); + versions_.set(index, builderForValue.build()); + onChanged(); + } else { + versionsBuilder_.setMessage(index, builderForValue.build()); + } + return this; + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public Builder addVersions(com.google.cloud.secretmanager.v1beta1.SecretVersion value) { + if (versionsBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + ensureVersionsIsMutable(); + versions_.add(value); + onChanged(); + } else { + versionsBuilder_.addMessage(value); + } + return this; + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public Builder addVersions( + int index, com.google.cloud.secretmanager.v1beta1.SecretVersion value) { + if (versionsBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + ensureVersionsIsMutable(); + versions_.add(index, value); + onChanged(); + } else { + versionsBuilder_.addMessage(index, value); + } + return this; + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public Builder addVersions( + com.google.cloud.secretmanager.v1beta1.SecretVersion.Builder builderForValue) { + if (versionsBuilder_ == null) { + ensureVersionsIsMutable(); + versions_.add(builderForValue.build()); + onChanged(); + } else { + versionsBuilder_.addMessage(builderForValue.build()); + } + return this; + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public Builder addVersions( + int index, com.google.cloud.secretmanager.v1beta1.SecretVersion.Builder builderForValue) { + if (versionsBuilder_ == null) { + ensureVersionsIsMutable(); + versions_.add(index, builderForValue.build()); + onChanged(); + } else { + versionsBuilder_.addMessage(index, builderForValue.build()); + } + return this; + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public Builder addAllVersions( + java.lang.Iterable values) { + if (versionsBuilder_ == null) { + ensureVersionsIsMutable(); + com.google.protobuf.AbstractMessageLite.Builder.addAll(values, versions_); + onChanged(); + } else { + versionsBuilder_.addAllMessages(values); + } + return this; + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public Builder clearVersions() { + if (versionsBuilder_ == null) { + versions_ = java.util.Collections.emptyList(); + bitField0_ = (bitField0_ & ~0x00000001); + onChanged(); + } else { + versionsBuilder_.clear(); + } + return this; + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public Builder removeVersions(int index) { + if (versionsBuilder_ == null) { + ensureVersionsIsMutable(); + versions_.remove(index); + onChanged(); + } else { + versionsBuilder_.remove(index); + } + return this; + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public com.google.cloud.secretmanager.v1beta1.SecretVersion.Builder getVersionsBuilder( + int index) { + return getVersionsFieldBuilder().getBuilder(index); + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public com.google.cloud.secretmanager.v1beta1.SecretVersionOrBuilder getVersionsOrBuilder( + int index) { + if (versionsBuilder_ == null) { + return versions_.get(index); + } else { + return versionsBuilder_.getMessageOrBuilder(index); + } + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public java.util.List + getVersionsOrBuilderList() { + if (versionsBuilder_ != null) { + return versionsBuilder_.getMessageOrBuilderList(); + } else { + return java.util.Collections.unmodifiableList(versions_); + } + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public com.google.cloud.secretmanager.v1beta1.SecretVersion.Builder addVersionsBuilder() { + return getVersionsFieldBuilder() + .addBuilder(com.google.cloud.secretmanager.v1beta1.SecretVersion.getDefaultInstance()); + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public com.google.cloud.secretmanager.v1beta1.SecretVersion.Builder addVersionsBuilder( + int index) { + return getVersionsFieldBuilder() + .addBuilder( + index, com.google.cloud.secretmanager.v1beta1.SecretVersion.getDefaultInstance()); + } + /** + * + * + *
+     * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+     * create_time (newest first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + public java.util.List + getVersionsBuilderList() { + return getVersionsFieldBuilder().getBuilderList(); + } + + private com.google.protobuf.RepeatedFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.SecretVersion, + com.google.cloud.secretmanager.v1beta1.SecretVersion.Builder, + com.google.cloud.secretmanager.v1beta1.SecretVersionOrBuilder> + getVersionsFieldBuilder() { + if (versionsBuilder_ == null) { + versionsBuilder_ = + new com.google.protobuf.RepeatedFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.SecretVersion, + com.google.cloud.secretmanager.v1beta1.SecretVersion.Builder, + com.google.cloud.secretmanager.v1beta1.SecretVersionOrBuilder>( + versions_, ((bitField0_ & 0x00000001) != 0), getParentForChildren(), isClean()); + versions_ = null; + } + return versionsBuilder_; + } + + private java.lang.Object nextPageToken_ = ""; + /** + * + * + *
+     * A token to retrieve the next page of results. Pass this value in
+     * [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page.
+     * 
+ * + * string next_page_token = 2; + * + * @return The nextPageToken. + */ + public java.lang.String getNextPageToken() { + java.lang.Object ref = nextPageToken_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + nextPageToken_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * A token to retrieve the next page of results. Pass this value in
+     * [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page.
+     * 
+ * + * string next_page_token = 2; + * + * @return The bytes for nextPageToken. + */ + public com.google.protobuf.ByteString getNextPageTokenBytes() { + java.lang.Object ref = nextPageToken_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + nextPageToken_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * A token to retrieve the next page of results. Pass this value in
+     * [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page.
+     * 
+ * + * string next_page_token = 2; + * + * @param value The nextPageToken to set. + * @return This builder for chaining. + */ + public Builder setNextPageToken(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + nextPageToken_ = value; + bitField0_ |= 0x00000002; + onChanged(); + return this; + } + /** + * + * + *
+     * A token to retrieve the next page of results. Pass this value in
+     * [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page.
+     * 
+ * + * string next_page_token = 2; + * + * @return This builder for chaining. + */ + public Builder clearNextPageToken() { + nextPageToken_ = getDefaultInstance().getNextPageToken(); + bitField0_ = (bitField0_ & ~0x00000002); + onChanged(); + return this; + } + /** + * + * + *
+     * A token to retrieve the next page of results. Pass this value in
+     * [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page.
+     * 
+ * + * string next_page_token = 2; + * + * @param value The bytes for nextPageToken to set. + * @return This builder for chaining. + */ + public Builder setNextPageTokenBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + nextPageToken_ = value; + bitField0_ |= 0x00000002; + onChanged(); + return this; + } + + private int totalSize_; + /** + * + * + *
+     * The total number of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * int32 total_size = 3; + * + * @return The totalSize. + */ + @java.lang.Override + public int getTotalSize() { + return totalSize_; + } + /** + * + * + *
+     * The total number of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * int32 total_size = 3; + * + * @param value The totalSize to set. + * @return This builder for chaining. + */ + public Builder setTotalSize(int value) { + + totalSize_ = value; + bitField0_ |= 0x00000004; + onChanged(); + return this; + } + /** + * + * + *
+     * The total number of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * int32 total_size = 3; + * + * @return This builder for chaining. + */ + public Builder clearTotalSize() { + bitField0_ = (bitField0_ & ~0x00000004); + totalSize_ = 0; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.ListSecretVersionsResponse) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.ListSecretVersionsResponse) + private static final com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse + DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse(); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse + getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public ListSecretVersionsResponse parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + Builder builder = newBuilder(); + try { + builder.mergeFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(builder.buildPartial()); + } catch (com.google.protobuf.UninitializedMessageException e) { + throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial()); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e) + .setUnfinishedMessage(builder.buildPartial()); + } + return builder.buildPartial(); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse + getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretVersionsResponseOrBuilder.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretVersionsResponseOrBuilder.java new file mode 100644 index 000000000000..cad90eedca45 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretVersionsResponseOrBuilder.java @@ -0,0 +1,123 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +public interface ListSecretVersionsResponseOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.ListSecretVersionsResponse) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+   * create_time (newest first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + java.util.List getVersionsList(); + /** + * + * + *
+   * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+   * create_time (newest first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + com.google.cloud.secretmanager.v1beta1.SecretVersion getVersions(int index); + /** + * + * + *
+   * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+   * create_time (newest first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + int getVersionsCount(); + /** + * + * + *
+   * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+   * create_time (newest first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + java.util.List + getVersionsOrBuilderList(); + /** + * + * + *
+   * The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
+   * create_time (newest first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.SecretVersion versions = 1; + */ + com.google.cloud.secretmanager.v1beta1.SecretVersionOrBuilder getVersionsOrBuilder(int index); + + /** + * + * + *
+   * A token to retrieve the next page of results. Pass this value in
+   * [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page.
+   * 
+ * + * string next_page_token = 2; + * + * @return The nextPageToken. + */ + java.lang.String getNextPageToken(); + /** + * + * + *
+   * A token to retrieve the next page of results. Pass this value in
+   * [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page.
+   * 
+ * + * string next_page_token = 2; + * + * @return The bytes for nextPageToken. + */ + com.google.protobuf.ByteString getNextPageTokenBytes(); + + /** + * + * + *
+   * The total number of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * int32 total_size = 3; + * + * @return The totalSize. + */ + int getTotalSize(); +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretsRequest.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretsRequest.java new file mode 100644 index 000000000000..a8e69e6e6e5c --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretsRequest.java @@ -0,0 +1,937 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.ListSecretsRequest} + */ +public final class ListSecretsRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.ListSecretsRequest) + ListSecretsRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use ListSecretsRequest.newBuilder() to construct. + private ListSecretsRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private ListSecretsRequest() { + parent_ = ""; + pageToken_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new ListSecretsRequest(); + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretsRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretsRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.ListSecretsRequest.class, + com.google.cloud.secretmanager.v1beta1.ListSecretsRequest.Builder.class); + } + + public static final int PARENT_FIELD_NUMBER = 1; + + @SuppressWarnings("serial") + private volatile java.lang.Object parent_ = ""; + /** + * + * + *
+   * Required. The resource name of the project associated with the
+   * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + @java.lang.Override + public java.lang.String getParent() { + java.lang.Object ref = parent_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + parent_ = s; + return s; + } + } + /** + * + * + *
+   * Required. The resource name of the project associated with the
+   * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + @java.lang.Override + public com.google.protobuf.ByteString getParentBytes() { + java.lang.Object ref = parent_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + parent_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + public static final int PAGE_SIZE_FIELD_NUMBER = 2; + private int pageSize_ = 0; + /** + * + * + *
+   * Optional. The maximum number of results to be returned in a single page. If
+   * set to 0, the server decides the number of results to return. If the
+   * number is greater than 25000, it is capped at 25000.
+   * 
+ * + * int32 page_size = 2 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageSize. + */ + @java.lang.Override + public int getPageSize() { + return pageSize_; + } + + public static final int PAGE_TOKEN_FIELD_NUMBER = 3; + + @SuppressWarnings("serial") + private volatile java.lang.Object pageToken_ = ""; + /** + * + * + *
+   * Optional. Pagination token, returned earlier via
+   * [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token].
+   * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageToken. + */ + @java.lang.Override + public java.lang.String getPageToken() { + java.lang.Object ref = pageToken_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + pageToken_ = s; + return s; + } + } + /** + * + * + *
+   * Optional. Pagination token, returned earlier via
+   * [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token].
+   * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The bytes for pageToken. + */ + @java.lang.Override + public com.google.protobuf.ByteString getPageTokenBytes() { + java.lang.Object ref = pageToken_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + pageToken_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, parent_); + } + if (pageSize_ != 0) { + output.writeInt32(2, pageSize_); + } + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(pageToken_)) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 3, pageToken_); + } + getUnknownFields().writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(parent_)) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, parent_); + } + if (pageSize_ != 0) { + size += com.google.protobuf.CodedOutputStream.computeInt32Size(2, pageSize_); + } + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(pageToken_)) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(3, pageToken_); + } + size += getUnknownFields().getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secretmanager.v1beta1.ListSecretsRequest)) { + return super.equals(obj); + } + com.google.cloud.secretmanager.v1beta1.ListSecretsRequest other = + (com.google.cloud.secretmanager.v1beta1.ListSecretsRequest) obj; + + if (!getParent().equals(other.getParent())) return false; + if (getPageSize() != other.getPageSize()) return false; + if (!getPageToken().equals(other.getPageToken())) return false; + if (!getUnknownFields().equals(other.getUnknownFields())) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + PARENT_FIELD_NUMBER; + hash = (53 * hash) + getParent().hashCode(); + hash = (37 * hash) + PAGE_SIZE_FIELD_NUMBER; + hash = (53 * hash) + getPageSize(); + hash = (37 * hash) + PAGE_TOKEN_FIELD_NUMBER; + hash = (53 * hash) + getPageToken().hashCode(); + hash = (29 * hash) + getUnknownFields().hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsRequest parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsRequest parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsRequest parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secretmanager.v1beta1.ListSecretsRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.ListSecretsRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.ListSecretsRequest) + com.google.cloud.secretmanager.v1beta1.ListSecretsRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretsRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretsRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.ListSecretsRequest.class, + com.google.cloud.secretmanager.v1beta1.ListSecretsRequest.Builder.class); + } + + // Construct using com.google.cloud.secretmanager.v1beta1.ListSecretsRequest.newBuilder() + private Builder() {} + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + } + + @java.lang.Override + public Builder clear() { + super.clear(); + bitField0_ = 0; + parent_ = ""; + pageSize_ = 0; + pageToken_ = ""; + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretsRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.ListSecretsRequest getDefaultInstanceForType() { + return com.google.cloud.secretmanager.v1beta1.ListSecretsRequest.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.ListSecretsRequest build() { + com.google.cloud.secretmanager.v1beta1.ListSecretsRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.ListSecretsRequest buildPartial() { + com.google.cloud.secretmanager.v1beta1.ListSecretsRequest result = + new com.google.cloud.secretmanager.v1beta1.ListSecretsRequest(this); + if (bitField0_ != 0) { + buildPartial0(result); + } + onBuilt(); + return result; + } + + private void buildPartial0(com.google.cloud.secretmanager.v1beta1.ListSecretsRequest result) { + int from_bitField0_ = bitField0_; + if (((from_bitField0_ & 0x00000001) != 0)) { + result.parent_ = parent_; + } + if (((from_bitField0_ & 0x00000002) != 0)) { + result.pageSize_ = pageSize_; + } + if (((from_bitField0_ & 0x00000004) != 0)) { + result.pageToken_ = pageToken_; + } + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secretmanager.v1beta1.ListSecretsRequest) { + return mergeFrom((com.google.cloud.secretmanager.v1beta1.ListSecretsRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secretmanager.v1beta1.ListSecretsRequest other) { + if (other == com.google.cloud.secretmanager.v1beta1.ListSecretsRequest.getDefaultInstance()) + return this; + if (!other.getParent().isEmpty()) { + parent_ = other.parent_; + bitField0_ |= 0x00000001; + onChanged(); + } + if (other.getPageSize() != 0) { + setPageSize(other.getPageSize()); + } + if (!other.getPageToken().isEmpty()) { + pageToken_ = other.pageToken_; + bitField0_ |= 0x00000004; + onChanged(); + } + this.mergeUnknownFields(other.getUnknownFields()); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + parent_ = input.readStringRequireUtf8(); + bitField0_ |= 0x00000001; + break; + } // case 10 + case 16: + { + pageSize_ = input.readInt32(); + bitField0_ |= 0x00000002; + break; + } // case 16 + case 26: + { + pageToken_ = input.readStringRequireUtf8(); + bitField0_ |= 0x00000004; + break; + } // case 26 + default: + { + if (!super.parseUnknownField(input, extensionRegistry, tag)) { + done = true; // was an endgroup tag + } + break; + } // default: + } // switch (tag) + } // while (!done) + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.unwrapIOException(); + } finally { + onChanged(); + } // finally + return this; + } + + private int bitField0_; + + private java.lang.Object parent_ = ""; + /** + * + * + *
+     * Required. The resource name of the project associated with the
+     * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + public java.lang.String getParent() { + java.lang.Object ref = parent_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + parent_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the project associated with the
+     * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + public com.google.protobuf.ByteString getParentBytes() { + java.lang.Object ref = parent_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + parent_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Required. The resource name of the project associated with the
+     * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The parent to set. + * @return This builder for chaining. + */ + public Builder setParent(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + parent_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the project associated with the
+     * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return This builder for chaining. + */ + public Builder clearParent() { + parent_ = getDefaultInstance().getParent(); + bitField0_ = (bitField0_ & ~0x00000001); + onChanged(); + return this; + } + /** + * + * + *
+     * Required. The resource name of the project associated with the
+     * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+     * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @param value The bytes for parent to set. + * @return This builder for chaining. + */ + public Builder setParentBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + parent_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + + private int pageSize_; + /** + * + * + *
+     * Optional. The maximum number of results to be returned in a single page. If
+     * set to 0, the server decides the number of results to return. If the
+     * number is greater than 25000, it is capped at 25000.
+     * 
+ * + * int32 page_size = 2 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageSize. + */ + @java.lang.Override + public int getPageSize() { + return pageSize_; + } + /** + * + * + *
+     * Optional. The maximum number of results to be returned in a single page. If
+     * set to 0, the server decides the number of results to return. If the
+     * number is greater than 25000, it is capped at 25000.
+     * 
+ * + * int32 page_size = 2 [(.google.api.field_behavior) = OPTIONAL]; + * + * @param value The pageSize to set. + * @return This builder for chaining. + */ + public Builder setPageSize(int value) { + + pageSize_ = value; + bitField0_ |= 0x00000002; + onChanged(); + return this; + } + /** + * + * + *
+     * Optional. The maximum number of results to be returned in a single page. If
+     * set to 0, the server decides the number of results to return. If the
+     * number is greater than 25000, it is capped at 25000.
+     * 
+ * + * int32 page_size = 2 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return This builder for chaining. + */ + public Builder clearPageSize() { + bitField0_ = (bitField0_ & ~0x00000002); + pageSize_ = 0; + onChanged(); + return this; + } + + private java.lang.Object pageToken_ = ""; + /** + * + * + *
+     * Optional. Pagination token, returned earlier via
+     * [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token].
+     * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageToken. + */ + public java.lang.String getPageToken() { + java.lang.Object ref = pageToken_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + pageToken_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Optional. Pagination token, returned earlier via
+     * [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token].
+     * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The bytes for pageToken. + */ + public com.google.protobuf.ByteString getPageTokenBytes() { + java.lang.Object ref = pageToken_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + pageToken_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Optional. Pagination token, returned earlier via
+     * [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token].
+     * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @param value The pageToken to set. + * @return This builder for chaining. + */ + public Builder setPageToken(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + pageToken_ = value; + bitField0_ |= 0x00000004; + onChanged(); + return this; + } + /** + * + * + *
+     * Optional. Pagination token, returned earlier via
+     * [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token].
+     * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return This builder for chaining. + */ + public Builder clearPageToken() { + pageToken_ = getDefaultInstance().getPageToken(); + bitField0_ = (bitField0_ & ~0x00000004); + onChanged(); + return this; + } + /** + * + * + *
+     * Optional. Pagination token, returned earlier via
+     * [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token].
+     * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @param value The bytes for pageToken to set. + * @return This builder for chaining. + */ + public Builder setPageTokenBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + pageToken_ = value; + bitField0_ |= 0x00000004; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.ListSecretsRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.ListSecretsRequest) + private static final com.google.cloud.secretmanager.v1beta1.ListSecretsRequest DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secretmanager.v1beta1.ListSecretsRequest(); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsRequest getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public ListSecretsRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + Builder builder = newBuilder(); + try { + builder.mergeFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(builder.buildPartial()); + } catch (com.google.protobuf.UninitializedMessageException e) { + throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial()); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e) + .setUnfinishedMessage(builder.buildPartial()); + } + return builder.buildPartial(); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.ListSecretsRequest getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretsRequestOrBuilder.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretsRequestOrBuilder.java new file mode 100644 index 000000000000..45fe4ca57bf0 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretsRequestOrBuilder.java @@ -0,0 +1,99 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +public interface ListSecretsRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.ListSecretsRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. The resource name of the project associated with the
+   * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The parent. + */ + java.lang.String getParent(); + /** + * + * + *
+   * Required. The resource name of the project associated with the
+   * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
+   * 
+ * + * + * string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... } + * + * + * @return The bytes for parent. + */ + com.google.protobuf.ByteString getParentBytes(); + + /** + * + * + *
+   * Optional. The maximum number of results to be returned in a single page. If
+   * set to 0, the server decides the number of results to return. If the
+   * number is greater than 25000, it is capped at 25000.
+   * 
+ * + * int32 page_size = 2 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageSize. + */ + int getPageSize(); + + /** + * + * + *
+   * Optional. Pagination token, returned earlier via
+   * [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token].
+   * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The pageToken. + */ + java.lang.String getPageToken(); + /** + * + * + *
+   * Optional. Pagination token, returned earlier via
+   * [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token].
+   * 
+ * + * string page_token = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The bytes for pageToken. + */ + com.google.protobuf.ByteString getPageTokenBytes(); +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretsResponse.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretsResponse.java new file mode 100644 index 000000000000..612ac9ee549a --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretsResponse.java @@ -0,0 +1,1243 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +/** + * + * + *
+ * Response message for [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.ListSecretsResponse} + */ +public final class ListSecretsResponse extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.ListSecretsResponse) + ListSecretsResponseOrBuilder { + private static final long serialVersionUID = 0L; + // Use ListSecretsResponse.newBuilder() to construct. + private ListSecretsResponse(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private ListSecretsResponse() { + secrets_ = java.util.Collections.emptyList(); + nextPageToken_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new ListSecretsResponse(); + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretsResponse_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretsResponse_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.ListSecretsResponse.class, + com.google.cloud.secretmanager.v1beta1.ListSecretsResponse.Builder.class); + } + + public static final int SECRETS_FIELD_NUMBER = 1; + + @SuppressWarnings("serial") + private java.util.List secrets_; + /** + * + * + *
+   * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+   * first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + @java.lang.Override + public java.util.List getSecretsList() { + return secrets_; + } + /** + * + * + *
+   * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+   * first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + @java.lang.Override + public java.util.List + getSecretsOrBuilderList() { + return secrets_; + } + /** + * + * + *
+   * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+   * first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + @java.lang.Override + public int getSecretsCount() { + return secrets_.size(); + } + /** + * + * + *
+   * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+   * first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Secret getSecrets(int index) { + return secrets_.get(index); + } + /** + * + * + *
+   * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+   * first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.SecretOrBuilder getSecretsOrBuilder(int index) { + return secrets_.get(index); + } + + public static final int NEXT_PAGE_TOKEN_FIELD_NUMBER = 2; + + @SuppressWarnings("serial") + private volatile java.lang.Object nextPageToken_ = ""; + /** + * + * + *
+   * A token to retrieve the next page of results. Pass this value in
+   * [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page.
+   * 
+ * + * string next_page_token = 2; + * + * @return The nextPageToken. + */ + @java.lang.Override + public java.lang.String getNextPageToken() { + java.lang.Object ref = nextPageToken_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + nextPageToken_ = s; + return s; + } + } + /** + * + * + *
+   * A token to retrieve the next page of results. Pass this value in
+   * [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page.
+   * 
+ * + * string next_page_token = 2; + * + * @return The bytes for nextPageToken. + */ + @java.lang.Override + public com.google.protobuf.ByteString getNextPageTokenBytes() { + java.lang.Object ref = nextPageToken_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + nextPageToken_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + public static final int TOTAL_SIZE_FIELD_NUMBER = 3; + private int totalSize_ = 0; + /** + * + * + *
+   * The total number of [Secrets][google.cloud.secrets.v1beta1.Secret].
+   * 
+ * + * int32 total_size = 3; + * + * @return The totalSize. + */ + @java.lang.Override + public int getTotalSize() { + return totalSize_; + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + for (int i = 0; i < secrets_.size(); i++) { + output.writeMessage(1, secrets_.get(i)); + } + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(nextPageToken_)) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 2, nextPageToken_); + } + if (totalSize_ != 0) { + output.writeInt32(3, totalSize_); + } + getUnknownFields().writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + for (int i = 0; i < secrets_.size(); i++) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(1, secrets_.get(i)); + } + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(nextPageToken_)) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(2, nextPageToken_); + } + if (totalSize_ != 0) { + size += com.google.protobuf.CodedOutputStream.computeInt32Size(3, totalSize_); + } + size += getUnknownFields().getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secretmanager.v1beta1.ListSecretsResponse)) { + return super.equals(obj); + } + com.google.cloud.secretmanager.v1beta1.ListSecretsResponse other = + (com.google.cloud.secretmanager.v1beta1.ListSecretsResponse) obj; + + if (!getSecretsList().equals(other.getSecretsList())) return false; + if (!getNextPageToken().equals(other.getNextPageToken())) return false; + if (getTotalSize() != other.getTotalSize()) return false; + if (!getUnknownFields().equals(other.getUnknownFields())) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + if (getSecretsCount() > 0) { + hash = (37 * hash) + SECRETS_FIELD_NUMBER; + hash = (53 * hash) + getSecretsList().hashCode(); + } + hash = (37 * hash) + NEXT_PAGE_TOKEN_FIELD_NUMBER; + hash = (53 * hash) + getNextPageToken().hashCode(); + hash = (37 * hash) + TOTAL_SIZE_FIELD_NUMBER; + hash = (53 * hash) + getTotalSize(); + hash = (29 * hash) + getUnknownFields().hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsResponse parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsResponse parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsResponse parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsResponse parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsResponse parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsResponse parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsResponse parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsResponse parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsResponse parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsResponse parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsResponse parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsResponse parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secretmanager.v1beta1.ListSecretsResponse prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Response message for [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.ListSecretsResponse} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.ListSecretsResponse) + com.google.cloud.secretmanager.v1beta1.ListSecretsResponseOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretsResponse_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretsResponse_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.ListSecretsResponse.class, + com.google.cloud.secretmanager.v1beta1.ListSecretsResponse.Builder.class); + } + + // Construct using com.google.cloud.secretmanager.v1beta1.ListSecretsResponse.newBuilder() + private Builder() {} + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + } + + @java.lang.Override + public Builder clear() { + super.clear(); + bitField0_ = 0; + if (secretsBuilder_ == null) { + secrets_ = java.util.Collections.emptyList(); + } else { + secrets_ = null; + secretsBuilder_.clear(); + } + bitField0_ = (bitField0_ & ~0x00000001); + nextPageToken_ = ""; + totalSize_ = 0; + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_ListSecretsResponse_descriptor; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.ListSecretsResponse getDefaultInstanceForType() { + return com.google.cloud.secretmanager.v1beta1.ListSecretsResponse.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.ListSecretsResponse build() { + com.google.cloud.secretmanager.v1beta1.ListSecretsResponse result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.ListSecretsResponse buildPartial() { + com.google.cloud.secretmanager.v1beta1.ListSecretsResponse result = + new com.google.cloud.secretmanager.v1beta1.ListSecretsResponse(this); + buildPartialRepeatedFields(result); + if (bitField0_ != 0) { + buildPartial0(result); + } + onBuilt(); + return result; + } + + private void buildPartialRepeatedFields( + com.google.cloud.secretmanager.v1beta1.ListSecretsResponse result) { + if (secretsBuilder_ == null) { + if (((bitField0_ & 0x00000001) != 0)) { + secrets_ = java.util.Collections.unmodifiableList(secrets_); + bitField0_ = (bitField0_ & ~0x00000001); + } + result.secrets_ = secrets_; + } else { + result.secrets_ = secretsBuilder_.build(); + } + } + + private void buildPartial0(com.google.cloud.secretmanager.v1beta1.ListSecretsResponse result) { + int from_bitField0_ = bitField0_; + if (((from_bitField0_ & 0x00000002) != 0)) { + result.nextPageToken_ = nextPageToken_; + } + if (((from_bitField0_ & 0x00000004) != 0)) { + result.totalSize_ = totalSize_; + } + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secretmanager.v1beta1.ListSecretsResponse) { + return mergeFrom((com.google.cloud.secretmanager.v1beta1.ListSecretsResponse) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secretmanager.v1beta1.ListSecretsResponse other) { + if (other == com.google.cloud.secretmanager.v1beta1.ListSecretsResponse.getDefaultInstance()) + return this; + if (secretsBuilder_ == null) { + if (!other.secrets_.isEmpty()) { + if (secrets_.isEmpty()) { + secrets_ = other.secrets_; + bitField0_ = (bitField0_ & ~0x00000001); + } else { + ensureSecretsIsMutable(); + secrets_.addAll(other.secrets_); + } + onChanged(); + } + } else { + if (!other.secrets_.isEmpty()) { + if (secretsBuilder_.isEmpty()) { + secretsBuilder_.dispose(); + secretsBuilder_ = null; + secrets_ = other.secrets_; + bitField0_ = (bitField0_ & ~0x00000001); + secretsBuilder_ = + com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders + ? getSecretsFieldBuilder() + : null; + } else { + secretsBuilder_.addAllMessages(other.secrets_); + } + } + } + if (!other.getNextPageToken().isEmpty()) { + nextPageToken_ = other.nextPageToken_; + bitField0_ |= 0x00000002; + onChanged(); + } + if (other.getTotalSize() != 0) { + setTotalSize(other.getTotalSize()); + } + this.mergeUnknownFields(other.getUnknownFields()); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + com.google.cloud.secretmanager.v1beta1.Secret m = + input.readMessage( + com.google.cloud.secretmanager.v1beta1.Secret.parser(), extensionRegistry); + if (secretsBuilder_ == null) { + ensureSecretsIsMutable(); + secrets_.add(m); + } else { + secretsBuilder_.addMessage(m); + } + break; + } // case 10 + case 18: + { + nextPageToken_ = input.readStringRequireUtf8(); + bitField0_ |= 0x00000002; + break; + } // case 18 + case 24: + { + totalSize_ = input.readInt32(); + bitField0_ |= 0x00000004; + break; + } // case 24 + default: + { + if (!super.parseUnknownField(input, extensionRegistry, tag)) { + done = true; // was an endgroup tag + } + break; + } // default: + } // switch (tag) + } // while (!done) + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.unwrapIOException(); + } finally { + onChanged(); + } // finally + return this; + } + + private int bitField0_; + + private java.util.List secrets_ = + java.util.Collections.emptyList(); + + private void ensureSecretsIsMutable() { + if (!((bitField0_ & 0x00000001) != 0)) { + secrets_ = new java.util.ArrayList(secrets_); + bitField0_ |= 0x00000001; + } + } + + private com.google.protobuf.RepeatedFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.Secret, + com.google.cloud.secretmanager.v1beta1.Secret.Builder, + com.google.cloud.secretmanager.v1beta1.SecretOrBuilder> + secretsBuilder_; + + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public java.util.List getSecretsList() { + if (secretsBuilder_ == null) { + return java.util.Collections.unmodifiableList(secrets_); + } else { + return secretsBuilder_.getMessageList(); + } + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public int getSecretsCount() { + if (secretsBuilder_ == null) { + return secrets_.size(); + } else { + return secretsBuilder_.getCount(); + } + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public com.google.cloud.secretmanager.v1beta1.Secret getSecrets(int index) { + if (secretsBuilder_ == null) { + return secrets_.get(index); + } else { + return secretsBuilder_.getMessage(index); + } + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public Builder setSecrets(int index, com.google.cloud.secretmanager.v1beta1.Secret value) { + if (secretsBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + ensureSecretsIsMutable(); + secrets_.set(index, value); + onChanged(); + } else { + secretsBuilder_.setMessage(index, value); + } + return this; + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public Builder setSecrets( + int index, com.google.cloud.secretmanager.v1beta1.Secret.Builder builderForValue) { + if (secretsBuilder_ == null) { + ensureSecretsIsMutable(); + secrets_.set(index, builderForValue.build()); + onChanged(); + } else { + secretsBuilder_.setMessage(index, builderForValue.build()); + } + return this; + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public Builder addSecrets(com.google.cloud.secretmanager.v1beta1.Secret value) { + if (secretsBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + ensureSecretsIsMutable(); + secrets_.add(value); + onChanged(); + } else { + secretsBuilder_.addMessage(value); + } + return this; + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public Builder addSecrets(int index, com.google.cloud.secretmanager.v1beta1.Secret value) { + if (secretsBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + ensureSecretsIsMutable(); + secrets_.add(index, value); + onChanged(); + } else { + secretsBuilder_.addMessage(index, value); + } + return this; + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public Builder addSecrets( + com.google.cloud.secretmanager.v1beta1.Secret.Builder builderForValue) { + if (secretsBuilder_ == null) { + ensureSecretsIsMutable(); + secrets_.add(builderForValue.build()); + onChanged(); + } else { + secretsBuilder_.addMessage(builderForValue.build()); + } + return this; + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public Builder addSecrets( + int index, com.google.cloud.secretmanager.v1beta1.Secret.Builder builderForValue) { + if (secretsBuilder_ == null) { + ensureSecretsIsMutable(); + secrets_.add(index, builderForValue.build()); + onChanged(); + } else { + secretsBuilder_.addMessage(index, builderForValue.build()); + } + return this; + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public Builder addAllSecrets( + java.lang.Iterable values) { + if (secretsBuilder_ == null) { + ensureSecretsIsMutable(); + com.google.protobuf.AbstractMessageLite.Builder.addAll(values, secrets_); + onChanged(); + } else { + secretsBuilder_.addAllMessages(values); + } + return this; + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public Builder clearSecrets() { + if (secretsBuilder_ == null) { + secrets_ = java.util.Collections.emptyList(); + bitField0_ = (bitField0_ & ~0x00000001); + onChanged(); + } else { + secretsBuilder_.clear(); + } + return this; + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public Builder removeSecrets(int index) { + if (secretsBuilder_ == null) { + ensureSecretsIsMutable(); + secrets_.remove(index); + onChanged(); + } else { + secretsBuilder_.remove(index); + } + return this; + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public com.google.cloud.secretmanager.v1beta1.Secret.Builder getSecretsBuilder(int index) { + return getSecretsFieldBuilder().getBuilder(index); + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public com.google.cloud.secretmanager.v1beta1.SecretOrBuilder getSecretsOrBuilder(int index) { + if (secretsBuilder_ == null) { + return secrets_.get(index); + } else { + return secretsBuilder_.getMessageOrBuilder(index); + } + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public java.util.List + getSecretsOrBuilderList() { + if (secretsBuilder_ != null) { + return secretsBuilder_.getMessageOrBuilderList(); + } else { + return java.util.Collections.unmodifiableList(secrets_); + } + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public com.google.cloud.secretmanager.v1beta1.Secret.Builder addSecretsBuilder() { + return getSecretsFieldBuilder() + .addBuilder(com.google.cloud.secretmanager.v1beta1.Secret.getDefaultInstance()); + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public com.google.cloud.secretmanager.v1beta1.Secret.Builder addSecretsBuilder(int index) { + return getSecretsFieldBuilder() + .addBuilder(index, com.google.cloud.secretmanager.v1beta1.Secret.getDefaultInstance()); + } + /** + * + * + *
+     * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+     * first).
+     * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + public java.util.List + getSecretsBuilderList() { + return getSecretsFieldBuilder().getBuilderList(); + } + + private com.google.protobuf.RepeatedFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.Secret, + com.google.cloud.secretmanager.v1beta1.Secret.Builder, + com.google.cloud.secretmanager.v1beta1.SecretOrBuilder> + getSecretsFieldBuilder() { + if (secretsBuilder_ == null) { + secretsBuilder_ = + new com.google.protobuf.RepeatedFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.Secret, + com.google.cloud.secretmanager.v1beta1.Secret.Builder, + com.google.cloud.secretmanager.v1beta1.SecretOrBuilder>( + secrets_, ((bitField0_ & 0x00000001) != 0), getParentForChildren(), isClean()); + secrets_ = null; + } + return secretsBuilder_; + } + + private java.lang.Object nextPageToken_ = ""; + /** + * + * + *
+     * A token to retrieve the next page of results. Pass this value in
+     * [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page.
+     * 
+ * + * string next_page_token = 2; + * + * @return The nextPageToken. + */ + public java.lang.String getNextPageToken() { + java.lang.Object ref = nextPageToken_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + nextPageToken_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * A token to retrieve the next page of results. Pass this value in
+     * [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page.
+     * 
+ * + * string next_page_token = 2; + * + * @return The bytes for nextPageToken. + */ + public com.google.protobuf.ByteString getNextPageTokenBytes() { + java.lang.Object ref = nextPageToken_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + nextPageToken_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * A token to retrieve the next page of results. Pass this value in
+     * [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page.
+     * 
+ * + * string next_page_token = 2; + * + * @param value The nextPageToken to set. + * @return This builder for chaining. + */ + public Builder setNextPageToken(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + nextPageToken_ = value; + bitField0_ |= 0x00000002; + onChanged(); + return this; + } + /** + * + * + *
+     * A token to retrieve the next page of results. Pass this value in
+     * [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page.
+     * 
+ * + * string next_page_token = 2; + * + * @return This builder for chaining. + */ + public Builder clearNextPageToken() { + nextPageToken_ = getDefaultInstance().getNextPageToken(); + bitField0_ = (bitField0_ & ~0x00000002); + onChanged(); + return this; + } + /** + * + * + *
+     * A token to retrieve the next page of results. Pass this value in
+     * [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page.
+     * 
+ * + * string next_page_token = 2; + * + * @param value The bytes for nextPageToken to set. + * @return This builder for chaining. + */ + public Builder setNextPageTokenBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + nextPageToken_ = value; + bitField0_ |= 0x00000002; + onChanged(); + return this; + } + + private int totalSize_; + /** + * + * + *
+     * The total number of [Secrets][google.cloud.secrets.v1beta1.Secret].
+     * 
+ * + * int32 total_size = 3; + * + * @return The totalSize. + */ + @java.lang.Override + public int getTotalSize() { + return totalSize_; + } + /** + * + * + *
+     * The total number of [Secrets][google.cloud.secrets.v1beta1.Secret].
+     * 
+ * + * int32 total_size = 3; + * + * @param value The totalSize to set. + * @return This builder for chaining. + */ + public Builder setTotalSize(int value) { + + totalSize_ = value; + bitField0_ |= 0x00000004; + onChanged(); + return this; + } + /** + * + * + *
+     * The total number of [Secrets][google.cloud.secrets.v1beta1.Secret].
+     * 
+ * + * int32 total_size = 3; + * + * @return This builder for chaining. + */ + public Builder clearTotalSize() { + bitField0_ = (bitField0_ & ~0x00000004); + totalSize_ = 0; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.ListSecretsResponse) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.ListSecretsResponse) + private static final com.google.cloud.secretmanager.v1beta1.ListSecretsResponse DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secretmanager.v1beta1.ListSecretsResponse(); + } + + public static com.google.cloud.secretmanager.v1beta1.ListSecretsResponse getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public ListSecretsResponse parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + Builder builder = newBuilder(); + try { + builder.mergeFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(builder.buildPartial()); + } catch (com.google.protobuf.UninitializedMessageException e) { + throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial()); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e) + .setUnfinishedMessage(builder.buildPartial()); + } + return builder.buildPartial(); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.ListSecretsResponse getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretsResponseOrBuilder.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretsResponseOrBuilder.java new file mode 100644 index 000000000000..93bf2ebb49ac --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ListSecretsResponseOrBuilder.java @@ -0,0 +1,123 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +public interface ListSecretsResponseOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.ListSecretsResponse) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+   * first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + java.util.List getSecretsList(); + /** + * + * + *
+   * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+   * first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + com.google.cloud.secretmanager.v1beta1.Secret getSecrets(int index); + /** + * + * + *
+   * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+   * first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + int getSecretsCount(); + /** + * + * + *
+   * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+   * first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + java.util.List + getSecretsOrBuilderList(); + /** + * + * + *
+   * The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
+   * first).
+   * 
+ * + * repeated .google.cloud.secrets.v1beta1.Secret secrets = 1; + */ + com.google.cloud.secretmanager.v1beta1.SecretOrBuilder getSecretsOrBuilder(int index); + + /** + * + * + *
+   * A token to retrieve the next page of results. Pass this value in
+   * [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page.
+   * 
+ * + * string next_page_token = 2; + * + * @return The nextPageToken. + */ + java.lang.String getNextPageToken(); + /** + * + * + *
+   * A token to retrieve the next page of results. Pass this value in
+   * [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page.
+   * 
+ * + * string next_page_token = 2; + * + * @return The bytes for nextPageToken. + */ + com.google.protobuf.ByteString getNextPageTokenBytes(); + + /** + * + * + *
+   * The total number of [Secrets][google.cloud.secrets.v1beta1.Secret].
+   * 
+ * + * int32 total_size = 3; + * + * @return The totalSize. + */ + int getTotalSize(); +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ProjectName.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ProjectName.java new file mode 100644 index 000000000000..892c66eeec12 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ProjectName.java @@ -0,0 +1,168 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1; + +import com.google.api.pathtemplate.PathTemplate; +import com.google.api.resourcenames.ResourceName; +import com.google.common.base.Preconditions; +import com.google.common.collect.ImmutableMap; +import java.util.ArrayList; +import java.util.List; +import java.util.Map; +import java.util.Objects; +import javax.annotation.Generated; + +// AUTO-GENERATED DOCUMENTATION AND CLASS. +@Generated("by gapic-generator-java") +public class ProjectName implements ResourceName { + private static final PathTemplate PROJECT = + PathTemplate.createWithoutUrlEncoding("projects/{project}"); + private volatile Map fieldValuesMap; + private final String project; + + @Deprecated + protected ProjectName() { + project = null; + } + + private ProjectName(Builder builder) { + project = Preconditions.checkNotNull(builder.getProject()); + } + + public String getProject() { + return project; + } + + public static Builder newBuilder() { + return new Builder(); + } + + public Builder toBuilder() { + return new Builder(this); + } + + public static ProjectName of(String project) { + return newBuilder().setProject(project).build(); + } + + public static String format(String project) { + return newBuilder().setProject(project).build().toString(); + } + + public static ProjectName parse(String formattedString) { + if (formattedString.isEmpty()) { + return null; + } + Map matchMap = + PROJECT.validatedMatch( + formattedString, "ProjectName.parse: formattedString not in valid format"); + return of(matchMap.get("project")); + } + + public static List parseList(List formattedStrings) { + List list = new ArrayList<>(formattedStrings.size()); + for (String formattedString : formattedStrings) { + list.add(parse(formattedString)); + } + return list; + } + + public static List toStringList(List values) { + List list = new ArrayList<>(values.size()); + for (ProjectName value : values) { + if (value == null) { + list.add(""); + } else { + list.add(value.toString()); + } + } + return list; + } + + public static boolean isParsableFrom(String formattedString) { + return PROJECT.matches(formattedString); + } + + @Override + public Map getFieldValuesMap() { + if (fieldValuesMap == null) { + synchronized (this) { + if (fieldValuesMap == null) { + ImmutableMap.Builder fieldMapBuilder = ImmutableMap.builder(); + if (project != null) { + fieldMapBuilder.put("project", project); + } + fieldValuesMap = fieldMapBuilder.build(); + } + } + } + return fieldValuesMap; + } + + public String getFieldValue(String fieldName) { + return getFieldValuesMap().get(fieldName); + } + + @Override + public String toString() { + return PROJECT.instantiate("project", project); + } + + @Override + public boolean equals(Object o) { + if (o == this) { + return true; + } + if (o != null && getClass() == o.getClass()) { + ProjectName that = ((ProjectName) o); + return Objects.equals(this.project, that.project); + } + return false; + } + + @Override + public int hashCode() { + int h = 1; + h *= 1000003; + h ^= Objects.hashCode(project); + return h; + } + + /** Builder for projects/{project}. */ + public static class Builder { + private String project; + + protected Builder() {} + + public String getProject() { + return project; + } + + public Builder setProject(String project) { + this.project = project; + return this; + } + + private Builder(ProjectName projectName) { + this.project = projectName.project; + } + + public ProjectName build() { + return new ProjectName(this); + } + } +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/Replication.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/Replication.java new file mode 100644 index 000000000000..bcb40ed3fe6f --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/Replication.java @@ -0,0 +1,3377 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/resources.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +/** + * + * + *
+ * A policy that defines the replication configuration of data.
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.Replication} + */ +public final class Replication extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.Replication) + ReplicationOrBuilder { + private static final long serialVersionUID = 0L; + // Use Replication.newBuilder() to construct. + private Replication(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private Replication() {} + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new Replication(); + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.Replication.class, + com.google.cloud.secretmanager.v1beta1.Replication.Builder.class); + } + + public interface AutomaticOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.Replication.Automatic) + com.google.protobuf.MessageOrBuilder {} + /** + * + * + *
+   * A replication policy that replicates the [Secret][google.cloud.secrets.v1beta1.Secret] payload without any
+   * restrictions.
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.Replication.Automatic} + */ + public static final class Automatic extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.Replication.Automatic) + AutomaticOrBuilder { + private static final long serialVersionUID = 0L; + // Use Automatic.newBuilder() to construct. + private Automatic(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private Automatic() {} + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new Automatic(); + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_Automatic_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_Automatic_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.Replication.Automatic.class, + com.google.cloud.secretmanager.v1beta1.Replication.Automatic.Builder.class); + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + getUnknownFields().writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + size += getUnknownFields().getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secretmanager.v1beta1.Replication.Automatic)) { + return super.equals(obj); + } + com.google.cloud.secretmanager.v1beta1.Replication.Automatic other = + (com.google.cloud.secretmanager.v1beta1.Replication.Automatic) obj; + + if (!getUnknownFields().equals(other.getUnknownFields())) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (29 * hash) + getUnknownFields().hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.Automatic parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.Automatic parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.Automatic parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.Automatic parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.Automatic parseFrom( + byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.Automatic parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.Automatic parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.Automatic parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.Automatic parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.Automatic parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.Automatic parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.Automatic parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secretmanager.v1beta1.Replication.Automatic prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType( + com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+     * A replication policy that replicates the [Secret][google.cloud.secrets.v1beta1.Secret] payload without any
+     * restrictions.
+     * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.Replication.Automatic} + */ + public static final class Builder + extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.Replication.Automatic) + com.google.cloud.secretmanager.v1beta1.Replication.AutomaticOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_Automatic_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_Automatic_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.Replication.Automatic.class, + com.google.cloud.secretmanager.v1beta1.Replication.Automatic.Builder.class); + } + + // Construct using com.google.cloud.secretmanager.v1beta1.Replication.Automatic.newBuilder() + private Builder() {} + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + } + + @java.lang.Override + public Builder clear() { + super.clear(); + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_Automatic_descriptor; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication.Automatic + getDefaultInstanceForType() { + return com.google.cloud.secretmanager.v1beta1.Replication.Automatic.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication.Automatic build() { + com.google.cloud.secretmanager.v1beta1.Replication.Automatic result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication.Automatic buildPartial() { + com.google.cloud.secretmanager.v1beta1.Replication.Automatic result = + new com.google.cloud.secretmanager.v1beta1.Replication.Automatic(this); + onBuilt(); + return result; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, + int index, + java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secretmanager.v1beta1.Replication.Automatic) { + return mergeFrom((com.google.cloud.secretmanager.v1beta1.Replication.Automatic) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secretmanager.v1beta1.Replication.Automatic other) { + if (other + == com.google.cloud.secretmanager.v1beta1.Replication.Automatic.getDefaultInstance()) + return this; + this.mergeUnknownFields(other.getUnknownFields()); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + default: + { + if (!super.parseUnknownField(input, extensionRegistry, tag)) { + done = true; // was an endgroup tag + } + break; + } // default: + } // switch (tag) + } // while (!done) + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.unwrapIOException(); + } finally { + onChanged(); + } // finally + return this; + } + + @java.lang.Override + public final Builder setUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.Replication.Automatic) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.Replication.Automatic) + private static final com.google.cloud.secretmanager.v1beta1.Replication.Automatic + DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secretmanager.v1beta1.Replication.Automatic(); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.Automatic + getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public Automatic parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + Builder builder = newBuilder(); + try { + builder.mergeFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(builder.buildPartial()); + } catch (com.google.protobuf.UninitializedMessageException e) { + throw e.asInvalidProtocolBufferException() + .setUnfinishedMessage(builder.buildPartial()); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e) + .setUnfinishedMessage(builder.buildPartial()); + } + return builder.buildPartial(); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication.Automatic + getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } + } + + public interface UserManagedOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.Replication.UserManaged) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+     * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+     *
+     * Cannot be empty.
+     * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + java.util.List + getReplicasList(); + /** + * + * + *
+     * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+     *
+     * Cannot be empty.
+     * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica getReplicas(int index); + /** + * + * + *
+     * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+     *
+     * Cannot be empty.
+     * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + int getReplicasCount(); + /** + * + * + *
+     * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+     *
+     * Cannot be empty.
+     * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + java.util.List< + ? extends + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.ReplicaOrBuilder> + getReplicasOrBuilderList(); + /** + * + * + *
+     * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+     *
+     * Cannot be empty.
+     * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.ReplicaOrBuilder + getReplicasOrBuilder(int index); + } + /** + * + * + *
+   * A replication policy that replicates the [Secret][google.cloud.secrets.v1beta1.Secret] payload into the
+   * locations specified in [Secret.replication.user_managed.replicas][]
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.Replication.UserManaged} + */ + public static final class UserManaged extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.Replication.UserManaged) + UserManagedOrBuilder { + private static final long serialVersionUID = 0L; + // Use UserManaged.newBuilder() to construct. + private UserManaged(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private UserManaged() { + replicas_ = java.util.Collections.emptyList(); + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new UserManaged(); + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.class, + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Builder.class); + } + + public interface ReplicaOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.Replication.UserManaged.Replica) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+       * The canonical IDs of the location to replicate data.
+       * For example: `"us-east1"`.
+       * 
+ * + * string location = 1; + * + * @return The location. + */ + java.lang.String getLocation(); + /** + * + * + *
+       * The canonical IDs of the location to replicate data.
+       * For example: `"us-east1"`.
+       * 
+ * + * string location = 1; + * + * @return The bytes for location. + */ + com.google.protobuf.ByteString getLocationBytes(); + } + /** + * + * + *
+     * Represents a Replica for this [Secret][google.cloud.secrets.v1beta1.Secret].
+     * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.Replication.UserManaged.Replica} + */ + public static final class Replica extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.Replication.UserManaged.Replica) + ReplicaOrBuilder { + private static final long serialVersionUID = 0L; + // Use Replica.newBuilder() to construct. + private Replica(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private Replica() { + location_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new Replica(); + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_Replica_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_Replica_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica.class, + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica.Builder + .class); + } + + public static final int LOCATION_FIELD_NUMBER = 1; + + @SuppressWarnings("serial") + private volatile java.lang.Object location_ = ""; + /** + * + * + *
+       * The canonical IDs of the location to replicate data.
+       * For example: `"us-east1"`.
+       * 
+ * + * string location = 1; + * + * @return The location. + */ + @java.lang.Override + public java.lang.String getLocation() { + java.lang.Object ref = location_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + location_ = s; + return s; + } + } + /** + * + * + *
+       * The canonical IDs of the location to replicate data.
+       * For example: `"us-east1"`.
+       * 
+ * + * string location = 1; + * + * @return The bytes for location. + */ + @java.lang.Override + public com.google.protobuf.ByteString getLocationBytes() { + java.lang.Object ref = location_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + location_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(location_)) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, location_); + } + getUnknownFields().writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(location_)) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, location_); + } + size += getUnknownFields().getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj + instanceof com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica)) { + return super.equals(obj); + } + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica other = + (com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica) obj; + + if (!getLocation().equals(other.getLocation())) return false; + if (!getUnknownFields().equals(other.getUnknownFields())) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + LOCATION_FIELD_NUMBER; + hash = (53 * hash) + getLocation().hashCode(); + hash = (29 * hash) + getUnknownFields().hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica + parseFrom(java.nio.ByteBuffer data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica + parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica + parseFrom(com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica + parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica + parseFrom(byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica + parseFrom(byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica + parseFrom(java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica + parseFrom( + java.io.InputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica + parseDelimitedFrom(java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica + parseDelimitedFrom( + java.io.InputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica + parseFrom(com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica + parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType( + com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+       * Represents a Replica for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.Replication.UserManaged.Replica} + */ + public static final class Builder + extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.Replication.UserManaged.Replica) + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.ReplicaOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_Replica_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_Replica_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica.class, + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica.Builder + .class); + } + + // Construct using + // com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica.newBuilder() + private Builder() {} + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + } + + @java.lang.Override + public Builder clear() { + super.clear(); + bitField0_ = 0; + location_ = ""; + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_Replica_descriptor; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica + getDefaultInstanceForType() { + return com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica + .getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica build() { + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica result = + buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica + buildPartial() { + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica result = + new com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica(this); + if (bitField0_ != 0) { + buildPartial0(result); + } + onBuilt(); + return result; + } + + private void buildPartial0( + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica result) { + int from_bitField0_ = bitField0_; + if (((from_bitField0_ & 0x00000001) != 0)) { + result.location_ = location_; + } + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, + int index, + java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other + instanceof com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica) { + return mergeFrom( + (com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom( + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica other) { + if (other + == com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica + .getDefaultInstance()) return this; + if (!other.getLocation().isEmpty()) { + location_ = other.location_; + bitField0_ |= 0x00000001; + onChanged(); + } + this.mergeUnknownFields(other.getUnknownFields()); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + location_ = input.readStringRequireUtf8(); + bitField0_ |= 0x00000001; + break; + } // case 10 + default: + { + if (!super.parseUnknownField(input, extensionRegistry, tag)) { + done = true; // was an endgroup tag + } + break; + } // default: + } // switch (tag) + } // while (!done) + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.unwrapIOException(); + } finally { + onChanged(); + } // finally + return this; + } + + private int bitField0_; + + private java.lang.Object location_ = ""; + /** + * + * + *
+         * The canonical IDs of the location to replicate data.
+         * For example: `"us-east1"`.
+         * 
+ * + * string location = 1; + * + * @return The location. + */ + public java.lang.String getLocation() { + java.lang.Object ref = location_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + location_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+         * The canonical IDs of the location to replicate data.
+         * For example: `"us-east1"`.
+         * 
+ * + * string location = 1; + * + * @return The bytes for location. + */ + public com.google.protobuf.ByteString getLocationBytes() { + java.lang.Object ref = location_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + location_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+         * The canonical IDs of the location to replicate data.
+         * For example: `"us-east1"`.
+         * 
+ * + * string location = 1; + * + * @param value The location to set. + * @return This builder for chaining. + */ + public Builder setLocation(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + location_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + /** + * + * + *
+         * The canonical IDs of the location to replicate data.
+         * For example: `"us-east1"`.
+         * 
+ * + * string location = 1; + * + * @return This builder for chaining. + */ + public Builder clearLocation() { + location_ = getDefaultInstance().getLocation(); + bitField0_ = (bitField0_ & ~0x00000001); + onChanged(); + return this; + } + /** + * + * + *
+         * The canonical IDs of the location to replicate data.
+         * For example: `"us-east1"`.
+         * 
+ * + * string location = 1; + * + * @param value The bytes for location to set. + * @return This builder for chaining. + */ + public Builder setLocationBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + location_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.Replication.UserManaged.Replica) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.Replication.UserManaged.Replica) + private static final com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica + DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = + new com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica(); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica + getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public Replica parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + Builder builder = newBuilder(); + try { + builder.mergeFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(builder.buildPartial()); + } catch (com.google.protobuf.UninitializedMessageException e) { + throw e.asInvalidProtocolBufferException() + .setUnfinishedMessage(builder.buildPartial()); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e) + .setUnfinishedMessage(builder.buildPartial()); + } + return builder.buildPartial(); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica + getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } + } + + public static final int REPLICAS_FIELD_NUMBER = 1; + + @SuppressWarnings("serial") + private java.util.List + replicas_; + /** + * + * + *
+     * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+     *
+     * Cannot be empty.
+     * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + @java.lang.Override + public java.util.List + getReplicasList() { + return replicas_; + } + /** + * + * + *
+     * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+     *
+     * Cannot be empty.
+     * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + @java.lang.Override + public java.util.List< + ? extends + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.ReplicaOrBuilder> + getReplicasOrBuilderList() { + return replicas_; + } + /** + * + * + *
+     * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+     *
+     * Cannot be empty.
+     * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + @java.lang.Override + public int getReplicasCount() { + return replicas_.size(); + } + /** + * + * + *
+     * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+     *
+     * Cannot be empty.
+     * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica getReplicas( + int index) { + return replicas_.get(index); + } + /** + * + * + *
+     * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+     *
+     * Cannot be empty.
+     * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.ReplicaOrBuilder + getReplicasOrBuilder(int index) { + return replicas_.get(index); + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + for (int i = 0; i < replicas_.size(); i++) { + output.writeMessage(1, replicas_.get(i)); + } + getUnknownFields().writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + for (int i = 0; i < replicas_.size(); i++) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(1, replicas_.get(i)); + } + size += getUnknownFields().getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secretmanager.v1beta1.Replication.UserManaged)) { + return super.equals(obj); + } + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged other = + (com.google.cloud.secretmanager.v1beta1.Replication.UserManaged) obj; + + if (!getReplicasList().equals(other.getReplicasList())) return false; + if (!getUnknownFields().equals(other.getUnknownFields())) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + if (getReplicasCount() > 0) { + hash = (37 * hash) + REPLICAS_FIELD_NUMBER; + hash = (53 * hash) + getReplicasList().hashCode(); + } + hash = (29 * hash) + getUnknownFields().hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged parseFrom( + byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType( + com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+     * A replication policy that replicates the [Secret][google.cloud.secrets.v1beta1.Secret] payload into the
+     * locations specified in [Secret.replication.user_managed.replicas][]
+     * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.Replication.UserManaged} + */ + public static final class Builder + extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.Replication.UserManaged) + com.google.cloud.secretmanager.v1beta1.Replication.UserManagedOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.class, + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Builder.class); + } + + // Construct using com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.newBuilder() + private Builder() {} + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + } + + @java.lang.Override + public Builder clear() { + super.clear(); + bitField0_ = 0; + if (replicasBuilder_ == null) { + replicas_ = java.util.Collections.emptyList(); + } else { + replicas_ = null; + replicasBuilder_.clear(); + } + bitField0_ = (bitField0_ & ~0x00000001); + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_descriptor; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication.UserManaged + getDefaultInstanceForType() { + return com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication.UserManaged build() { + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication.UserManaged buildPartial() { + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged result = + new com.google.cloud.secretmanager.v1beta1.Replication.UserManaged(this); + buildPartialRepeatedFields(result); + if (bitField0_ != 0) { + buildPartial0(result); + } + onBuilt(); + return result; + } + + private void buildPartialRepeatedFields( + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged result) { + if (replicasBuilder_ == null) { + if (((bitField0_ & 0x00000001) != 0)) { + replicas_ = java.util.Collections.unmodifiableList(replicas_); + bitField0_ = (bitField0_ & ~0x00000001); + } + result.replicas_ = replicas_; + } else { + result.replicas_ = replicasBuilder_.build(); + } + } + + private void buildPartial0( + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged result) { + int from_bitField0_ = bitField0_; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, + int index, + java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secretmanager.v1beta1.Replication.UserManaged) { + return mergeFrom((com.google.cloud.secretmanager.v1beta1.Replication.UserManaged) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom( + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged other) { + if (other + == com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.getDefaultInstance()) + return this; + if (replicasBuilder_ == null) { + if (!other.replicas_.isEmpty()) { + if (replicas_.isEmpty()) { + replicas_ = other.replicas_; + bitField0_ = (bitField0_ & ~0x00000001); + } else { + ensureReplicasIsMutable(); + replicas_.addAll(other.replicas_); + } + onChanged(); + } + } else { + if (!other.replicas_.isEmpty()) { + if (replicasBuilder_.isEmpty()) { + replicasBuilder_.dispose(); + replicasBuilder_ = null; + replicas_ = other.replicas_; + bitField0_ = (bitField0_ & ~0x00000001); + replicasBuilder_ = + com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders + ? getReplicasFieldBuilder() + : null; + } else { + replicasBuilder_.addAllMessages(other.replicas_); + } + } + } + this.mergeUnknownFields(other.getUnknownFields()); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica m = + input.readMessage( + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica + .parser(), + extensionRegistry); + if (replicasBuilder_ == null) { + ensureReplicasIsMutable(); + replicas_.add(m); + } else { + replicasBuilder_.addMessage(m); + } + break; + } // case 10 + default: + { + if (!super.parseUnknownField(input, extensionRegistry, tag)) { + done = true; // was an endgroup tag + } + break; + } // default: + } // switch (tag) + } // while (!done) + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.unwrapIOException(); + } finally { + onChanged(); + } // finally + return this; + } + + private int bitField0_; + + private java.util.List + replicas_ = java.util.Collections.emptyList(); + + private void ensureReplicasIsMutable() { + if (!((bitField0_ & 0x00000001) != 0)) { + replicas_ = + new java.util.ArrayList< + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica>( + replicas_); + bitField0_ |= 0x00000001; + } + } + + private com.google.protobuf.RepeatedFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica, + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica.Builder, + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.ReplicaOrBuilder> + replicasBuilder_; + + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       *
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public java.util.List + getReplicasList() { + if (replicasBuilder_ == null) { + return java.util.Collections.unmodifiableList(replicas_); + } else { + return replicasBuilder_.getMessageList(); + } + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       *
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public int getReplicasCount() { + if (replicasBuilder_ == null) { + return replicas_.size(); + } else { + return replicasBuilder_.getCount(); + } + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       *
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica getReplicas( + int index) { + if (replicasBuilder_ == null) { + return replicas_.get(index); + } else { + return replicasBuilder_.getMessage(index); + } + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       *
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder setReplicas( + int index, com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica value) { + if (replicasBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + ensureReplicasIsMutable(); + replicas_.set(index, value); + onChanged(); + } else { + replicasBuilder_.setMessage(index, value); + } + return this; + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       *
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder setReplicas( + int index, + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica.Builder + builderForValue) { + if (replicasBuilder_ == null) { + ensureReplicasIsMutable(); + replicas_.set(index, builderForValue.build()); + onChanged(); + } else { + replicasBuilder_.setMessage(index, builderForValue.build()); + } + return this; + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       *
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder addReplicas( + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica value) { + if (replicasBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + ensureReplicasIsMutable(); + replicas_.add(value); + onChanged(); + } else { + replicasBuilder_.addMessage(value); + } + return this; + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       *
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder addReplicas( + int index, com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica value) { + if (replicasBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + ensureReplicasIsMutable(); + replicas_.add(index, value); + onChanged(); + } else { + replicasBuilder_.addMessage(index, value); + } + return this; + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       *
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder addReplicas( + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica.Builder + builderForValue) { + if (replicasBuilder_ == null) { + ensureReplicasIsMutable(); + replicas_.add(builderForValue.build()); + onChanged(); + } else { + replicasBuilder_.addMessage(builderForValue.build()); + } + return this; + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       *
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder addReplicas( + int index, + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica.Builder + builderForValue) { + if (replicasBuilder_ == null) { + ensureReplicasIsMutable(); + replicas_.add(index, builderForValue.build()); + onChanged(); + } else { + replicasBuilder_.addMessage(index, builderForValue.build()); + } + return this; + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       *
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder addAllReplicas( + java.lang.Iterable< + ? extends com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica> + values) { + if (replicasBuilder_ == null) { + ensureReplicasIsMutable(); + com.google.protobuf.AbstractMessageLite.Builder.addAll(values, replicas_); + onChanged(); + } else { + replicasBuilder_.addAllMessages(values); + } + return this; + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       *
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder clearReplicas() { + if (replicasBuilder_ == null) { + replicas_ = java.util.Collections.emptyList(); + bitField0_ = (bitField0_ & ~0x00000001); + onChanged(); + } else { + replicasBuilder_.clear(); + } + return this; + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       *
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder removeReplicas(int index) { + if (replicasBuilder_ == null) { + ensureReplicasIsMutable(); + replicas_.remove(index); + onChanged(); + } else { + replicasBuilder_.remove(index); + } + return this; + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       *
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica.Builder + getReplicasBuilder(int index) { + return getReplicasFieldBuilder().getBuilder(index); + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       *
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.ReplicaOrBuilder + getReplicasOrBuilder(int index) { + if (replicasBuilder_ == null) { + return replicas_.get(index); + } else { + return replicasBuilder_.getMessageOrBuilder(index); + } + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       *
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public java.util.List< + ? extends + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.ReplicaOrBuilder> + getReplicasOrBuilderList() { + if (replicasBuilder_ != null) { + return replicasBuilder_.getMessageOrBuilderList(); + } else { + return java.util.Collections.unmodifiableList(replicas_); + } + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       *
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica.Builder + addReplicasBuilder() { + return getReplicasFieldBuilder() + .addBuilder( + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica + .getDefaultInstance()); + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       *
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica.Builder + addReplicasBuilder(int index) { + return getReplicasFieldBuilder() + .addBuilder( + index, + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica + .getDefaultInstance()); + } + /** + * + * + *
+       * Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret].
+       *
+       * Cannot be empty.
+       * 
+ * + * + * repeated .google.cloud.secrets.v1beta1.Replication.UserManaged.Replica replicas = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public java.util.List< + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica.Builder> + getReplicasBuilderList() { + return getReplicasFieldBuilder().getBuilderList(); + } + + private com.google.protobuf.RepeatedFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica, + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica.Builder, + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.ReplicaOrBuilder> + getReplicasFieldBuilder() { + if (replicasBuilder_ == null) { + replicasBuilder_ = + new com.google.protobuf.RepeatedFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica, + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Replica.Builder, + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.ReplicaOrBuilder>( + replicas_, ((bitField0_ & 0x00000001) != 0), getParentForChildren(), isClean()); + replicas_ = null; + } + return replicasBuilder_; + } + + @java.lang.Override + public final Builder setUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.Replication.UserManaged) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.Replication.UserManaged) + private static final com.google.cloud.secretmanager.v1beta1.Replication.UserManaged + DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secretmanager.v1beta1.Replication.UserManaged(); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication.UserManaged + getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public UserManaged parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + Builder builder = newBuilder(); + try { + builder.mergeFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(builder.buildPartial()); + } catch (com.google.protobuf.UninitializedMessageException e) { + throw e.asInvalidProtocolBufferException() + .setUnfinishedMessage(builder.buildPartial()); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e) + .setUnfinishedMessage(builder.buildPartial()); + } + return builder.buildPartial(); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication.UserManaged + getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } + } + + private int replicationCase_ = 0; + + @SuppressWarnings("serial") + private java.lang.Object replication_; + + public enum ReplicationCase + implements + com.google.protobuf.Internal.EnumLite, + com.google.protobuf.AbstractMessage.InternalOneOfEnum { + AUTOMATIC(1), + USER_MANAGED(2), + REPLICATION_NOT_SET(0); + private final int value; + + private ReplicationCase(int value) { + this.value = value; + } + /** + * @param value The number of the enum to look for. + * @return The enum associated with the given number. + * @deprecated Use {@link #forNumber(int)} instead. + */ + @java.lang.Deprecated + public static ReplicationCase valueOf(int value) { + return forNumber(value); + } + + public static ReplicationCase forNumber(int value) { + switch (value) { + case 1: + return AUTOMATIC; + case 2: + return USER_MANAGED; + case 0: + return REPLICATION_NOT_SET; + default: + return null; + } + } + + public int getNumber() { + return this.value; + } + }; + + public ReplicationCase getReplicationCase() { + return ReplicationCase.forNumber(replicationCase_); + } + + public static final int AUTOMATIC_FIELD_NUMBER = 1; + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + * + * @return Whether the automatic field is set. + */ + @java.lang.Override + public boolean hasAutomatic() { + return replicationCase_ == 1; + } + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + * + * @return The automatic. + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication.Automatic getAutomatic() { + if (replicationCase_ == 1) { + return (com.google.cloud.secretmanager.v1beta1.Replication.Automatic) replication_; + } + return com.google.cloud.secretmanager.v1beta1.Replication.Automatic.getDefaultInstance(); + } + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication.AutomaticOrBuilder + getAutomaticOrBuilder() { + if (replicationCase_ == 1) { + return (com.google.cloud.secretmanager.v1beta1.Replication.Automatic) replication_; + } + return com.google.cloud.secretmanager.v1beta1.Replication.Automatic.getDefaultInstance(); + } + + public static final int USER_MANAGED_FIELD_NUMBER = 2; + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + * + * @return Whether the userManaged field is set. + */ + @java.lang.Override + public boolean hasUserManaged() { + return replicationCase_ == 2; + } + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + * + * @return The userManaged. + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication.UserManaged getUserManaged() { + if (replicationCase_ == 2) { + return (com.google.cloud.secretmanager.v1beta1.Replication.UserManaged) replication_; + } + return com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.getDefaultInstance(); + } + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication.UserManagedOrBuilder + getUserManagedOrBuilder() { + if (replicationCase_ == 2) { + return (com.google.cloud.secretmanager.v1beta1.Replication.UserManaged) replication_; + } + return com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.getDefaultInstance(); + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (replicationCase_ == 1) { + output.writeMessage( + 1, (com.google.cloud.secretmanager.v1beta1.Replication.Automatic) replication_); + } + if (replicationCase_ == 2) { + output.writeMessage( + 2, (com.google.cloud.secretmanager.v1beta1.Replication.UserManaged) replication_); + } + getUnknownFields().writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (replicationCase_ == 1) { + size += + com.google.protobuf.CodedOutputStream.computeMessageSize( + 1, (com.google.cloud.secretmanager.v1beta1.Replication.Automatic) replication_); + } + if (replicationCase_ == 2) { + size += + com.google.protobuf.CodedOutputStream.computeMessageSize( + 2, (com.google.cloud.secretmanager.v1beta1.Replication.UserManaged) replication_); + } + size += getUnknownFields().getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secretmanager.v1beta1.Replication)) { + return super.equals(obj); + } + com.google.cloud.secretmanager.v1beta1.Replication other = + (com.google.cloud.secretmanager.v1beta1.Replication) obj; + + if (!getReplicationCase().equals(other.getReplicationCase())) return false; + switch (replicationCase_) { + case 1: + if (!getAutomatic().equals(other.getAutomatic())) return false; + break; + case 2: + if (!getUserManaged().equals(other.getUserManaged())) return false; + break; + case 0: + default: + } + if (!getUnknownFields().equals(other.getUnknownFields())) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + switch (replicationCase_) { + case 1: + hash = (37 * hash) + AUTOMATIC_FIELD_NUMBER; + hash = (53 * hash) + getAutomatic().hashCode(); + break; + case 2: + hash = (37 * hash) + USER_MANAGED_FIELD_NUMBER; + hash = (53 * hash) + getUserManaged().hashCode(); + break; + case 0: + default: + } + hash = (29 * hash) + getUnknownFields().hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secretmanager.v1beta1.Replication parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder(com.google.cloud.secretmanager.v1beta1.Replication prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * A policy that defines the replication configuration of data.
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.Replication} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.Replication) + com.google.cloud.secretmanager.v1beta1.ReplicationOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.Replication.class, + com.google.cloud.secretmanager.v1beta1.Replication.Builder.class); + } + + // Construct using com.google.cloud.secretmanager.v1beta1.Replication.newBuilder() + private Builder() {} + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + } + + @java.lang.Override + public Builder clear() { + super.clear(); + bitField0_ = 0; + if (automaticBuilder_ != null) { + automaticBuilder_.clear(); + } + if (userManagedBuilder_ != null) { + userManagedBuilder_.clear(); + } + replicationCase_ = 0; + replication_ = null; + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Replication_descriptor; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication getDefaultInstanceForType() { + return com.google.cloud.secretmanager.v1beta1.Replication.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication build() { + com.google.cloud.secretmanager.v1beta1.Replication result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication buildPartial() { + com.google.cloud.secretmanager.v1beta1.Replication result = + new com.google.cloud.secretmanager.v1beta1.Replication(this); + if (bitField0_ != 0) { + buildPartial0(result); + } + buildPartialOneofs(result); + onBuilt(); + return result; + } + + private void buildPartial0(com.google.cloud.secretmanager.v1beta1.Replication result) { + int from_bitField0_ = bitField0_; + } + + private void buildPartialOneofs(com.google.cloud.secretmanager.v1beta1.Replication result) { + result.replicationCase_ = replicationCase_; + result.replication_ = this.replication_; + if (replicationCase_ == 1 && automaticBuilder_ != null) { + result.replication_ = automaticBuilder_.build(); + } + if (replicationCase_ == 2 && userManagedBuilder_ != null) { + result.replication_ = userManagedBuilder_.build(); + } + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secretmanager.v1beta1.Replication) { + return mergeFrom((com.google.cloud.secretmanager.v1beta1.Replication) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secretmanager.v1beta1.Replication other) { + if (other == com.google.cloud.secretmanager.v1beta1.Replication.getDefaultInstance()) + return this; + switch (other.getReplicationCase()) { + case AUTOMATIC: + { + mergeAutomatic(other.getAutomatic()); + break; + } + case USER_MANAGED: + { + mergeUserManaged(other.getUserManaged()); + break; + } + case REPLICATION_NOT_SET: + { + break; + } + } + this.mergeUnknownFields(other.getUnknownFields()); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + input.readMessage(getAutomaticFieldBuilder().getBuilder(), extensionRegistry); + replicationCase_ = 1; + break; + } // case 10 + case 18: + { + input.readMessage(getUserManagedFieldBuilder().getBuilder(), extensionRegistry); + replicationCase_ = 2; + break; + } // case 18 + default: + { + if (!super.parseUnknownField(input, extensionRegistry, tag)) { + done = true; // was an endgroup tag + } + break; + } // default: + } // switch (tag) + } // while (!done) + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.unwrapIOException(); + } finally { + onChanged(); + } // finally + return this; + } + + private int replicationCase_ = 0; + private java.lang.Object replication_; + + public ReplicationCase getReplicationCase() { + return ReplicationCase.forNumber(replicationCase_); + } + + public Builder clearReplication() { + replicationCase_ = 0; + replication_ = null; + onChanged(); + return this; + } + + private int bitField0_; + + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.Replication.Automatic, + com.google.cloud.secretmanager.v1beta1.Replication.Automatic.Builder, + com.google.cloud.secretmanager.v1beta1.Replication.AutomaticOrBuilder> + automaticBuilder_; + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + * + * @return Whether the automatic field is set. + */ + @java.lang.Override + public boolean hasAutomatic() { + return replicationCase_ == 1; + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + * + * @return The automatic. + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication.Automatic getAutomatic() { + if (automaticBuilder_ == null) { + if (replicationCase_ == 1) { + return (com.google.cloud.secretmanager.v1beta1.Replication.Automatic) replication_; + } + return com.google.cloud.secretmanager.v1beta1.Replication.Automatic.getDefaultInstance(); + } else { + if (replicationCase_ == 1) { + return automaticBuilder_.getMessage(); + } + return com.google.cloud.secretmanager.v1beta1.Replication.Automatic.getDefaultInstance(); + } + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + */ + public Builder setAutomatic( + com.google.cloud.secretmanager.v1beta1.Replication.Automatic value) { + if (automaticBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + replication_ = value; + onChanged(); + } else { + automaticBuilder_.setMessage(value); + } + replicationCase_ = 1; + return this; + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + */ + public Builder setAutomatic( + com.google.cloud.secretmanager.v1beta1.Replication.Automatic.Builder builderForValue) { + if (automaticBuilder_ == null) { + replication_ = builderForValue.build(); + onChanged(); + } else { + automaticBuilder_.setMessage(builderForValue.build()); + } + replicationCase_ = 1; + return this; + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + */ + public Builder mergeAutomatic( + com.google.cloud.secretmanager.v1beta1.Replication.Automatic value) { + if (automaticBuilder_ == null) { + if (replicationCase_ == 1 + && replication_ + != com.google.cloud.secretmanager.v1beta1.Replication.Automatic + .getDefaultInstance()) { + replication_ = + com.google.cloud.secretmanager.v1beta1.Replication.Automatic.newBuilder( + (com.google.cloud.secretmanager.v1beta1.Replication.Automatic) replication_) + .mergeFrom(value) + .buildPartial(); + } else { + replication_ = value; + } + onChanged(); + } else { + if (replicationCase_ == 1) { + automaticBuilder_.mergeFrom(value); + } else { + automaticBuilder_.setMessage(value); + } + } + replicationCase_ = 1; + return this; + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + */ + public Builder clearAutomatic() { + if (automaticBuilder_ == null) { + if (replicationCase_ == 1) { + replicationCase_ = 0; + replication_ = null; + onChanged(); + } + } else { + if (replicationCase_ == 1) { + replicationCase_ = 0; + replication_ = null; + } + automaticBuilder_.clear(); + } + return this; + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + */ + public com.google.cloud.secretmanager.v1beta1.Replication.Automatic.Builder + getAutomaticBuilder() { + return getAutomaticFieldBuilder().getBuilder(); + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication.AutomaticOrBuilder + getAutomaticOrBuilder() { + if ((replicationCase_ == 1) && (automaticBuilder_ != null)) { + return automaticBuilder_.getMessageOrBuilder(); + } else { + if (replicationCase_ == 1) { + return (com.google.cloud.secretmanager.v1beta1.Replication.Automatic) replication_; + } + return com.google.cloud.secretmanager.v1beta1.Replication.Automatic.getDefaultInstance(); + } + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + */ + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.Replication.Automatic, + com.google.cloud.secretmanager.v1beta1.Replication.Automatic.Builder, + com.google.cloud.secretmanager.v1beta1.Replication.AutomaticOrBuilder> + getAutomaticFieldBuilder() { + if (automaticBuilder_ == null) { + if (!(replicationCase_ == 1)) { + replication_ = + com.google.cloud.secretmanager.v1beta1.Replication.Automatic.getDefaultInstance(); + } + automaticBuilder_ = + new com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.Replication.Automatic, + com.google.cloud.secretmanager.v1beta1.Replication.Automatic.Builder, + com.google.cloud.secretmanager.v1beta1.Replication.AutomaticOrBuilder>( + (com.google.cloud.secretmanager.v1beta1.Replication.Automatic) replication_, + getParentForChildren(), + isClean()); + replication_ = null; + } + replicationCase_ = 1; + onChanged(); + return automaticBuilder_; + } + + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged, + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Builder, + com.google.cloud.secretmanager.v1beta1.Replication.UserManagedOrBuilder> + userManagedBuilder_; + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + * + * @return Whether the userManaged field is set. + */ + @java.lang.Override + public boolean hasUserManaged() { + return replicationCase_ == 2; + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + * + * @return The userManaged. + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication.UserManaged getUserManaged() { + if (userManagedBuilder_ == null) { + if (replicationCase_ == 2) { + return (com.google.cloud.secretmanager.v1beta1.Replication.UserManaged) replication_; + } + return com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.getDefaultInstance(); + } else { + if (replicationCase_ == 2) { + return userManagedBuilder_.getMessage(); + } + return com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.getDefaultInstance(); + } + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + */ + public Builder setUserManaged( + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged value) { + if (userManagedBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + replication_ = value; + onChanged(); + } else { + userManagedBuilder_.setMessage(value); + } + replicationCase_ = 2; + return this; + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + */ + public Builder setUserManaged( + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Builder builderForValue) { + if (userManagedBuilder_ == null) { + replication_ = builderForValue.build(); + onChanged(); + } else { + userManagedBuilder_.setMessage(builderForValue.build()); + } + replicationCase_ = 2; + return this; + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + */ + public Builder mergeUserManaged( + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged value) { + if (userManagedBuilder_ == null) { + if (replicationCase_ == 2 + && replication_ + != com.google.cloud.secretmanager.v1beta1.Replication.UserManaged + .getDefaultInstance()) { + replication_ = + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.newBuilder( + (com.google.cloud.secretmanager.v1beta1.Replication.UserManaged) replication_) + .mergeFrom(value) + .buildPartial(); + } else { + replication_ = value; + } + onChanged(); + } else { + if (replicationCase_ == 2) { + userManagedBuilder_.mergeFrom(value); + } else { + userManagedBuilder_.setMessage(value); + } + } + replicationCase_ = 2; + return this; + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + */ + public Builder clearUserManaged() { + if (userManagedBuilder_ == null) { + if (replicationCase_ == 2) { + replicationCase_ = 0; + replication_ = null; + onChanged(); + } + } else { + if (replicationCase_ == 2) { + replicationCase_ = 0; + replication_ = null; + } + userManagedBuilder_.clear(); + } + return this; + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + */ + public com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Builder + getUserManagedBuilder() { + return getUserManagedFieldBuilder().getBuilder(); + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication.UserManagedOrBuilder + getUserManagedOrBuilder() { + if ((replicationCase_ == 2) && (userManagedBuilder_ != null)) { + return userManagedBuilder_.getMessageOrBuilder(); + } else { + if (replicationCase_ == 2) { + return (com.google.cloud.secretmanager.v1beta1.Replication.UserManaged) replication_; + } + return com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.getDefaultInstance(); + } + } + /** + * + * + *
+     * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+     * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + */ + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged, + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Builder, + com.google.cloud.secretmanager.v1beta1.Replication.UserManagedOrBuilder> + getUserManagedFieldBuilder() { + if (userManagedBuilder_ == null) { + if (!(replicationCase_ == 2)) { + replication_ = + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.getDefaultInstance(); + } + userManagedBuilder_ = + new com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged, + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged.Builder, + com.google.cloud.secretmanager.v1beta1.Replication.UserManagedOrBuilder>( + (com.google.cloud.secretmanager.v1beta1.Replication.UserManaged) replication_, + getParentForChildren(), + isClean()); + replication_ = null; + } + replicationCase_ = 2; + onChanged(); + return userManagedBuilder_; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.Replication) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.Replication) + private static final com.google.cloud.secretmanager.v1beta1.Replication DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secretmanager.v1beta1.Replication(); + } + + public static com.google.cloud.secretmanager.v1beta1.Replication getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public Replication parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + Builder builder = newBuilder(); + try { + builder.mergeFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(builder.buildPartial()); + } catch (com.google.protobuf.UninitializedMessageException e) { + throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial()); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e) + .setUnfinishedMessage(builder.buildPartial()); + } + return builder.buildPartial(); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ReplicationOrBuilder.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ReplicationOrBuilder.java new file mode 100644 index 000000000000..9abf78151dc1 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ReplicationOrBuilder.java @@ -0,0 +1,98 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/resources.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +public interface ReplicationOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.Replication) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + * + * @return Whether the automatic field is set. + */ + boolean hasAutomatic(); + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + * + * @return The automatic. + */ + com.google.cloud.secretmanager.v1beta1.Replication.Automatic getAutomatic(); + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.Automatic automatic = 1; + */ + com.google.cloud.secretmanager.v1beta1.Replication.AutomaticOrBuilder getAutomaticOrBuilder(); + + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + * + * @return Whether the userManaged field is set. + */ + boolean hasUserManaged(); + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + * + * @return The userManaged. + */ + com.google.cloud.secretmanager.v1beta1.Replication.UserManaged getUserManaged(); + /** + * + * + *
+   * The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified.
+   * 
+ * + * .google.cloud.secrets.v1beta1.Replication.UserManaged user_managed = 2; + */ + com.google.cloud.secretmanager.v1beta1.Replication.UserManagedOrBuilder getUserManagedOrBuilder(); + + com.google.cloud.secretmanager.v1beta1.Replication.ReplicationCase getReplicationCase(); +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ResourcesProto.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ResourcesProto.java new file mode 100644 index 000000000000..dffa4b1778bc --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ResourcesProto.java @@ -0,0 +1,196 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/resources.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +public final class ResourcesProto { + private ResourcesProto() {} + + public static void registerAllExtensions(com.google.protobuf.ExtensionRegistryLite registry) {} + + public static void registerAllExtensions(com.google.protobuf.ExtensionRegistry registry) { + registerAllExtensions((com.google.protobuf.ExtensionRegistryLite) registry); + } + + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_Secret_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_Secret_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_Secret_LabelsEntry_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_Secret_LabelsEntry_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_SecretVersion_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_SecretVersion_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_Replication_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_Replication_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_Replication_Automatic_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_Replication_Automatic_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_Replica_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_Replica_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_SecretPayload_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_SecretPayload_fieldAccessorTable; + + public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() { + return descriptor; + } + + private static com.google.protobuf.Descriptors.FileDescriptor descriptor; + + static { + java.lang.String[] descriptorData = { + "\n,google/cloud/secrets/v1beta1/resources" + + ".proto\022\034google.cloud.secrets.v1beta1\032\037go" + + "ogle/api/field_behavior.proto\032\031google/ap" + + "i/resource.proto\032\037google/protobuf/timest" + + "amp.proto\"\331\002\n\006Secret\022\021\n\004name\030\001 \001(\tB\003\340A\003\022" + + "F\n\013replication\030\002 \001(\0132).google.cloud.secr" + + "ets.v1beta1.ReplicationB\006\340A\005\340A\002\0224\n\013creat" + + "e_time\030\003 \001(\0132\032.google.protobuf.Timestamp" + + "B\003\340A\003\022@\n\006labels\030\004 \003(\01320.google.cloud.sec" + + "rets.v1beta1.Secret.LabelsEntry\032-\n\013Label" + + "sEntry\022\013\n\003key\030\001 \001(\t\022\r\n\005value\030\002 \001(\t:\0028\001:M" + + "\352AJ\n#secretmanager.googleapis.com/Secret" + + "\022#projects/{project}/secrets/{secret}\"\220\003" + + "\n\rSecretVersion\022\021\n\004name\030\001 \001(\tB\003\340A\003\0224\n\013cr" + + "eate_time\030\002 \001(\0132\032.google.protobuf.Timest" + + "ampB\003\340A\003\0225\n\014destroy_time\030\003 \001(\0132\032.google." + + "protobuf.TimestampB\003\340A\003\022E\n\005state\030\004 \001(\01621" + + ".google.cloud.secrets.v1beta1.SecretVers" + + "ion.StateB\003\340A\003\"H\n\005State\022\025\n\021STATE_UNSPECI" + + "FIED\020\000\022\013\n\007ENABLED\020\001\022\014\n\010DISABLED\020\002\022\r\n\tDES" + + "TROYED\020\003:n\352Ak\n*secretmanager.googleapis." + + "com/SecretVersion\022=projects/{project}/se" + + "crets/{secret}/versions/{secret_version}" + + "\"\305\002\n\013Replication\022H\n\tautomatic\030\001 \001(\01323.go" + + "ogle.cloud.secrets.v1beta1.Replication.A" + + "utomaticH\000\022M\n\014user_managed\030\002 \001(\01325.googl" + + "e.cloud.secrets.v1beta1.Replication.User" + + "ManagedH\000\032\013\n\tAutomatic\032\200\001\n\013UserManaged\022T" + + "\n\010replicas\030\001 \003(\0132=.google.cloud.secrets." + + "v1beta1.Replication.UserManaged.ReplicaB" + + "\003\340A\002\032\033\n\007Replica\022\020\n\010location\030\001 \001(\tB\r\n\013rep" + + "lication\"\035\n\rSecretPayload\022\014\n\004data\030\001 \001(\014B" + + "\361\001\n&com.google.cloud.secretmanager.v1bet" + + "a1B\016ResourcesProtoP\001Z:cloud.google.com/g" + + "o/secrets/apiv1beta1/secretspb;secretspb" + + "\370\001\001\242\002\003GSM\252\002\"Google.Cloud.SecretManager.V" + + "1Beta1\312\002\"Google\\Cloud\\SecretManager\\V1be" + + "ta1\352\002%Google::Cloud::SecretManager::V1be" + + "ta1b\006proto3" + }; + descriptor = + com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom( + descriptorData, + new com.google.protobuf.Descriptors.FileDescriptor[] { + com.google.api.FieldBehaviorProto.getDescriptor(), + com.google.api.ResourceProto.getDescriptor(), + com.google.protobuf.TimestampProto.getDescriptor(), + }); + internal_static_google_cloud_secrets_v1beta1_Secret_descriptor = + getDescriptor().getMessageTypes().get(0); + internal_static_google_cloud_secrets_v1beta1_Secret_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_Secret_descriptor, + new java.lang.String[] { + "Name", "Replication", "CreateTime", "Labels", + }); + internal_static_google_cloud_secrets_v1beta1_Secret_LabelsEntry_descriptor = + internal_static_google_cloud_secrets_v1beta1_Secret_descriptor.getNestedTypes().get(0); + internal_static_google_cloud_secrets_v1beta1_Secret_LabelsEntry_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_Secret_LabelsEntry_descriptor, + new java.lang.String[] { + "Key", "Value", + }); + internal_static_google_cloud_secrets_v1beta1_SecretVersion_descriptor = + getDescriptor().getMessageTypes().get(1); + internal_static_google_cloud_secrets_v1beta1_SecretVersion_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_SecretVersion_descriptor, + new java.lang.String[] { + "Name", "CreateTime", "DestroyTime", "State", + }); + internal_static_google_cloud_secrets_v1beta1_Replication_descriptor = + getDescriptor().getMessageTypes().get(2); + internal_static_google_cloud_secrets_v1beta1_Replication_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_Replication_descriptor, + new java.lang.String[] { + "Automatic", "UserManaged", "Replication", + }); + internal_static_google_cloud_secrets_v1beta1_Replication_Automatic_descriptor = + internal_static_google_cloud_secrets_v1beta1_Replication_descriptor.getNestedTypes().get(0); + internal_static_google_cloud_secrets_v1beta1_Replication_Automatic_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_Replication_Automatic_descriptor, + new java.lang.String[] {}); + internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_descriptor = + internal_static_google_cloud_secrets_v1beta1_Replication_descriptor.getNestedTypes().get(1); + internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_descriptor, + new java.lang.String[] { + "Replicas", + }); + internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_Replica_descriptor = + internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_descriptor + .getNestedTypes() + .get(0); + internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_Replica_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_Replication_UserManaged_Replica_descriptor, + new java.lang.String[] { + "Location", + }); + internal_static_google_cloud_secrets_v1beta1_SecretPayload_descriptor = + getDescriptor().getMessageTypes().get(3); + internal_static_google_cloud_secrets_v1beta1_SecretPayload_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_SecretPayload_descriptor, + new java.lang.String[] { + "Data", + }); + com.google.protobuf.ExtensionRegistry registry = + com.google.protobuf.ExtensionRegistry.newInstance(); + registry.add(com.google.api.FieldBehaviorProto.fieldBehavior); + registry.add(com.google.api.ResourceProto.resource); + com.google.protobuf.Descriptors.FileDescriptor.internalUpdateFileDescriptor( + descriptor, registry); + com.google.api.FieldBehaviorProto.getDescriptor(); + com.google.api.ResourceProto.getDescriptor(); + com.google.protobuf.TimestampProto.getDescriptor(); + } + + // @@protoc_insertion_point(outer_class_scope) +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/Secret.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/Secret.java new file mode 100644 index 000000000000..82807329cf2b --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/Secret.java @@ -0,0 +1,1692 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/resources.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +/** + * + * + *
+ * A [Secret][google.cloud.secrets.v1beta1.Secret] is a logical secret whose value and versions can
+ * be accessed.
+ *
+ * A [Secret][google.cloud.secrets.v1beta1.Secret] is made up of zero or more [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] that
+ * represent the secret data.
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.Secret} + */ +public final class Secret extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.Secret) + SecretOrBuilder { + private static final long serialVersionUID = 0L; + // Use Secret.newBuilder() to construct. + private Secret(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private Secret() { + name_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new Secret(); + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Secret_descriptor; + } + + @SuppressWarnings({"rawtypes"}) + @java.lang.Override + protected com.google.protobuf.MapFieldReflectionAccessor internalGetMapFieldReflection( + int number) { + switch (number) { + case 4: + return internalGetLabels(); + default: + throw new RuntimeException("Invalid map field number: " + number); + } + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Secret_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.Secret.class, + com.google.cloud.secretmanager.v1beta1.Secret.Builder.class); + } + + private int bitField0_; + public static final int NAME_FIELD_NUMBER = 1; + + @SuppressWarnings("serial") + private volatile java.lang.Object name_ = ""; + /** + * + * + *
+   * Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the format `projects/*/secrets/*`.
+   * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The name. + */ + @java.lang.Override + public java.lang.String getName() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } + } + /** + * + * + *
+   * Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the format `projects/*/secrets/*`.
+   * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The bytes for name. + */ + @java.lang.Override + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + public static final int REPLICATION_FIELD_NUMBER = 2; + private com.google.cloud.secretmanager.v1beta1.Replication replication_; + /** + * + * + *
+   * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+   *
+   * The replication policy cannot be changed after the Secret has been created.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the replication field is set. + */ + @java.lang.Override + public boolean hasReplication() { + return ((bitField0_ & 0x00000001) != 0); + } + /** + * + * + *
+   * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+   *
+   * The replication policy cannot be changed after the Secret has been created.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + * + * @return The replication. + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Replication getReplication() { + return replication_ == null + ? com.google.cloud.secretmanager.v1beta1.Replication.getDefaultInstance() + : replication_; + } + /** + * + * + *
+   * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+   *
+   * The replication policy cannot be changed after the Secret has been created.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.ReplicationOrBuilder getReplicationOrBuilder() { + return replication_ == null + ? com.google.cloud.secretmanager.v1beta1.Replication.getDefaultInstance() + : replication_; + } + + public static final int CREATE_TIME_FIELD_NUMBER = 3; + private com.google.protobuf.Timestamp createTime_; + /** + * + * + *
+   * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return Whether the createTime field is set. + */ + @java.lang.Override + public boolean hasCreateTime() { + return ((bitField0_ & 0x00000002) != 0); + } + /** + * + * + *
+   * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The createTime. + */ + @java.lang.Override + public com.google.protobuf.Timestamp getCreateTime() { + return createTime_ == null ? com.google.protobuf.Timestamp.getDefaultInstance() : createTime_; + } + /** + * + * + *
+   * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + @java.lang.Override + public com.google.protobuf.TimestampOrBuilder getCreateTimeOrBuilder() { + return createTime_ == null ? com.google.protobuf.Timestamp.getDefaultInstance() : createTime_; + } + + public static final int LABELS_FIELD_NUMBER = 4; + + private static final class LabelsDefaultEntryHolder { + static final com.google.protobuf.MapEntry defaultEntry = + com.google.protobuf.MapEntry.newDefaultInstance( + com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Secret_LabelsEntry_descriptor, + com.google.protobuf.WireFormat.FieldType.STRING, + "", + com.google.protobuf.WireFormat.FieldType.STRING, + ""); + } + + @SuppressWarnings("serial") + private com.google.protobuf.MapField labels_; + + private com.google.protobuf.MapField internalGetLabels() { + if (labels_ == null) { + return com.google.protobuf.MapField.emptyMapField(LabelsDefaultEntryHolder.defaultEntry); + } + return labels_; + } + + public int getLabelsCount() { + return internalGetLabels().getMap().size(); + } + /** + * + * + *
+   * The labels assigned to this Secret.
+   *
+   * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+   * of maximum 128 bytes, and must conform to the following PCRE regular
+   * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+   *
+   * Label values must be between 0 and 63 characters long, have a UTF-8
+   * encoding of maximum 128 bytes, and must conform to the following PCRE
+   * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+   *
+   * No more than 64 labels can be assigned to a given resource.
+   * 
+ * + * map<string, string> labels = 4; + */ + @java.lang.Override + public boolean containsLabels(java.lang.String key) { + if (key == null) { + throw new NullPointerException("map key"); + } + return internalGetLabels().getMap().containsKey(key); + } + /** Use {@link #getLabelsMap()} instead. */ + @java.lang.Override + @java.lang.Deprecated + public java.util.Map getLabels() { + return getLabelsMap(); + } + /** + * + * + *
+   * The labels assigned to this Secret.
+   *
+   * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+   * of maximum 128 bytes, and must conform to the following PCRE regular
+   * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+   *
+   * Label values must be between 0 and 63 characters long, have a UTF-8
+   * encoding of maximum 128 bytes, and must conform to the following PCRE
+   * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+   *
+   * No more than 64 labels can be assigned to a given resource.
+   * 
+ * + * map<string, string> labels = 4; + */ + @java.lang.Override + public java.util.Map getLabelsMap() { + return internalGetLabels().getMap(); + } + /** + * + * + *
+   * The labels assigned to this Secret.
+   *
+   * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+   * of maximum 128 bytes, and must conform to the following PCRE regular
+   * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+   *
+   * Label values must be between 0 and 63 characters long, have a UTF-8
+   * encoding of maximum 128 bytes, and must conform to the following PCRE
+   * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+   *
+   * No more than 64 labels can be assigned to a given resource.
+   * 
+ * + * map<string, string> labels = 4; + */ + @java.lang.Override + public /* nullable */ java.lang.String getLabelsOrDefault( + java.lang.String key, + /* nullable */ + java.lang.String defaultValue) { + if (key == null) { + throw new NullPointerException("map key"); + } + java.util.Map map = internalGetLabels().getMap(); + return map.containsKey(key) ? map.get(key) : defaultValue; + } + /** + * + * + *
+   * The labels assigned to this Secret.
+   *
+   * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+   * of maximum 128 bytes, and must conform to the following PCRE regular
+   * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+   *
+   * Label values must be between 0 and 63 characters long, have a UTF-8
+   * encoding of maximum 128 bytes, and must conform to the following PCRE
+   * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+   *
+   * No more than 64 labels can be assigned to a given resource.
+   * 
+ * + * map<string, string> labels = 4; + */ + @java.lang.Override + public java.lang.String getLabelsOrThrow(java.lang.String key) { + if (key == null) { + throw new NullPointerException("map key"); + } + java.util.Map map = internalGetLabels().getMap(); + if (!map.containsKey(key)) { + throw new java.lang.IllegalArgumentException(); + } + return map.get(key); + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); + } + if (((bitField0_ & 0x00000001) != 0)) { + output.writeMessage(2, getReplication()); + } + if (((bitField0_ & 0x00000002) != 0)) { + output.writeMessage(3, getCreateTime()); + } + com.google.protobuf.GeneratedMessageV3.serializeStringMapTo( + output, internalGetLabels(), LabelsDefaultEntryHolder.defaultEntry, 4); + getUnknownFields().writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); + } + if (((bitField0_ & 0x00000001) != 0)) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(2, getReplication()); + } + if (((bitField0_ & 0x00000002) != 0)) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(3, getCreateTime()); + } + for (java.util.Map.Entry entry : + internalGetLabels().getMap().entrySet()) { + com.google.protobuf.MapEntry labels__ = + LabelsDefaultEntryHolder.defaultEntry + .newBuilderForType() + .setKey(entry.getKey()) + .setValue(entry.getValue()) + .build(); + size += com.google.protobuf.CodedOutputStream.computeMessageSize(4, labels__); + } + size += getUnknownFields().getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secretmanager.v1beta1.Secret)) { + return super.equals(obj); + } + com.google.cloud.secretmanager.v1beta1.Secret other = + (com.google.cloud.secretmanager.v1beta1.Secret) obj; + + if (!getName().equals(other.getName())) return false; + if (hasReplication() != other.hasReplication()) return false; + if (hasReplication()) { + if (!getReplication().equals(other.getReplication())) return false; + } + if (hasCreateTime() != other.hasCreateTime()) return false; + if (hasCreateTime()) { + if (!getCreateTime().equals(other.getCreateTime())) return false; + } + if (!internalGetLabels().equals(other.internalGetLabels())) return false; + if (!getUnknownFields().equals(other.getUnknownFields())) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + NAME_FIELD_NUMBER; + hash = (53 * hash) + getName().hashCode(); + if (hasReplication()) { + hash = (37 * hash) + REPLICATION_FIELD_NUMBER; + hash = (53 * hash) + getReplication().hashCode(); + } + if (hasCreateTime()) { + hash = (37 * hash) + CREATE_TIME_FIELD_NUMBER; + hash = (53 * hash) + getCreateTime().hashCode(); + } + if (!internalGetLabels().getMap().isEmpty()) { + hash = (37 * hash) + LABELS_FIELD_NUMBER; + hash = (53 * hash) + internalGetLabels().hashCode(); + } + hash = (29 * hash) + getUnknownFields().hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secretmanager.v1beta1.Secret parseFrom(java.nio.ByteBuffer data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.Secret parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Secret parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.Secret parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Secret parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.Secret parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Secret parseFrom(java.io.InputStream input) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.Secret parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Secret parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.Secret parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.Secret parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.Secret parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder(com.google.cloud.secretmanager.v1beta1.Secret prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * A [Secret][google.cloud.secrets.v1beta1.Secret] is a logical secret whose value and versions can
+   * be accessed.
+   *
+   * A [Secret][google.cloud.secrets.v1beta1.Secret] is made up of zero or more [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] that
+   * represent the secret data.
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.Secret} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.Secret) + com.google.cloud.secretmanager.v1beta1.SecretOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Secret_descriptor; + } + + @SuppressWarnings({"rawtypes"}) + protected com.google.protobuf.MapFieldReflectionAccessor internalGetMapFieldReflection( + int number) { + switch (number) { + case 4: + return internalGetLabels(); + default: + throw new RuntimeException("Invalid map field number: " + number); + } + } + + @SuppressWarnings({"rawtypes"}) + protected com.google.protobuf.MapFieldReflectionAccessor internalGetMutableMapFieldReflection( + int number) { + switch (number) { + case 4: + return internalGetMutableLabels(); + default: + throw new RuntimeException("Invalid map field number: " + number); + } + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Secret_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.Secret.class, + com.google.cloud.secretmanager.v1beta1.Secret.Builder.class); + } + + // Construct using com.google.cloud.secretmanager.v1beta1.Secret.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) { + getReplicationFieldBuilder(); + getCreateTimeFieldBuilder(); + } + } + + @java.lang.Override + public Builder clear() { + super.clear(); + bitField0_ = 0; + name_ = ""; + replication_ = null; + if (replicationBuilder_ != null) { + replicationBuilder_.dispose(); + replicationBuilder_ = null; + } + createTime_ = null; + if (createTimeBuilder_ != null) { + createTimeBuilder_.dispose(); + createTimeBuilder_ = null; + } + internalGetMutableLabels().clear(); + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_Secret_descriptor; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Secret getDefaultInstanceForType() { + return com.google.cloud.secretmanager.v1beta1.Secret.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Secret build() { + com.google.cloud.secretmanager.v1beta1.Secret result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Secret buildPartial() { + com.google.cloud.secretmanager.v1beta1.Secret result = + new com.google.cloud.secretmanager.v1beta1.Secret(this); + if (bitField0_ != 0) { + buildPartial0(result); + } + onBuilt(); + return result; + } + + private void buildPartial0(com.google.cloud.secretmanager.v1beta1.Secret result) { + int from_bitField0_ = bitField0_; + if (((from_bitField0_ & 0x00000001) != 0)) { + result.name_ = name_; + } + int to_bitField0_ = 0; + if (((from_bitField0_ & 0x00000002) != 0)) { + result.replication_ = + replicationBuilder_ == null ? replication_ : replicationBuilder_.build(); + to_bitField0_ |= 0x00000001; + } + if (((from_bitField0_ & 0x00000004) != 0)) { + result.createTime_ = createTimeBuilder_ == null ? createTime_ : createTimeBuilder_.build(); + to_bitField0_ |= 0x00000002; + } + if (((from_bitField0_ & 0x00000008) != 0)) { + result.labels_ = internalGetLabels(); + result.labels_.makeImmutable(); + } + result.bitField0_ |= to_bitField0_; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secretmanager.v1beta1.Secret) { + return mergeFrom((com.google.cloud.secretmanager.v1beta1.Secret) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secretmanager.v1beta1.Secret other) { + if (other == com.google.cloud.secretmanager.v1beta1.Secret.getDefaultInstance()) return this; + if (!other.getName().isEmpty()) { + name_ = other.name_; + bitField0_ |= 0x00000001; + onChanged(); + } + if (other.hasReplication()) { + mergeReplication(other.getReplication()); + } + if (other.hasCreateTime()) { + mergeCreateTime(other.getCreateTime()); + } + internalGetMutableLabels().mergeFrom(other.internalGetLabels()); + bitField0_ |= 0x00000008; + this.mergeUnknownFields(other.getUnknownFields()); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + name_ = input.readStringRequireUtf8(); + bitField0_ |= 0x00000001; + break; + } // case 10 + case 18: + { + input.readMessage(getReplicationFieldBuilder().getBuilder(), extensionRegistry); + bitField0_ |= 0x00000002; + break; + } // case 18 + case 26: + { + input.readMessage(getCreateTimeFieldBuilder().getBuilder(), extensionRegistry); + bitField0_ |= 0x00000004; + break; + } // case 26 + case 34: + { + com.google.protobuf.MapEntry labels__ = + input.readMessage( + LabelsDefaultEntryHolder.defaultEntry.getParserForType(), + extensionRegistry); + internalGetMutableLabels() + .getMutableMap() + .put(labels__.getKey(), labels__.getValue()); + bitField0_ |= 0x00000008; + break; + } // case 34 + default: + { + if (!super.parseUnknownField(input, extensionRegistry, tag)) { + done = true; // was an endgroup tag + } + break; + } // default: + } // switch (tag) + } // while (!done) + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.unwrapIOException(); + } finally { + onChanged(); + } // finally + return this; + } + + private int bitField0_; + + private java.lang.Object name_ = ""; + /** + * + * + *
+     * Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the format `projects/*/secrets/*`.
+     * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the format `projects/*/secrets/*`.
+     * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the format `projects/*/secrets/*`.
+     * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @param value The name to set. + * @return This builder for chaining. + */ + public Builder setName(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + name_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + /** + * + * + *
+     * Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the format `projects/*/secrets/*`.
+     * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return This builder for chaining. + */ + public Builder clearName() { + name_ = getDefaultInstance().getName(); + bitField0_ = (bitField0_ & ~0x00000001); + onChanged(); + return this; + } + /** + * + * + *
+     * Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the format `projects/*/secrets/*`.
+     * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @param value The bytes for name to set. + * @return This builder for chaining. + */ + public Builder setNameBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + name_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + + private com.google.cloud.secretmanager.v1beta1.Replication replication_; + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.Replication, + com.google.cloud.secretmanager.v1beta1.Replication.Builder, + com.google.cloud.secretmanager.v1beta1.ReplicationOrBuilder> + replicationBuilder_; + /** + * + * + *
+     * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+     *
+     * The replication policy cannot be changed after the Secret has been created.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the replication field is set. + */ + public boolean hasReplication() { + return ((bitField0_ & 0x00000002) != 0); + } + /** + * + * + *
+     * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+     *
+     * The replication policy cannot be changed after the Secret has been created.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + * + * @return The replication. + */ + public com.google.cloud.secretmanager.v1beta1.Replication getReplication() { + if (replicationBuilder_ == null) { + return replication_ == null + ? com.google.cloud.secretmanager.v1beta1.Replication.getDefaultInstance() + : replication_; + } else { + return replicationBuilder_.getMessage(); + } + } + /** + * + * + *
+     * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+     *
+     * The replication policy cannot be changed after the Secret has been created.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder setReplication(com.google.cloud.secretmanager.v1beta1.Replication value) { + if (replicationBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + replication_ = value; + } else { + replicationBuilder_.setMessage(value); + } + bitField0_ |= 0x00000002; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+     *
+     * The replication policy cannot be changed after the Secret has been created.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder setReplication( + com.google.cloud.secretmanager.v1beta1.Replication.Builder builderForValue) { + if (replicationBuilder_ == null) { + replication_ = builderForValue.build(); + } else { + replicationBuilder_.setMessage(builderForValue.build()); + } + bitField0_ |= 0x00000002; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+     *
+     * The replication policy cannot be changed after the Secret has been created.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder mergeReplication(com.google.cloud.secretmanager.v1beta1.Replication value) { + if (replicationBuilder_ == null) { + if (((bitField0_ & 0x00000002) != 0) + && replication_ != null + && replication_ + != com.google.cloud.secretmanager.v1beta1.Replication.getDefaultInstance()) { + getReplicationBuilder().mergeFrom(value); + } else { + replication_ = value; + } + } else { + replicationBuilder_.mergeFrom(value); + } + if (replication_ != null) { + bitField0_ |= 0x00000002; + onChanged(); + } + return this; + } + /** + * + * + *
+     * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+     *
+     * The replication policy cannot be changed after the Secret has been created.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder clearReplication() { + bitField0_ = (bitField0_ & ~0x00000002); + replication_ = null; + if (replicationBuilder_ != null) { + replicationBuilder_.dispose(); + replicationBuilder_ = null; + } + onChanged(); + return this; + } + /** + * + * + *
+     * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+     *
+     * The replication policy cannot be changed after the Secret has been created.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secretmanager.v1beta1.Replication.Builder getReplicationBuilder() { + bitField0_ |= 0x00000002; + onChanged(); + return getReplicationFieldBuilder().getBuilder(); + } + /** + * + * + *
+     * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+     *
+     * The replication policy cannot be changed after the Secret has been created.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secretmanager.v1beta1.ReplicationOrBuilder getReplicationOrBuilder() { + if (replicationBuilder_ != null) { + return replicationBuilder_.getMessageOrBuilder(); + } else { + return replication_ == null + ? com.google.cloud.secretmanager.v1beta1.Replication.getDefaultInstance() + : replication_; + } + } + /** + * + * + *
+     * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+     *
+     * The replication policy cannot be changed after the Secret has been created.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + */ + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.Replication, + com.google.cloud.secretmanager.v1beta1.Replication.Builder, + com.google.cloud.secretmanager.v1beta1.ReplicationOrBuilder> + getReplicationFieldBuilder() { + if (replicationBuilder_ == null) { + replicationBuilder_ = + new com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.Replication, + com.google.cloud.secretmanager.v1beta1.Replication.Builder, + com.google.cloud.secretmanager.v1beta1.ReplicationOrBuilder>( + getReplication(), getParentForChildren(), isClean()); + replication_ = null; + } + return replicationBuilder_; + } + + private com.google.protobuf.Timestamp createTime_; + private com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.Timestamp, + com.google.protobuf.Timestamp.Builder, + com.google.protobuf.TimestampOrBuilder> + createTimeBuilder_; + /** + * + * + *
+     * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return Whether the createTime field is set. + */ + public boolean hasCreateTime() { + return ((bitField0_ & 0x00000004) != 0); + } + /** + * + * + *
+     * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The createTime. + */ + public com.google.protobuf.Timestamp getCreateTime() { + if (createTimeBuilder_ == null) { + return createTime_ == null + ? com.google.protobuf.Timestamp.getDefaultInstance() + : createTime_; + } else { + return createTimeBuilder_.getMessage(); + } + } + /** + * + * + *
+     * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder setCreateTime(com.google.protobuf.Timestamp value) { + if (createTimeBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + createTime_ = value; + } else { + createTimeBuilder_.setMessage(value); + } + bitField0_ |= 0x00000004; + onChanged(); + return this; + } + /** + * + * + *
+     * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder setCreateTime(com.google.protobuf.Timestamp.Builder builderForValue) { + if (createTimeBuilder_ == null) { + createTime_ = builderForValue.build(); + } else { + createTimeBuilder_.setMessage(builderForValue.build()); + } + bitField0_ |= 0x00000004; + onChanged(); + return this; + } + /** + * + * + *
+     * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder mergeCreateTime(com.google.protobuf.Timestamp value) { + if (createTimeBuilder_ == null) { + if (((bitField0_ & 0x00000004) != 0) + && createTime_ != null + && createTime_ != com.google.protobuf.Timestamp.getDefaultInstance()) { + getCreateTimeBuilder().mergeFrom(value); + } else { + createTime_ = value; + } + } else { + createTimeBuilder_.mergeFrom(value); + } + if (createTime_ != null) { + bitField0_ |= 0x00000004; + onChanged(); + } + return this; + } + /** + * + * + *
+     * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder clearCreateTime() { + bitField0_ = (bitField0_ & ~0x00000004); + createTime_ = null; + if (createTimeBuilder_ != null) { + createTimeBuilder_.dispose(); + createTimeBuilder_ = null; + } + onChanged(); + return this; + } + /** + * + * + *
+     * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public com.google.protobuf.Timestamp.Builder getCreateTimeBuilder() { + bitField0_ |= 0x00000004; + onChanged(); + return getCreateTimeFieldBuilder().getBuilder(); + } + /** + * + * + *
+     * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public com.google.protobuf.TimestampOrBuilder getCreateTimeOrBuilder() { + if (createTimeBuilder_ != null) { + return createTimeBuilder_.getMessageOrBuilder(); + } else { + return createTime_ == null + ? com.google.protobuf.Timestamp.getDefaultInstance() + : createTime_; + } + } + /** + * + * + *
+     * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + private com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.Timestamp, + com.google.protobuf.Timestamp.Builder, + com.google.protobuf.TimestampOrBuilder> + getCreateTimeFieldBuilder() { + if (createTimeBuilder_ == null) { + createTimeBuilder_ = + new com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.Timestamp, + com.google.protobuf.Timestamp.Builder, + com.google.protobuf.TimestampOrBuilder>( + getCreateTime(), getParentForChildren(), isClean()); + createTime_ = null; + } + return createTimeBuilder_; + } + + private com.google.protobuf.MapField labels_; + + private com.google.protobuf.MapField internalGetLabels() { + if (labels_ == null) { + return com.google.protobuf.MapField.emptyMapField(LabelsDefaultEntryHolder.defaultEntry); + } + return labels_; + } + + private com.google.protobuf.MapField + internalGetMutableLabels() { + if (labels_ == null) { + labels_ = com.google.protobuf.MapField.newMapField(LabelsDefaultEntryHolder.defaultEntry); + } + if (!labels_.isMutable()) { + labels_ = labels_.copy(); + } + bitField0_ |= 0x00000008; + onChanged(); + return labels_; + } + + public int getLabelsCount() { + return internalGetLabels().getMap().size(); + } + /** + * + * + *
+     * The labels assigned to this Secret.
+     *
+     * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+     * of maximum 128 bytes, and must conform to the following PCRE regular
+     * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+     *
+     * Label values must be between 0 and 63 characters long, have a UTF-8
+     * encoding of maximum 128 bytes, and must conform to the following PCRE
+     * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+     *
+     * No more than 64 labels can be assigned to a given resource.
+     * 
+ * + * map<string, string> labels = 4; + */ + @java.lang.Override + public boolean containsLabels(java.lang.String key) { + if (key == null) { + throw new NullPointerException("map key"); + } + return internalGetLabels().getMap().containsKey(key); + } + /** Use {@link #getLabelsMap()} instead. */ + @java.lang.Override + @java.lang.Deprecated + public java.util.Map getLabels() { + return getLabelsMap(); + } + /** + * + * + *
+     * The labels assigned to this Secret.
+     *
+     * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+     * of maximum 128 bytes, and must conform to the following PCRE regular
+     * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+     *
+     * Label values must be between 0 and 63 characters long, have a UTF-8
+     * encoding of maximum 128 bytes, and must conform to the following PCRE
+     * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+     *
+     * No more than 64 labels can be assigned to a given resource.
+     * 
+ * + * map<string, string> labels = 4; + */ + @java.lang.Override + public java.util.Map getLabelsMap() { + return internalGetLabels().getMap(); + } + /** + * + * + *
+     * The labels assigned to this Secret.
+     *
+     * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+     * of maximum 128 bytes, and must conform to the following PCRE regular
+     * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+     *
+     * Label values must be between 0 and 63 characters long, have a UTF-8
+     * encoding of maximum 128 bytes, and must conform to the following PCRE
+     * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+     *
+     * No more than 64 labels can be assigned to a given resource.
+     * 
+ * + * map<string, string> labels = 4; + */ + @java.lang.Override + public /* nullable */ java.lang.String getLabelsOrDefault( + java.lang.String key, + /* nullable */ + java.lang.String defaultValue) { + if (key == null) { + throw new NullPointerException("map key"); + } + java.util.Map map = internalGetLabels().getMap(); + return map.containsKey(key) ? map.get(key) : defaultValue; + } + /** + * + * + *
+     * The labels assigned to this Secret.
+     *
+     * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+     * of maximum 128 bytes, and must conform to the following PCRE regular
+     * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+     *
+     * Label values must be between 0 and 63 characters long, have a UTF-8
+     * encoding of maximum 128 bytes, and must conform to the following PCRE
+     * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+     *
+     * No more than 64 labels can be assigned to a given resource.
+     * 
+ * + * map<string, string> labels = 4; + */ + @java.lang.Override + public java.lang.String getLabelsOrThrow(java.lang.String key) { + if (key == null) { + throw new NullPointerException("map key"); + } + java.util.Map map = internalGetLabels().getMap(); + if (!map.containsKey(key)) { + throw new java.lang.IllegalArgumentException(); + } + return map.get(key); + } + + public Builder clearLabels() { + bitField0_ = (bitField0_ & ~0x00000008); + internalGetMutableLabels().getMutableMap().clear(); + return this; + } + /** + * + * + *
+     * The labels assigned to this Secret.
+     *
+     * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+     * of maximum 128 bytes, and must conform to the following PCRE regular
+     * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+     *
+     * Label values must be between 0 and 63 characters long, have a UTF-8
+     * encoding of maximum 128 bytes, and must conform to the following PCRE
+     * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+     *
+     * No more than 64 labels can be assigned to a given resource.
+     * 
+ * + * map<string, string> labels = 4; + */ + public Builder removeLabels(java.lang.String key) { + if (key == null) { + throw new NullPointerException("map key"); + } + internalGetMutableLabels().getMutableMap().remove(key); + return this; + } + /** Use alternate mutation accessors instead. */ + @java.lang.Deprecated + public java.util.Map getMutableLabels() { + bitField0_ |= 0x00000008; + return internalGetMutableLabels().getMutableMap(); + } + /** + * + * + *
+     * The labels assigned to this Secret.
+     *
+     * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+     * of maximum 128 bytes, and must conform to the following PCRE regular
+     * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+     *
+     * Label values must be between 0 and 63 characters long, have a UTF-8
+     * encoding of maximum 128 bytes, and must conform to the following PCRE
+     * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+     *
+     * No more than 64 labels can be assigned to a given resource.
+     * 
+ * + * map<string, string> labels = 4; + */ + public Builder putLabels(java.lang.String key, java.lang.String value) { + if (key == null) { + throw new NullPointerException("map key"); + } + if (value == null) { + throw new NullPointerException("map value"); + } + internalGetMutableLabels().getMutableMap().put(key, value); + bitField0_ |= 0x00000008; + return this; + } + /** + * + * + *
+     * The labels assigned to this Secret.
+     *
+     * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+     * of maximum 128 bytes, and must conform to the following PCRE regular
+     * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+     *
+     * Label values must be between 0 and 63 characters long, have a UTF-8
+     * encoding of maximum 128 bytes, and must conform to the following PCRE
+     * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+     *
+     * No more than 64 labels can be assigned to a given resource.
+     * 
+ * + * map<string, string> labels = 4; + */ + public Builder putAllLabels(java.util.Map values) { + internalGetMutableLabels().getMutableMap().putAll(values); + bitField0_ |= 0x00000008; + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.Secret) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.Secret) + private static final com.google.cloud.secretmanager.v1beta1.Secret DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secretmanager.v1beta1.Secret(); + } + + public static com.google.cloud.secretmanager.v1beta1.Secret getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public Secret parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + Builder builder = newBuilder(); + try { + builder.mergeFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(builder.buildPartial()); + } catch (com.google.protobuf.UninitializedMessageException e) { + throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial()); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e) + .setUnfinishedMessage(builder.buildPartial()); + } + return builder.buildPartial(); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Secret getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretName.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretName.java new file mode 100644 index 000000000000..283110aecc6b --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretName.java @@ -0,0 +1,191 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1; + +import com.google.api.pathtemplate.PathTemplate; +import com.google.api.resourcenames.ResourceName; +import com.google.common.base.Preconditions; +import com.google.common.collect.ImmutableMap; +import java.util.ArrayList; +import java.util.List; +import java.util.Map; +import java.util.Objects; +import javax.annotation.Generated; + +// AUTO-GENERATED DOCUMENTATION AND CLASS. +@Generated("by gapic-generator-java") +public class SecretName implements ResourceName { + private static final PathTemplate PROJECT_SECRET = + PathTemplate.createWithoutUrlEncoding("projects/{project}/secrets/{secret}"); + private volatile Map fieldValuesMap; + private final String project; + private final String secret; + + @Deprecated + protected SecretName() { + project = null; + secret = null; + } + + private SecretName(Builder builder) { + project = Preconditions.checkNotNull(builder.getProject()); + secret = Preconditions.checkNotNull(builder.getSecret()); + } + + public String getProject() { + return project; + } + + public String getSecret() { + return secret; + } + + public static Builder newBuilder() { + return new Builder(); + } + + public Builder toBuilder() { + return new Builder(this); + } + + public static SecretName of(String project, String secret) { + return newBuilder().setProject(project).setSecret(secret).build(); + } + + public static String format(String project, String secret) { + return newBuilder().setProject(project).setSecret(secret).build().toString(); + } + + public static SecretName parse(String formattedString) { + if (formattedString.isEmpty()) { + return null; + } + Map matchMap = + PROJECT_SECRET.validatedMatch( + formattedString, "SecretName.parse: formattedString not in valid format"); + return of(matchMap.get("project"), matchMap.get("secret")); + } + + public static List parseList(List formattedStrings) { + List list = new ArrayList<>(formattedStrings.size()); + for (String formattedString : formattedStrings) { + list.add(parse(formattedString)); + } + return list; + } + + public static List toStringList(List values) { + List list = new ArrayList<>(values.size()); + for (SecretName value : values) { + if (value == null) { + list.add(""); + } else { + list.add(value.toString()); + } + } + return list; + } + + public static boolean isParsableFrom(String formattedString) { + return PROJECT_SECRET.matches(formattedString); + } + + @Override + public Map getFieldValuesMap() { + if (fieldValuesMap == null) { + synchronized (this) { + if (fieldValuesMap == null) { + ImmutableMap.Builder fieldMapBuilder = ImmutableMap.builder(); + if (project != null) { + fieldMapBuilder.put("project", project); + } + if (secret != null) { + fieldMapBuilder.put("secret", secret); + } + fieldValuesMap = fieldMapBuilder.build(); + } + } + } + return fieldValuesMap; + } + + public String getFieldValue(String fieldName) { + return getFieldValuesMap().get(fieldName); + } + + @Override + public String toString() { + return PROJECT_SECRET.instantiate("project", project, "secret", secret); + } + + @Override + public boolean equals(Object o) { + if (o == this) { + return true; + } + if (o != null && getClass() == o.getClass()) { + SecretName that = ((SecretName) o); + return Objects.equals(this.project, that.project) && Objects.equals(this.secret, that.secret); + } + return false; + } + + @Override + public int hashCode() { + int h = 1; + h *= 1000003; + h ^= Objects.hashCode(project); + h *= 1000003; + h ^= Objects.hashCode(secret); + return h; + } + + /** Builder for projects/{project}/secrets/{secret}. */ + public static class Builder { + private String project; + private String secret; + + protected Builder() {} + + public String getProject() { + return project; + } + + public String getSecret() { + return secret; + } + + public Builder setProject(String project) { + this.project = project; + return this; + } + + public Builder setSecret(String secret) { + this.secret = secret; + return this; + } + + private Builder(SecretName secretName) { + this.project = secretName.project; + this.secret = secretName.secret; + } + + public SecretName build() { + return new SecretName(this); + } + } +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretOrBuilder.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretOrBuilder.java new file mode 100644 index 000000000000..d369fbe3020a --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretOrBuilder.java @@ -0,0 +1,244 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/resources.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +public interface SecretOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.Secret) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the format `projects/*/secrets/*`.
+   * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The name. + */ + java.lang.String getName(); + /** + * + * + *
+   * Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the format `projects/*/secrets/*`.
+   * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The bytes for name. + */ + com.google.protobuf.ByteString getNameBytes(); + + /** + * + * + *
+   * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+   *
+   * The replication policy cannot be changed after the Secret has been created.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the replication field is set. + */ + boolean hasReplication(); + /** + * + * + *
+   * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+   *
+   * The replication policy cannot be changed after the Secret has been created.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + * + * @return The replication. + */ + com.google.cloud.secretmanager.v1beta1.Replication getReplication(); + /** + * + * + *
+   * Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret].
+   *
+   * The replication policy cannot be changed after the Secret has been created.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Replication replication = 2 [(.google.api.field_behavior) = IMMUTABLE, (.google.api.field_behavior) = REQUIRED]; + * + */ + com.google.cloud.secretmanager.v1beta1.ReplicationOrBuilder getReplicationOrBuilder(); + + /** + * + * + *
+   * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return Whether the createTime field is set. + */ + boolean hasCreateTime(); + /** + * + * + *
+   * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The createTime. + */ + com.google.protobuf.Timestamp getCreateTime(); + /** + * + * + *
+   * Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + com.google.protobuf.TimestampOrBuilder getCreateTimeOrBuilder(); + + /** + * + * + *
+   * The labels assigned to this Secret.
+   *
+   * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+   * of maximum 128 bytes, and must conform to the following PCRE regular
+   * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+   *
+   * Label values must be between 0 and 63 characters long, have a UTF-8
+   * encoding of maximum 128 bytes, and must conform to the following PCRE
+   * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+   *
+   * No more than 64 labels can be assigned to a given resource.
+   * 
+ * + * map<string, string> labels = 4; + */ + int getLabelsCount(); + /** + * + * + *
+   * The labels assigned to this Secret.
+   *
+   * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+   * of maximum 128 bytes, and must conform to the following PCRE regular
+   * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+   *
+   * Label values must be between 0 and 63 characters long, have a UTF-8
+   * encoding of maximum 128 bytes, and must conform to the following PCRE
+   * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+   *
+   * No more than 64 labels can be assigned to a given resource.
+   * 
+ * + * map<string, string> labels = 4; + */ + boolean containsLabels(java.lang.String key); + /** Use {@link #getLabelsMap()} instead. */ + @java.lang.Deprecated + java.util.Map getLabels(); + /** + * + * + *
+   * The labels assigned to this Secret.
+   *
+   * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+   * of maximum 128 bytes, and must conform to the following PCRE regular
+   * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+   *
+   * Label values must be between 0 and 63 characters long, have a UTF-8
+   * encoding of maximum 128 bytes, and must conform to the following PCRE
+   * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+   *
+   * No more than 64 labels can be assigned to a given resource.
+   * 
+ * + * map<string, string> labels = 4; + */ + java.util.Map getLabelsMap(); + /** + * + * + *
+   * The labels assigned to this Secret.
+   *
+   * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+   * of maximum 128 bytes, and must conform to the following PCRE regular
+   * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+   *
+   * Label values must be between 0 and 63 characters long, have a UTF-8
+   * encoding of maximum 128 bytes, and must conform to the following PCRE
+   * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+   *
+   * No more than 64 labels can be assigned to a given resource.
+   * 
+ * + * map<string, string> labels = 4; + */ + /* nullable */ + java.lang.String getLabelsOrDefault( + java.lang.String key, + /* nullable */ + java.lang.String defaultValue); + /** + * + * + *
+   * The labels assigned to this Secret.
+   *
+   * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+   * of maximum 128 bytes, and must conform to the following PCRE regular
+   * expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}`
+   *
+   * Label values must be between 0 and 63 characters long, have a UTF-8
+   * encoding of maximum 128 bytes, and must conform to the following PCRE
+   * regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+   *
+   * No more than 64 labels can be assigned to a given resource.
+   * 
+ * + * map<string, string> labels = 4; + */ + java.lang.String getLabelsOrThrow(java.lang.String key); +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretPayload.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretPayload.java new file mode 100644 index 000000000000..bf9ff477754b --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretPayload.java @@ -0,0 +1,541 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/resources.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +/** + * + * + *
+ * A secret payload resource in the Secret Manager API. This contains the
+ * sensitive secret data that is associated with a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.SecretPayload} + */ +public final class SecretPayload extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.SecretPayload) + SecretPayloadOrBuilder { + private static final long serialVersionUID = 0L; + // Use SecretPayload.newBuilder() to construct. + private SecretPayload(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private SecretPayload() { + data_ = com.google.protobuf.ByteString.EMPTY; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new SecretPayload(); + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_SecretPayload_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_SecretPayload_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.SecretPayload.class, + com.google.cloud.secretmanager.v1beta1.SecretPayload.Builder.class); + } + + public static final int DATA_FIELD_NUMBER = 1; + private com.google.protobuf.ByteString data_ = com.google.protobuf.ByteString.EMPTY; + /** + * + * + *
+   * The secret data. Must be no larger than 64KiB.
+   * 
+ * + * bytes data = 1; + * + * @return The data. + */ + @java.lang.Override + public com.google.protobuf.ByteString getData() { + return data_; + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!data_.isEmpty()) { + output.writeBytes(1, data_); + } + getUnknownFields().writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!data_.isEmpty()) { + size += com.google.protobuf.CodedOutputStream.computeBytesSize(1, data_); + } + size += getUnknownFields().getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secretmanager.v1beta1.SecretPayload)) { + return super.equals(obj); + } + com.google.cloud.secretmanager.v1beta1.SecretPayload other = + (com.google.cloud.secretmanager.v1beta1.SecretPayload) obj; + + if (!getData().equals(other.getData())) return false; + if (!getUnknownFields().equals(other.getUnknownFields())) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + DATA_FIELD_NUMBER; + hash = (53 * hash) + getData().hashCode(); + hash = (29 * hash) + getUnknownFields().hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secretmanager.v1beta1.SecretPayload parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretPayload parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretPayload parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretPayload parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretPayload parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretPayload parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretPayload parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretPayload parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretPayload parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretPayload parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretPayload parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretPayload parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder(com.google.cloud.secretmanager.v1beta1.SecretPayload prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * A secret payload resource in the Secret Manager API. This contains the
+   * sensitive secret data that is associated with a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.SecretPayload} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.SecretPayload) + com.google.cloud.secretmanager.v1beta1.SecretPayloadOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_SecretPayload_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_SecretPayload_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.SecretPayload.class, + com.google.cloud.secretmanager.v1beta1.SecretPayload.Builder.class); + } + + // Construct using com.google.cloud.secretmanager.v1beta1.SecretPayload.newBuilder() + private Builder() {} + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + } + + @java.lang.Override + public Builder clear() { + super.clear(); + bitField0_ = 0; + data_ = com.google.protobuf.ByteString.EMPTY; + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_SecretPayload_descriptor; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.SecretPayload getDefaultInstanceForType() { + return com.google.cloud.secretmanager.v1beta1.SecretPayload.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.SecretPayload build() { + com.google.cloud.secretmanager.v1beta1.SecretPayload result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.SecretPayload buildPartial() { + com.google.cloud.secretmanager.v1beta1.SecretPayload result = + new com.google.cloud.secretmanager.v1beta1.SecretPayload(this); + if (bitField0_ != 0) { + buildPartial0(result); + } + onBuilt(); + return result; + } + + private void buildPartial0(com.google.cloud.secretmanager.v1beta1.SecretPayload result) { + int from_bitField0_ = bitField0_; + if (((from_bitField0_ & 0x00000001) != 0)) { + result.data_ = data_; + } + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secretmanager.v1beta1.SecretPayload) { + return mergeFrom((com.google.cloud.secretmanager.v1beta1.SecretPayload) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secretmanager.v1beta1.SecretPayload other) { + if (other == com.google.cloud.secretmanager.v1beta1.SecretPayload.getDefaultInstance()) + return this; + if (other.getData() != com.google.protobuf.ByteString.EMPTY) { + setData(other.getData()); + } + this.mergeUnknownFields(other.getUnknownFields()); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + data_ = input.readBytes(); + bitField0_ |= 0x00000001; + break; + } // case 10 + default: + { + if (!super.parseUnknownField(input, extensionRegistry, tag)) { + done = true; // was an endgroup tag + } + break; + } // default: + } // switch (tag) + } // while (!done) + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.unwrapIOException(); + } finally { + onChanged(); + } // finally + return this; + } + + private int bitField0_; + + private com.google.protobuf.ByteString data_ = com.google.protobuf.ByteString.EMPTY; + /** + * + * + *
+     * The secret data. Must be no larger than 64KiB.
+     * 
+ * + * bytes data = 1; + * + * @return The data. + */ + @java.lang.Override + public com.google.protobuf.ByteString getData() { + return data_; + } + /** + * + * + *
+     * The secret data. Must be no larger than 64KiB.
+     * 
+ * + * bytes data = 1; + * + * @param value The data to set. + * @return This builder for chaining. + */ + public Builder setData(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + data_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + /** + * + * + *
+     * The secret data. Must be no larger than 64KiB.
+     * 
+ * + * bytes data = 1; + * + * @return This builder for chaining. + */ + public Builder clearData() { + bitField0_ = (bitField0_ & ~0x00000001); + data_ = getDefaultInstance().getData(); + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.SecretPayload) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.SecretPayload) + private static final com.google.cloud.secretmanager.v1beta1.SecretPayload DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secretmanager.v1beta1.SecretPayload(); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretPayload getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public SecretPayload parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + Builder builder = newBuilder(); + try { + builder.mergeFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(builder.buildPartial()); + } catch (com.google.protobuf.UninitializedMessageException e) { + throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial()); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e) + .setUnfinishedMessage(builder.buildPartial()); + } + return builder.buildPartial(); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.SecretPayload getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretPayloadOrBuilder.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretPayloadOrBuilder.java new file mode 100644 index 000000000000..59f0c8be01d0 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretPayloadOrBuilder.java @@ -0,0 +1,39 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/resources.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +public interface SecretPayloadOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.SecretPayload) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * The secret data. Must be no larger than 64KiB.
+   * 
+ * + * bytes data = 1; + * + * @return The data. + */ + com.google.protobuf.ByteString getData(); +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretVersion.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretVersion.java new file mode 100644 index 000000000000..31b411721379 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretVersion.java @@ -0,0 +1,1616 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/resources.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +/** + * + * + *
+ * A secret version resource in the Secret Manager API.
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.SecretVersion} + */ +public final class SecretVersion extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.SecretVersion) + SecretVersionOrBuilder { + private static final long serialVersionUID = 0L; + // Use SecretVersion.newBuilder() to construct. + private SecretVersion(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private SecretVersion() { + name_ = ""; + state_ = 0; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new SecretVersion(); + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_SecretVersion_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_SecretVersion_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.SecretVersion.class, + com.google.cloud.secretmanager.v1beta1.SecretVersion.Builder.class); + } + + /** + * + * + *
+   * The state of a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion], indicating if it can be accessed.
+   * 
+ * + * Protobuf enum {@code google.cloud.secrets.v1beta1.SecretVersion.State} + */ + public enum State implements com.google.protobuf.ProtocolMessageEnum { + /** + * + * + *
+     * Not specified. This value is unused and invalid.
+     * 
+ * + * STATE_UNSPECIFIED = 0; + */ + STATE_UNSPECIFIED(0), + /** + * + * + *
+     * The [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] may be accessed.
+     * 
+ * + * ENABLED = 1; + */ + ENABLED(1), + /** + * + * + *
+     * The [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] may not be accessed, but the secret data
+     * is still available and can be placed back into the [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED]
+     * state.
+     * 
+ * + * DISABLED = 2; + */ + DISABLED(2), + /** + * + * + *
+     * The [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] is destroyed and the secret data is no longer
+     * stored. A version may not leave this state once entered.
+     * 
+ * + * DESTROYED = 3; + */ + DESTROYED(3), + UNRECOGNIZED(-1), + ; + + /** + * + * + *
+     * Not specified. This value is unused and invalid.
+     * 
+ * + * STATE_UNSPECIFIED = 0; + */ + public static final int STATE_UNSPECIFIED_VALUE = 0; + /** + * + * + *
+     * The [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] may be accessed.
+     * 
+ * + * ENABLED = 1; + */ + public static final int ENABLED_VALUE = 1; + /** + * + * + *
+     * The [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] may not be accessed, but the secret data
+     * is still available and can be placed back into the [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED]
+     * state.
+     * 
+ * + * DISABLED = 2; + */ + public static final int DISABLED_VALUE = 2; + /** + * + * + *
+     * The [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] is destroyed and the secret data is no longer
+     * stored. A version may not leave this state once entered.
+     * 
+ * + * DESTROYED = 3; + */ + public static final int DESTROYED_VALUE = 3; + + public final int getNumber() { + if (this == UNRECOGNIZED) { + throw new java.lang.IllegalArgumentException( + "Can't get the number of an unknown enum value."); + } + return value; + } + + /** + * @param value The numeric wire value of the corresponding enum entry. + * @return The enum associated with the given numeric wire value. + * @deprecated Use {@link #forNumber(int)} instead. + */ + @java.lang.Deprecated + public static State valueOf(int value) { + return forNumber(value); + } + + /** + * @param value The numeric wire value of the corresponding enum entry. + * @return The enum associated with the given numeric wire value. + */ + public static State forNumber(int value) { + switch (value) { + case 0: + return STATE_UNSPECIFIED; + case 1: + return ENABLED; + case 2: + return DISABLED; + case 3: + return DESTROYED; + default: + return null; + } + } + + public static com.google.protobuf.Internal.EnumLiteMap internalGetValueMap() { + return internalValueMap; + } + + private static final com.google.protobuf.Internal.EnumLiteMap internalValueMap = + new com.google.protobuf.Internal.EnumLiteMap() { + public State findValueByNumber(int number) { + return State.forNumber(number); + } + }; + + public final com.google.protobuf.Descriptors.EnumValueDescriptor getValueDescriptor() { + if (this == UNRECOGNIZED) { + throw new java.lang.IllegalStateException( + "Can't get the descriptor of an unrecognized enum value."); + } + return getDescriptor().getValues().get(ordinal()); + } + + public final com.google.protobuf.Descriptors.EnumDescriptor getDescriptorForType() { + return getDescriptor(); + } + + public static final com.google.protobuf.Descriptors.EnumDescriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.SecretVersion.getDescriptor() + .getEnumTypes() + .get(0); + } + + private static final State[] VALUES = values(); + + public static State valueOf(com.google.protobuf.Descriptors.EnumValueDescriptor desc) { + if (desc.getType() != getDescriptor()) { + throw new java.lang.IllegalArgumentException("EnumValueDescriptor is not for this type."); + } + if (desc.getIndex() == -1) { + return UNRECOGNIZED; + } + return VALUES[desc.getIndex()]; + } + + private final int value; + + private State(int value) { + this.value = value; + } + + // @@protoc_insertion_point(enum_scope:google.cloud.secrets.v1beta1.SecretVersion.State) + } + + private int bitField0_; + public static final int NAME_FIELD_NUMBER = 1; + + @SuppressWarnings("serial") + private volatile java.lang.Object name_ = ""; + /** + * + * + *
+   * Output only. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the
+   * format `projects/*/secrets/*/versions/*`.
+   *
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] IDs in a [Secret][google.cloud.secrets.v1beta1.Secret] start at 1 and
+   * are incremented for each subsequent version of the secret.
+   * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The name. + */ + @java.lang.Override + public java.lang.String getName() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + return (java.lang.String) ref; + } else { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } + } + /** + * + * + *
+   * Output only. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the
+   * format `projects/*/secrets/*/versions/*`.
+   *
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] IDs in a [Secret][google.cloud.secrets.v1beta1.Secret] start at 1 and
+   * are incremented for each subsequent version of the secret.
+   * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The bytes for name. + */ + @java.lang.Override + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof java.lang.String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + + public static final int CREATE_TIME_FIELD_NUMBER = 2; + private com.google.protobuf.Timestamp createTime_; + /** + * + * + *
+   * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return Whether the createTime field is set. + */ + @java.lang.Override + public boolean hasCreateTime() { + return ((bitField0_ & 0x00000001) != 0); + } + /** + * + * + *
+   * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The createTime. + */ + @java.lang.Override + public com.google.protobuf.Timestamp getCreateTime() { + return createTime_ == null ? com.google.protobuf.Timestamp.getDefaultInstance() : createTime_; + } + /** + * + * + *
+   * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + @java.lang.Override + public com.google.protobuf.TimestampOrBuilder getCreateTimeOrBuilder() { + return createTime_ == null ? com.google.protobuf.Timestamp.getDefaultInstance() : createTime_; + } + + public static final int DESTROY_TIME_FIELD_NUMBER = 3; + private com.google.protobuf.Timestamp destroyTime_; + /** + * + * + *
+   * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+   * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+   * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+   * 
+ * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return Whether the destroyTime field is set. + */ + @java.lang.Override + public boolean hasDestroyTime() { + return ((bitField0_ & 0x00000002) != 0); + } + /** + * + * + *
+   * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+   * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+   * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+   * 
+ * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The destroyTime. + */ + @java.lang.Override + public com.google.protobuf.Timestamp getDestroyTime() { + return destroyTime_ == null ? com.google.protobuf.Timestamp.getDefaultInstance() : destroyTime_; + } + /** + * + * + *
+   * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+   * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+   * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+   * 
+ * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + @java.lang.Override + public com.google.protobuf.TimestampOrBuilder getDestroyTimeOrBuilder() { + return destroyTime_ == null ? com.google.protobuf.Timestamp.getDefaultInstance() : destroyTime_; + } + + public static final int STATE_FIELD_NUMBER = 4; + private int state_ = 0; + /** + * + * + *
+   * Output only. The current state of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretVersion.State state = 4 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The enum numeric value on the wire for state. + */ + @java.lang.Override + public int getStateValue() { + return state_; + } + /** + * + * + *
+   * Output only. The current state of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretVersion.State state = 4 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The state. + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.SecretVersion.State getState() { + com.google.cloud.secretmanager.v1beta1.SecretVersion.State result = + com.google.cloud.secretmanager.v1beta1.SecretVersion.State.forNumber(state_); + return result == null + ? com.google.cloud.secretmanager.v1beta1.SecretVersion.State.UNRECOGNIZED + : result; + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { + com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_); + } + if (((bitField0_ & 0x00000001) != 0)) { + output.writeMessage(2, getCreateTime()); + } + if (((bitField0_ & 0x00000002) != 0)) { + output.writeMessage(3, getDestroyTime()); + } + if (state_ + != com.google.cloud.secretmanager.v1beta1.SecretVersion.State.STATE_UNSPECIFIED + .getNumber()) { + output.writeEnum(4, state_); + } + getUnknownFields().writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) { + size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, name_); + } + if (((bitField0_ & 0x00000001) != 0)) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(2, getCreateTime()); + } + if (((bitField0_ & 0x00000002) != 0)) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(3, getDestroyTime()); + } + if (state_ + != com.google.cloud.secretmanager.v1beta1.SecretVersion.State.STATE_UNSPECIFIED + .getNumber()) { + size += com.google.protobuf.CodedOutputStream.computeEnumSize(4, state_); + } + size += getUnknownFields().getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secretmanager.v1beta1.SecretVersion)) { + return super.equals(obj); + } + com.google.cloud.secretmanager.v1beta1.SecretVersion other = + (com.google.cloud.secretmanager.v1beta1.SecretVersion) obj; + + if (!getName().equals(other.getName())) return false; + if (hasCreateTime() != other.hasCreateTime()) return false; + if (hasCreateTime()) { + if (!getCreateTime().equals(other.getCreateTime())) return false; + } + if (hasDestroyTime() != other.hasDestroyTime()) return false; + if (hasDestroyTime()) { + if (!getDestroyTime().equals(other.getDestroyTime())) return false; + } + if (state_ != other.state_) return false; + if (!getUnknownFields().equals(other.getUnknownFields())) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + hash = (37 * hash) + NAME_FIELD_NUMBER; + hash = (53 * hash) + getName().hashCode(); + if (hasCreateTime()) { + hash = (37 * hash) + CREATE_TIME_FIELD_NUMBER; + hash = (53 * hash) + getCreateTime().hashCode(); + } + if (hasDestroyTime()) { + hash = (37 * hash) + DESTROY_TIME_FIELD_NUMBER; + hash = (53 * hash) + getDestroyTime().hashCode(); + } + hash = (37 * hash) + STATE_FIELD_NUMBER; + hash = (53 * hash) + state_; + hash = (29 * hash) + getUnknownFields().hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secretmanager.v1beta1.SecretVersion parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretVersion parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretVersion parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretVersion parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretVersion parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretVersion parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretVersion parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretVersion parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretVersion parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretVersion parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretVersion parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretVersion parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder(com.google.cloud.secretmanager.v1beta1.SecretVersion prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * A secret version resource in the Secret Manager API.
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.SecretVersion} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.SecretVersion) + com.google.cloud.secretmanager.v1beta1.SecretVersionOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_SecretVersion_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_SecretVersion_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.SecretVersion.class, + com.google.cloud.secretmanager.v1beta1.SecretVersion.Builder.class); + } + + // Construct using com.google.cloud.secretmanager.v1beta1.SecretVersion.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) { + getCreateTimeFieldBuilder(); + getDestroyTimeFieldBuilder(); + } + } + + @java.lang.Override + public Builder clear() { + super.clear(); + bitField0_ = 0; + name_ = ""; + createTime_ = null; + if (createTimeBuilder_ != null) { + createTimeBuilder_.dispose(); + createTimeBuilder_ = null; + } + destroyTime_ = null; + if (destroyTimeBuilder_ != null) { + destroyTimeBuilder_.dispose(); + destroyTimeBuilder_ = null; + } + state_ = 0; + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secretmanager.v1beta1.ResourcesProto + .internal_static_google_cloud_secrets_v1beta1_SecretVersion_descriptor; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.SecretVersion getDefaultInstanceForType() { + return com.google.cloud.secretmanager.v1beta1.SecretVersion.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.SecretVersion build() { + com.google.cloud.secretmanager.v1beta1.SecretVersion result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.SecretVersion buildPartial() { + com.google.cloud.secretmanager.v1beta1.SecretVersion result = + new com.google.cloud.secretmanager.v1beta1.SecretVersion(this); + if (bitField0_ != 0) { + buildPartial0(result); + } + onBuilt(); + return result; + } + + private void buildPartial0(com.google.cloud.secretmanager.v1beta1.SecretVersion result) { + int from_bitField0_ = bitField0_; + if (((from_bitField0_ & 0x00000001) != 0)) { + result.name_ = name_; + } + int to_bitField0_ = 0; + if (((from_bitField0_ & 0x00000002) != 0)) { + result.createTime_ = createTimeBuilder_ == null ? createTime_ : createTimeBuilder_.build(); + to_bitField0_ |= 0x00000001; + } + if (((from_bitField0_ & 0x00000004) != 0)) { + result.destroyTime_ = + destroyTimeBuilder_ == null ? destroyTime_ : destroyTimeBuilder_.build(); + to_bitField0_ |= 0x00000002; + } + if (((from_bitField0_ & 0x00000008) != 0)) { + result.state_ = state_; + } + result.bitField0_ |= to_bitField0_; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secretmanager.v1beta1.SecretVersion) { + return mergeFrom((com.google.cloud.secretmanager.v1beta1.SecretVersion) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secretmanager.v1beta1.SecretVersion other) { + if (other == com.google.cloud.secretmanager.v1beta1.SecretVersion.getDefaultInstance()) + return this; + if (!other.getName().isEmpty()) { + name_ = other.name_; + bitField0_ |= 0x00000001; + onChanged(); + } + if (other.hasCreateTime()) { + mergeCreateTime(other.getCreateTime()); + } + if (other.hasDestroyTime()) { + mergeDestroyTime(other.getDestroyTime()); + } + if (other.state_ != 0) { + setStateValue(other.getStateValue()); + } + this.mergeUnknownFields(other.getUnknownFields()); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + name_ = input.readStringRequireUtf8(); + bitField0_ |= 0x00000001; + break; + } // case 10 + case 18: + { + input.readMessage(getCreateTimeFieldBuilder().getBuilder(), extensionRegistry); + bitField0_ |= 0x00000002; + break; + } // case 18 + case 26: + { + input.readMessage(getDestroyTimeFieldBuilder().getBuilder(), extensionRegistry); + bitField0_ |= 0x00000004; + break; + } // case 26 + case 32: + { + state_ = input.readEnum(); + bitField0_ |= 0x00000008; + break; + } // case 32 + default: + { + if (!super.parseUnknownField(input, extensionRegistry, tag)) { + done = true; // was an endgroup tag + } + break; + } // default: + } // switch (tag) + } // while (!done) + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.unwrapIOException(); + } finally { + onChanged(); + } // finally + return this; + } + + private int bitField0_; + + private java.lang.Object name_ = ""; + /** + * + * + *
+     * Output only. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the
+     * format `projects/*/secrets/*/versions/*`.
+     *
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] IDs in a [Secret][google.cloud.secrets.v1beta1.Secret] start at 1 and
+     * are incremented for each subsequent version of the secret.
+     * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The name. + */ + public java.lang.String getName() { + java.lang.Object ref = name_; + if (!(ref instanceof java.lang.String)) { + com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; + java.lang.String s = bs.toStringUtf8(); + name_ = s; + return s; + } else { + return (java.lang.String) ref; + } + } + /** + * + * + *
+     * Output only. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the
+     * format `projects/*/secrets/*/versions/*`.
+     *
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] IDs in a [Secret][google.cloud.secrets.v1beta1.Secret] start at 1 and
+     * are incremented for each subsequent version of the secret.
+     * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The bytes for name. + */ + public com.google.protobuf.ByteString getNameBytes() { + java.lang.Object ref = name_; + if (ref instanceof String) { + com.google.protobuf.ByteString b = + com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); + name_ = b; + return b; + } else { + return (com.google.protobuf.ByteString) ref; + } + } + /** + * + * + *
+     * Output only. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the
+     * format `projects/*/secrets/*/versions/*`.
+     *
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] IDs in a [Secret][google.cloud.secrets.v1beta1.Secret] start at 1 and
+     * are incremented for each subsequent version of the secret.
+     * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @param value The name to set. + * @return This builder for chaining. + */ + public Builder setName(java.lang.String value) { + if (value == null) { + throw new NullPointerException(); + } + name_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + /** + * + * + *
+     * Output only. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the
+     * format `projects/*/secrets/*/versions/*`.
+     *
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] IDs in a [Secret][google.cloud.secrets.v1beta1.Secret] start at 1 and
+     * are incremented for each subsequent version of the secret.
+     * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return This builder for chaining. + */ + public Builder clearName() { + name_ = getDefaultInstance().getName(); + bitField0_ = (bitField0_ & ~0x00000001); + onChanged(); + return this; + } + /** + * + * + *
+     * Output only. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the
+     * format `projects/*/secrets/*/versions/*`.
+     *
+     * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] IDs in a [Secret][google.cloud.secrets.v1beta1.Secret] start at 1 and
+     * are incremented for each subsequent version of the secret.
+     * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @param value The bytes for name to set. + * @return This builder for chaining. + */ + public Builder setNameBytes(com.google.protobuf.ByteString value) { + if (value == null) { + throw new NullPointerException(); + } + checkByteStringIsUtf8(value); + name_ = value; + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + + private com.google.protobuf.Timestamp createTime_; + private com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.Timestamp, + com.google.protobuf.Timestamp.Builder, + com.google.protobuf.TimestampOrBuilder> + createTimeBuilder_; + /** + * + * + *
+     * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return Whether the createTime field is set. + */ + public boolean hasCreateTime() { + return ((bitField0_ & 0x00000002) != 0); + } + /** + * + * + *
+     * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The createTime. + */ + public com.google.protobuf.Timestamp getCreateTime() { + if (createTimeBuilder_ == null) { + return createTime_ == null + ? com.google.protobuf.Timestamp.getDefaultInstance() + : createTime_; + } else { + return createTimeBuilder_.getMessage(); + } + } + /** + * + * + *
+     * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder setCreateTime(com.google.protobuf.Timestamp value) { + if (createTimeBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + createTime_ = value; + } else { + createTimeBuilder_.setMessage(value); + } + bitField0_ |= 0x00000002; + onChanged(); + return this; + } + /** + * + * + *
+     * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder setCreateTime(com.google.protobuf.Timestamp.Builder builderForValue) { + if (createTimeBuilder_ == null) { + createTime_ = builderForValue.build(); + } else { + createTimeBuilder_.setMessage(builderForValue.build()); + } + bitField0_ |= 0x00000002; + onChanged(); + return this; + } + /** + * + * + *
+     * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder mergeCreateTime(com.google.protobuf.Timestamp value) { + if (createTimeBuilder_ == null) { + if (((bitField0_ & 0x00000002) != 0) + && createTime_ != null + && createTime_ != com.google.protobuf.Timestamp.getDefaultInstance()) { + getCreateTimeBuilder().mergeFrom(value); + } else { + createTime_ = value; + } + } else { + createTimeBuilder_.mergeFrom(value); + } + if (createTime_ != null) { + bitField0_ |= 0x00000002; + onChanged(); + } + return this; + } + /** + * + * + *
+     * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder clearCreateTime() { + bitField0_ = (bitField0_ & ~0x00000002); + createTime_ = null; + if (createTimeBuilder_ != null) { + createTimeBuilder_.dispose(); + createTimeBuilder_ = null; + } + onChanged(); + return this; + } + /** + * + * + *
+     * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public com.google.protobuf.Timestamp.Builder getCreateTimeBuilder() { + bitField0_ |= 0x00000002; + onChanged(); + return getCreateTimeFieldBuilder().getBuilder(); + } + /** + * + * + *
+     * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public com.google.protobuf.TimestampOrBuilder getCreateTimeOrBuilder() { + if (createTimeBuilder_ != null) { + return createTimeBuilder_.getMessageOrBuilder(); + } else { + return createTime_ == null + ? com.google.protobuf.Timestamp.getDefaultInstance() + : createTime_; + } + } + /** + * + * + *
+     * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+     * 
+ * + * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + private com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.Timestamp, + com.google.protobuf.Timestamp.Builder, + com.google.protobuf.TimestampOrBuilder> + getCreateTimeFieldBuilder() { + if (createTimeBuilder_ == null) { + createTimeBuilder_ = + new com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.Timestamp, + com.google.protobuf.Timestamp.Builder, + com.google.protobuf.TimestampOrBuilder>( + getCreateTime(), getParentForChildren(), isClean()); + createTime_ = null; + } + return createTimeBuilder_; + } + + private com.google.protobuf.Timestamp destroyTime_; + private com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.Timestamp, + com.google.protobuf.Timestamp.Builder, + com.google.protobuf.TimestampOrBuilder> + destroyTimeBuilder_; + /** + * + * + *
+     * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+     * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+     * 
+ * + * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return Whether the destroyTime field is set. + */ + public boolean hasDestroyTime() { + return ((bitField0_ & 0x00000004) != 0); + } + /** + * + * + *
+     * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+     * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+     * 
+ * + * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The destroyTime. + */ + public com.google.protobuf.Timestamp getDestroyTime() { + if (destroyTimeBuilder_ == null) { + return destroyTime_ == null + ? com.google.protobuf.Timestamp.getDefaultInstance() + : destroyTime_; + } else { + return destroyTimeBuilder_.getMessage(); + } + } + /** + * + * + *
+     * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+     * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+     * 
+ * + * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder setDestroyTime(com.google.protobuf.Timestamp value) { + if (destroyTimeBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + destroyTime_ = value; + } else { + destroyTimeBuilder_.setMessage(value); + } + bitField0_ |= 0x00000004; + onChanged(); + return this; + } + /** + * + * + *
+     * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+     * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+     * 
+ * + * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder setDestroyTime(com.google.protobuf.Timestamp.Builder builderForValue) { + if (destroyTimeBuilder_ == null) { + destroyTime_ = builderForValue.build(); + } else { + destroyTimeBuilder_.setMessage(builderForValue.build()); + } + bitField0_ |= 0x00000004; + onChanged(); + return this; + } + /** + * + * + *
+     * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+     * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+     * 
+ * + * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder mergeDestroyTime(com.google.protobuf.Timestamp value) { + if (destroyTimeBuilder_ == null) { + if (((bitField0_ & 0x00000004) != 0) + && destroyTime_ != null + && destroyTime_ != com.google.protobuf.Timestamp.getDefaultInstance()) { + getDestroyTimeBuilder().mergeFrom(value); + } else { + destroyTime_ = value; + } + } else { + destroyTimeBuilder_.mergeFrom(value); + } + if (destroyTime_ != null) { + bitField0_ |= 0x00000004; + onChanged(); + } + return this; + } + /** + * + * + *
+     * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+     * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+     * 
+ * + * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public Builder clearDestroyTime() { + bitField0_ = (bitField0_ & ~0x00000004); + destroyTime_ = null; + if (destroyTimeBuilder_ != null) { + destroyTimeBuilder_.dispose(); + destroyTimeBuilder_ = null; + } + onChanged(); + return this; + } + /** + * + * + *
+     * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+     * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+     * 
+ * + * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public com.google.protobuf.Timestamp.Builder getDestroyTimeBuilder() { + bitField0_ |= 0x00000004; + onChanged(); + return getDestroyTimeFieldBuilder().getBuilder(); + } + /** + * + * + *
+     * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+     * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+     * 
+ * + * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + public com.google.protobuf.TimestampOrBuilder getDestroyTimeOrBuilder() { + if (destroyTimeBuilder_ != null) { + return destroyTimeBuilder_.getMessageOrBuilder(); + } else { + return destroyTime_ == null + ? com.google.protobuf.Timestamp.getDefaultInstance() + : destroyTime_; + } + } + /** + * + * + *
+     * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+     * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+     * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+     * 
+ * + * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + private com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.Timestamp, + com.google.protobuf.Timestamp.Builder, + com.google.protobuf.TimestampOrBuilder> + getDestroyTimeFieldBuilder() { + if (destroyTimeBuilder_ == null) { + destroyTimeBuilder_ = + new com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.Timestamp, + com.google.protobuf.Timestamp.Builder, + com.google.protobuf.TimestampOrBuilder>( + getDestroyTime(), getParentForChildren(), isClean()); + destroyTime_ = null; + } + return destroyTimeBuilder_; + } + + private int state_ = 0; + /** + * + * + *
+     * Output only. The current state of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretVersion.State state = 4 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The enum numeric value on the wire for state. + */ + @java.lang.Override + public int getStateValue() { + return state_; + } + /** + * + * + *
+     * Output only. The current state of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretVersion.State state = 4 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @param value The enum numeric value on the wire for state to set. + * @return This builder for chaining. + */ + public Builder setStateValue(int value) { + state_ = value; + bitField0_ |= 0x00000008; + onChanged(); + return this; + } + /** + * + * + *
+     * Output only. The current state of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretVersion.State state = 4 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The state. + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.SecretVersion.State getState() { + com.google.cloud.secretmanager.v1beta1.SecretVersion.State result = + com.google.cloud.secretmanager.v1beta1.SecretVersion.State.forNumber(state_); + return result == null + ? com.google.cloud.secretmanager.v1beta1.SecretVersion.State.UNRECOGNIZED + : result; + } + /** + * + * + *
+     * Output only. The current state of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretVersion.State state = 4 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @param value The state to set. + * @return This builder for chaining. + */ + public Builder setState(com.google.cloud.secretmanager.v1beta1.SecretVersion.State value) { + if (value == null) { + throw new NullPointerException(); + } + bitField0_ |= 0x00000008; + state_ = value.getNumber(); + onChanged(); + return this; + } + /** + * + * + *
+     * Output only. The current state of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretVersion.State state = 4 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return This builder for chaining. + */ + public Builder clearState() { + bitField0_ = (bitField0_ & ~0x00000008); + state_ = 0; + onChanged(); + return this; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.SecretVersion) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.SecretVersion) + private static final com.google.cloud.secretmanager.v1beta1.SecretVersion DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secretmanager.v1beta1.SecretVersion(); + } + + public static com.google.cloud.secretmanager.v1beta1.SecretVersion getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public SecretVersion parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + Builder builder = newBuilder(); + try { + builder.mergeFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(builder.buildPartial()); + } catch (com.google.protobuf.UninitializedMessageException e) { + throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial()); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e) + .setUnfinishedMessage(builder.buildPartial()); + } + return builder.buildPartial(); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.SecretVersion getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretVersionName.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretVersionName.java new file mode 100644 index 000000000000..80e70e6ac2e7 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretVersionName.java @@ -0,0 +1,227 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1; + +import com.google.api.pathtemplate.PathTemplate; +import com.google.api.resourcenames.ResourceName; +import com.google.common.base.Preconditions; +import com.google.common.collect.ImmutableMap; +import java.util.ArrayList; +import java.util.List; +import java.util.Map; +import java.util.Objects; +import javax.annotation.Generated; + +// AUTO-GENERATED DOCUMENTATION AND CLASS. +@Generated("by gapic-generator-java") +public class SecretVersionName implements ResourceName { + private static final PathTemplate PROJECT_SECRET_SECRET_VERSION = + PathTemplate.createWithoutUrlEncoding( + "projects/{project}/secrets/{secret}/versions/{secret_version}"); + private volatile Map fieldValuesMap; + private final String project; + private final String secret; + private final String secretVersion; + + @Deprecated + protected SecretVersionName() { + project = null; + secret = null; + secretVersion = null; + } + + private SecretVersionName(Builder builder) { + project = Preconditions.checkNotNull(builder.getProject()); + secret = Preconditions.checkNotNull(builder.getSecret()); + secretVersion = Preconditions.checkNotNull(builder.getSecretVersion()); + } + + public String getProject() { + return project; + } + + public String getSecret() { + return secret; + } + + public String getSecretVersion() { + return secretVersion; + } + + public static Builder newBuilder() { + return new Builder(); + } + + public Builder toBuilder() { + return new Builder(this); + } + + public static SecretVersionName of(String project, String secret, String secretVersion) { + return newBuilder() + .setProject(project) + .setSecret(secret) + .setSecretVersion(secretVersion) + .build(); + } + + public static String format(String project, String secret, String secretVersion) { + return newBuilder() + .setProject(project) + .setSecret(secret) + .setSecretVersion(secretVersion) + .build() + .toString(); + } + + public static SecretVersionName parse(String formattedString) { + if (formattedString.isEmpty()) { + return null; + } + Map matchMap = + PROJECT_SECRET_SECRET_VERSION.validatedMatch( + formattedString, "SecretVersionName.parse: formattedString not in valid format"); + return of(matchMap.get("project"), matchMap.get("secret"), matchMap.get("secret_version")); + } + + public static List parseList(List formattedStrings) { + List list = new ArrayList<>(formattedStrings.size()); + for (String formattedString : formattedStrings) { + list.add(parse(formattedString)); + } + return list; + } + + public static List toStringList(List values) { + List list = new ArrayList<>(values.size()); + for (SecretVersionName value : values) { + if (value == null) { + list.add(""); + } else { + list.add(value.toString()); + } + } + return list; + } + + public static boolean isParsableFrom(String formattedString) { + return PROJECT_SECRET_SECRET_VERSION.matches(formattedString); + } + + @Override + public Map getFieldValuesMap() { + if (fieldValuesMap == null) { + synchronized (this) { + if (fieldValuesMap == null) { + ImmutableMap.Builder fieldMapBuilder = ImmutableMap.builder(); + if (project != null) { + fieldMapBuilder.put("project", project); + } + if (secret != null) { + fieldMapBuilder.put("secret", secret); + } + if (secretVersion != null) { + fieldMapBuilder.put("secret_version", secretVersion); + } + fieldValuesMap = fieldMapBuilder.build(); + } + } + } + return fieldValuesMap; + } + + public String getFieldValue(String fieldName) { + return getFieldValuesMap().get(fieldName); + } + + @Override + public String toString() { + return PROJECT_SECRET_SECRET_VERSION.instantiate( + "project", project, "secret", secret, "secret_version", secretVersion); + } + + @Override + public boolean equals(Object o) { + if (o == this) { + return true; + } + if (o != null && getClass() == o.getClass()) { + SecretVersionName that = ((SecretVersionName) o); + return Objects.equals(this.project, that.project) + && Objects.equals(this.secret, that.secret) + && Objects.equals(this.secretVersion, that.secretVersion); + } + return false; + } + + @Override + public int hashCode() { + int h = 1; + h *= 1000003; + h ^= Objects.hashCode(project); + h *= 1000003; + h ^= Objects.hashCode(secret); + h *= 1000003; + h ^= Objects.hashCode(secretVersion); + return h; + } + + /** Builder for projects/{project}/secrets/{secret}/versions/{secret_version}. */ + public static class Builder { + private String project; + private String secret; + private String secretVersion; + + protected Builder() {} + + public String getProject() { + return project; + } + + public String getSecret() { + return secret; + } + + public String getSecretVersion() { + return secretVersion; + } + + public Builder setProject(String project) { + this.project = project; + return this; + } + + public Builder setSecret(String secret) { + this.secret = secret; + return this; + } + + public Builder setSecretVersion(String secretVersion) { + this.secretVersion = secretVersion; + return this; + } + + private Builder(SecretVersionName secretVersionName) { + this.project = secretVersionName.project; + this.secret = secretVersionName.secret; + this.secretVersion = secretVersionName.secretVersion; + } + + public SecretVersionName build() { + return new SecretVersionName(this); + } + } +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretVersionOrBuilder.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretVersionOrBuilder.java new file mode 100644 index 000000000000..9b681bff3e62 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/SecretVersionOrBuilder.java @@ -0,0 +1,170 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/resources.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +public interface SecretVersionOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.SecretVersion) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Output only. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the
+   * format `projects/*/secrets/*/versions/*`.
+   *
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] IDs in a [Secret][google.cloud.secrets.v1beta1.Secret] start at 1 and
+   * are incremented for each subsequent version of the secret.
+   * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The name. + */ + java.lang.String getName(); + /** + * + * + *
+   * Output only. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the
+   * format `projects/*/secrets/*/versions/*`.
+   *
+   * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] IDs in a [Secret][google.cloud.secrets.v1beta1.Secret] start at 1 and
+   * are incremented for each subsequent version of the secret.
+   * 
+ * + * string name = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * @return The bytes for name. + */ + com.google.protobuf.ByteString getNameBytes(); + + /** + * + * + *
+   * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return Whether the createTime field is set. + */ + boolean hasCreateTime(); + /** + * + * + *
+   * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The createTime. + */ + com.google.protobuf.Timestamp getCreateTime(); + /** + * + * + *
+   * Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created.
+   * 
+ * + * .google.protobuf.Timestamp create_time = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + com.google.protobuf.TimestampOrBuilder getCreateTimeOrBuilder(); + + /** + * + * + *
+   * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+   * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+   * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+   * 
+ * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return Whether the destroyTime field is set. + */ + boolean hasDestroyTime(); + /** + * + * + *
+   * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+   * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+   * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+   * 
+ * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The destroyTime. + */ + com.google.protobuf.Timestamp getDestroyTime(); + /** + * + * + *
+   * Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed.
+   * Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is
+   * [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED].
+   * 
+ * + * .google.protobuf.Timestamp destroy_time = 3 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + */ + com.google.protobuf.TimestampOrBuilder getDestroyTimeOrBuilder(); + + /** + * + * + *
+   * Output only. The current state of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretVersion.State state = 4 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The enum numeric value on the wire for state. + */ + int getStateValue(); + /** + * + * + *
+   * Output only. The current state of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.SecretVersion.State state = 4 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * + * + * @return The state. + */ + com.google.cloud.secretmanager.v1beta1.SecretVersion.State getState(); +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ServiceProto.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ServiceProto.java new file mode 100644 index 000000000000..f5009caef78d --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/ServiceProto.java @@ -0,0 +1,388 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +public final class ServiceProto { + private ServiceProto() {} + + public static void registerAllExtensions(com.google.protobuf.ExtensionRegistryLite registry) {} + + public static void registerAllExtensions(com.google.protobuf.ExtensionRegistry registry) { + registerAllExtensions((com.google.protobuf.ExtensionRegistryLite) registry); + } + + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_ListSecretsRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_ListSecretsRequest_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_ListSecretsResponse_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_ListSecretsResponse_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_CreateSecretRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_CreateSecretRequest_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_AddSecretVersionRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_AddSecretVersionRequest_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_GetSecretRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_GetSecretRequest_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsRequest_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsResponse_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsResponse_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_GetSecretVersionRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_GetSecretVersionRequest_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_UpdateSecretRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_UpdateSecretRequest_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionRequest_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionResponse_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionResponse_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_DeleteSecretRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_DeleteSecretRequest_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_DisableSecretVersionRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_DisableSecretVersionRequest_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_EnableSecretVersionRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_EnableSecretVersionRequest_fieldAccessorTable; + static final com.google.protobuf.Descriptors.Descriptor + internal_static_google_cloud_secrets_v1beta1_DestroySecretVersionRequest_descriptor; + static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internal_static_google_cloud_secrets_v1beta1_DestroySecretVersionRequest_fieldAccessorTable; + + public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() { + return descriptor; + } + + private static com.google.protobuf.Descriptors.FileDescriptor descriptor; + + static { + java.lang.String[] descriptorData = { + "\n*google/cloud/secrets/v1beta1/service.p" + + "roto\022\034google.cloud.secrets.v1beta1\032\034goog" + + "le/api/annotations.proto\032\027google/api/cli" + + "ent.proto\032\037google/api/field_behavior.pro" + + "to\032\031google/api/resource.proto\032,google/cl" + + "oud/secrets/v1beta1/resources.proto\032\036goo" + + "gle/iam/v1/iam_policy.proto\032\032google/iam/" + + "v1/policy.proto\032\033google/protobuf/empty.p" + + "roto\032 google/protobuf/field_mask.proto\"\212" + + "\001\n\022ListSecretsRequest\022C\n\006parent\030\001 \001(\tB3\340" + + "A\002\372A-\n+cloudresourcemanager.googleapis.c" + + "om/Project\022\026\n\tpage_size\030\002 \001(\005B\003\340A\001\022\027\n\npa" + + "ge_token\030\003 \001(\tB\003\340A\001\"y\n\023ListSecretsRespon" + + "se\0225\n\007secrets\030\001 \003(\0132$.google.cloud.secre" + + "ts.v1beta1.Secret\022\027\n\017next_page_token\030\002 \001" + + "(\t\022\022\n\ntotal_size\030\003 \001(\005\"\255\001\n\023CreateSecretR" + + "equest\022C\n\006parent\030\001 \001(\tB3\340A\002\372A-\n+cloudres" + + "ourcemanager.googleapis.com/Project\022\026\n\ts" + + "ecret_id\030\002 \001(\tB\003\340A\002\0229\n\006secret\030\003 \001(\0132$.go" + + "ogle.cloud.secrets.v1beta1.SecretB\003\340A\002\"\231" + + "\001\n\027AddSecretVersionRequest\022;\n\006parent\030\001 \001" + + "(\tB+\340A\002\372A%\n#secretmanager.googleapis.com" + + "/Secret\022A\n\007payload\030\002 \001(\0132+.google.cloud." + + "secrets.v1beta1.SecretPayloadB\003\340A\002\"M\n\020Ge" + + "tSecretRequest\0229\n\004name\030\001 \001(\tB+\340A\002\372A%\n#se" + + "cretmanager.googleapis.com/Secret\"\211\001\n\031Li" + + "stSecretVersionsRequest\022;\n\006parent\030\001 \001(\tB" + + "+\340A\002\372A%\n#secretmanager.googleapis.com/Se" + + "cret\022\026\n\tpage_size\030\002 \001(\005B\003\340A\001\022\027\n\npage_tok" + + "en\030\003 \001(\tB\003\340A\001\"\210\001\n\032ListSecretVersionsResp" + + "onse\022=\n\010versions\030\001 \003(\0132+.google.cloud.se" + + "crets.v1beta1.SecretVersion\022\027\n\017next_page" + + "_token\030\002 \001(\t\022\022\n\ntotal_size\030\003 \001(\005\"[\n\027GetS" + + "ecretVersionRequest\022@\n\004name\030\001 \001(\tB2\340A\002\372A" + + ",\n*secretmanager.googleapis.com/SecretVe" + + "rsion\"\206\001\n\023UpdateSecretRequest\0229\n\006secret\030" + + "\001 \001(\0132$.google.cloud.secrets.v1beta1.Sec" + + "retB\003\340A\002\0224\n\013update_mask\030\002 \001(\0132\032.google.p" + + "rotobuf.FieldMaskB\003\340A\002\"^\n\032AccessSecretVe" + + "rsionRequest\022@\n\004name\030\001 \001(\tB2\340A\002\372A,\n*secr" + + "etmanager.googleapis.com/SecretVersion\"\232" + + "\001\n\033AccessSecretVersionResponse\022=\n\004name\030\001" + + " \001(\tB/\372A,\n*secretmanager.googleapis.com/" + + "SecretVersion\022<\n\007payload\030\002 \001(\0132+.google." + + "cloud.secrets.v1beta1.SecretPayload\"P\n\023D" + + "eleteSecretRequest\0229\n\004name\030\001 \001(\tB+\340A\002\372A%" + + "\n#secretmanager.googleapis.com/Secret\"_\n" + + "\033DisableSecretVersionRequest\022@\n\004name\030\001 \001" + + "(\tB2\340A\002\372A,\n*secretmanager.googleapis.com" + + "/SecretVersion\"^\n\032EnableSecretVersionReq" + + "uest\022@\n\004name\030\001 \001(\tB2\340A\002\372A,\n*secretmanage" + + "r.googleapis.com/SecretVersion\"_\n\033Destro" + + "ySecretVersionRequest\022@\n\004name\030\001 \001(\tB2\340A\002" + + "\372A,\n*secretmanager.googleapis.com/Secret" + + "Version2\203\026\n\024SecretManagerService\022\251\001\n\013Lis" + + "tSecrets\0220.google.cloud.secrets.v1beta1." + + "ListSecretsRequest\0321.google.cloud.secret" + + "s.v1beta1.ListSecretsResponse\"5\332A\006parent" + + "\202\323\344\223\002&\022$/v1beta1/{parent=projects/*}/sec" + + "rets\022\267\001\n\014CreateSecret\0221.google.cloud.sec" + + "rets.v1beta1.CreateSecretRequest\032$.googl" + + "e.cloud.secrets.v1beta1.Secret\"N\332A\027paren" + + "t,secret_id,secret\202\323\344\223\002.\"$/v1beta1/{pare" + + "nt=projects/*}/secrets:\006secret\022\305\001\n\020AddSe" + + "cretVersion\0225.google.cloud.secrets.v1bet" + + "a1.AddSecretVersionRequest\032+.google.clou" + + "d.secrets.v1beta1.SecretVersion\"M\332A\016pare" + + "nt,payload\202\323\344\223\0026\"1/v1beta1/{parent=proje" + + "cts/*/secrets/*}:addVersion:\001*\022\226\001\n\tGetSe" + + "cret\022..google.cloud.secrets.v1beta1.GetS" + + "ecretRequest\032$.google.cloud.secrets.v1be" + + "ta1.Secret\"3\332A\004name\202\323\344\223\002&\022$/v1beta1/{nam" + + "e=projects/*/secrets/*}\022\271\001\n\014UpdateSecret" + + "\0221.google.cloud.secrets.v1beta1.UpdateSe" + + "cretRequest\032$.google.cloud.secrets.v1bet" + + "a1.Secret\"P\332A\022secret,update_mask\202\323\344\223\00252+" + + "/v1beta1/{secret.name=projects/*/secrets" + + "/*}:\006secret\022\216\001\n\014DeleteSecret\0221.google.cl" + + "oud.secrets.v1beta1.DeleteSecretRequest\032" + + "\026.google.protobuf.Empty\"3\332A\004name\202\323\344\223\002&*$" + + "/v1beta1/{name=projects/*/secrets/*}\022\311\001\n" + + "\022ListSecretVersions\0227.google.cloud.secre" + + "ts.v1beta1.ListSecretVersionsRequest\0328.g" + + "oogle.cloud.secrets.v1beta1.ListSecretVe" + + "rsionsResponse\"@\332A\006parent\202\323\344\223\0021\022//v1beta" + + "1/{parent=projects/*/secrets/*}/versions" + + "\022\266\001\n\020GetSecretVersion\0225.google.cloud.sec" + + "rets.v1beta1.GetSecretVersionRequest\032+.g" + + "oogle.cloud.secrets.v1beta1.SecretVersio" + + "n\">\332A\004name\202\323\344\223\0021\022//v1beta1/{name=project" + + "s/*/secrets/*/versions/*}\022\321\001\n\023AccessSecr" + + "etVersion\0228.google.cloud.secrets.v1beta1" + + ".AccessSecretVersionRequest\0329.google.clo" + + "ud.secrets.v1beta1.AccessSecretVersionRe" + + "sponse\"E\332A\004name\202\323\344\223\0028\0226/v1beta1/{name=pr" + + "ojects/*/secrets/*/versions/*}:access\022\311\001" + + "\n\024DisableSecretVersion\0229.google.cloud.se" + + "crets.v1beta1.DisableSecretVersionReques" + + "t\032+.google.cloud.secrets.v1beta1.SecretV" + + "ersion\"I\332A\004name\202\323\344\223\002<\"7/v1beta1/{name=pr" + + "ojects/*/secrets/*/versions/*}:disable:\001" + + "*\022\306\001\n\023EnableSecretVersion\0228.google.cloud" + + ".secrets.v1beta1.EnableSecretVersionRequ" + + "est\032+.google.cloud.secrets.v1beta1.Secre" + + "tVersion\"H\332A\004name\202\323\344\223\002;\"6/v1beta1/{name=" + + "projects/*/secrets/*/versions/*}:enable:" + + "\001*\022\311\001\n\024DestroySecretVersion\0229.google.clo" + + "ud.secrets.v1beta1.DestroySecretVersionR" + + "equest\032+.google.cloud.secrets.v1beta1.Se" + + "cretVersion\"I\332A\004name\202\323\344\223\002<\"7/v1beta1/{na" + + "me=projects/*/secrets/*/versions/*}:dest" + + "roy:\001*\022\213\001\n\014SetIamPolicy\022\".google.iam.v1." + + "SetIamPolicyRequest\032\025.google.iam.v1.Poli" + + "cy\"@\202\323\344\223\002:\"5/v1beta1/{resource=projects/" + + "*/secrets/*}:setIamPolicy:\001*\022\210\001\n\014GetIamP" + + "olicy\022\".google.iam.v1.GetIamPolicyReques" + + "t\032\025.google.iam.v1.Policy\"=\202\323\344\223\0027\0225/v1bet" + + "a1/{resource=projects/*/secrets/*}:getIa" + + "mPolicy\022\261\001\n\022TestIamPermissions\022(.google." + + "iam.v1.TestIamPermissionsRequest\032).googl" + + "e.iam.v1.TestIamPermissionsResponse\"F\202\323\344" + + "\223\002@\";/v1beta1/{resource=projects/*/secre" + + "ts/*}:testIamPermissions:\001*\032P\312A\034secretma" + + "nager.googleapis.com\322A.https://www.googl" + + "eapis.com/auth/cloud-platformB\357\001\n&com.go" + + "ogle.cloud.secretmanager.v1beta1B\014Servic" + + "eProtoP\001Z:cloud.google.com/go/secrets/ap" + + "iv1beta1/secretspb;secretspb\370\001\001\242\002\003GSM\252\002\"" + + "Google.Cloud.SecretManager.V1Beta1\312\002\"Goo" + + "gle\\Cloud\\SecretManager\\V1beta1\352\002%Google" + + "::Cloud::SecretManager::V1beta1b\006proto3" + }; + descriptor = + com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom( + descriptorData, + new com.google.protobuf.Descriptors.FileDescriptor[] { + com.google.api.AnnotationsProto.getDescriptor(), + com.google.api.ClientProto.getDescriptor(), + com.google.api.FieldBehaviorProto.getDescriptor(), + com.google.api.ResourceProto.getDescriptor(), + com.google.cloud.secretmanager.v1beta1.ResourcesProto.getDescriptor(), + com.google.iam.v1.IamPolicyProto.getDescriptor(), + com.google.iam.v1.PolicyProto.getDescriptor(), + com.google.protobuf.EmptyProto.getDescriptor(), + com.google.protobuf.FieldMaskProto.getDescriptor(), + }); + internal_static_google_cloud_secrets_v1beta1_ListSecretsRequest_descriptor = + getDescriptor().getMessageTypes().get(0); + internal_static_google_cloud_secrets_v1beta1_ListSecretsRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_ListSecretsRequest_descriptor, + new java.lang.String[] { + "Parent", "PageSize", "PageToken", + }); + internal_static_google_cloud_secrets_v1beta1_ListSecretsResponse_descriptor = + getDescriptor().getMessageTypes().get(1); + internal_static_google_cloud_secrets_v1beta1_ListSecretsResponse_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_ListSecretsResponse_descriptor, + new java.lang.String[] { + "Secrets", "NextPageToken", "TotalSize", + }); + internal_static_google_cloud_secrets_v1beta1_CreateSecretRequest_descriptor = + getDescriptor().getMessageTypes().get(2); + internal_static_google_cloud_secrets_v1beta1_CreateSecretRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_CreateSecretRequest_descriptor, + new java.lang.String[] { + "Parent", "SecretId", "Secret", + }); + internal_static_google_cloud_secrets_v1beta1_AddSecretVersionRequest_descriptor = + getDescriptor().getMessageTypes().get(3); + internal_static_google_cloud_secrets_v1beta1_AddSecretVersionRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_AddSecretVersionRequest_descriptor, + new java.lang.String[] { + "Parent", "Payload", + }); + internal_static_google_cloud_secrets_v1beta1_GetSecretRequest_descriptor = + getDescriptor().getMessageTypes().get(4); + internal_static_google_cloud_secrets_v1beta1_GetSecretRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_GetSecretRequest_descriptor, + new java.lang.String[] { + "Name", + }); + internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsRequest_descriptor = + getDescriptor().getMessageTypes().get(5); + internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsRequest_descriptor, + new java.lang.String[] { + "Parent", "PageSize", "PageToken", + }); + internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsResponse_descriptor = + getDescriptor().getMessageTypes().get(6); + internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsResponse_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_ListSecretVersionsResponse_descriptor, + new java.lang.String[] { + "Versions", "NextPageToken", "TotalSize", + }); + internal_static_google_cloud_secrets_v1beta1_GetSecretVersionRequest_descriptor = + getDescriptor().getMessageTypes().get(7); + internal_static_google_cloud_secrets_v1beta1_GetSecretVersionRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_GetSecretVersionRequest_descriptor, + new java.lang.String[] { + "Name", + }); + internal_static_google_cloud_secrets_v1beta1_UpdateSecretRequest_descriptor = + getDescriptor().getMessageTypes().get(8); + internal_static_google_cloud_secrets_v1beta1_UpdateSecretRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_UpdateSecretRequest_descriptor, + new java.lang.String[] { + "Secret", "UpdateMask", + }); + internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionRequest_descriptor = + getDescriptor().getMessageTypes().get(9); + internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionRequest_descriptor, + new java.lang.String[] { + "Name", + }); + internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionResponse_descriptor = + getDescriptor().getMessageTypes().get(10); + internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionResponse_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_AccessSecretVersionResponse_descriptor, + new java.lang.String[] { + "Name", "Payload", + }); + internal_static_google_cloud_secrets_v1beta1_DeleteSecretRequest_descriptor = + getDescriptor().getMessageTypes().get(11); + internal_static_google_cloud_secrets_v1beta1_DeleteSecretRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_DeleteSecretRequest_descriptor, + new java.lang.String[] { + "Name", + }); + internal_static_google_cloud_secrets_v1beta1_DisableSecretVersionRequest_descriptor = + getDescriptor().getMessageTypes().get(12); + internal_static_google_cloud_secrets_v1beta1_DisableSecretVersionRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_DisableSecretVersionRequest_descriptor, + new java.lang.String[] { + "Name", + }); + internal_static_google_cloud_secrets_v1beta1_EnableSecretVersionRequest_descriptor = + getDescriptor().getMessageTypes().get(13); + internal_static_google_cloud_secrets_v1beta1_EnableSecretVersionRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_EnableSecretVersionRequest_descriptor, + new java.lang.String[] { + "Name", + }); + internal_static_google_cloud_secrets_v1beta1_DestroySecretVersionRequest_descriptor = + getDescriptor().getMessageTypes().get(14); + internal_static_google_cloud_secrets_v1beta1_DestroySecretVersionRequest_fieldAccessorTable = + new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( + internal_static_google_cloud_secrets_v1beta1_DestroySecretVersionRequest_descriptor, + new java.lang.String[] { + "Name", + }); + com.google.protobuf.ExtensionRegistry registry = + com.google.protobuf.ExtensionRegistry.newInstance(); + registry.add(com.google.api.ClientProto.defaultHost); + registry.add(com.google.api.FieldBehaviorProto.fieldBehavior); + registry.add(com.google.api.AnnotationsProto.http); + registry.add(com.google.api.ClientProto.methodSignature); + registry.add(com.google.api.ClientProto.oauthScopes); + registry.add(com.google.api.ResourceProto.resourceReference); + com.google.protobuf.Descriptors.FileDescriptor.internalUpdateFileDescriptor( + descriptor, registry); + com.google.api.AnnotationsProto.getDescriptor(); + com.google.api.ClientProto.getDescriptor(); + com.google.api.FieldBehaviorProto.getDescriptor(); + com.google.api.ResourceProto.getDescriptor(); + com.google.cloud.secretmanager.v1beta1.ResourcesProto.getDescriptor(); + com.google.iam.v1.IamPolicyProto.getDescriptor(); + com.google.iam.v1.PolicyProto.getDescriptor(); + com.google.protobuf.EmptyProto.getDescriptor(); + com.google.protobuf.FieldMaskProto.getDescriptor(); + } + + // @@protoc_insertion_point(outer_class_scope) +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/UpdateSecretRequest.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/UpdateSecretRequest.java new file mode 100644 index 000000000000..cd86b4d609fc --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/UpdateSecretRequest.java @@ -0,0 +1,1023 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +/** + * + * + *
+ * Request message for [SecretManagerService.UpdateSecret][google.cloud.secrets.v1beta1.SecretManagerService.UpdateSecret].
+ * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.UpdateSecretRequest} + */ +public final class UpdateSecretRequest extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.secrets.v1beta1.UpdateSecretRequest) + UpdateSecretRequestOrBuilder { + private static final long serialVersionUID = 0L; + // Use UpdateSecretRequest.newBuilder() to construct. + private UpdateSecretRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { + super(builder); + } + + private UpdateSecretRequest() {} + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new UpdateSecretRequest(); + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_UpdateSecretRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_UpdateSecretRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest.class, + com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest.Builder.class); + } + + private int bitField0_; + public static final int SECRET_FIELD_NUMBER = 1; + private com.google.cloud.secretmanager.v1beta1.Secret secret_; + /** + * + * + *
+   * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the secret field is set. + */ + @java.lang.Override + public boolean hasSecret() { + return ((bitField0_ & 0x00000001) != 0); + } + /** + * + * + *
+   * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return The secret. + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.Secret getSecret() { + return secret_ == null + ? com.google.cloud.secretmanager.v1beta1.Secret.getDefaultInstance() + : secret_; + } + /** + * + * + *
+   * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.SecretOrBuilder getSecretOrBuilder() { + return secret_ == null + ? com.google.cloud.secretmanager.v1beta1.Secret.getDefaultInstance() + : secret_; + } + + public static final int UPDATE_MASK_FIELD_NUMBER = 2; + private com.google.protobuf.FieldMask updateMask_; + /** + * + * + *
+   * Required. Specifies the fields to be updated.
+   * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the updateMask field is set. + */ + @java.lang.Override + public boolean hasUpdateMask() { + return ((bitField0_ & 0x00000002) != 0); + } + /** + * + * + *
+   * Required. Specifies the fields to be updated.
+   * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return The updateMask. + */ + @java.lang.Override + public com.google.protobuf.FieldMask getUpdateMask() { + return updateMask_ == null ? com.google.protobuf.FieldMask.getDefaultInstance() : updateMask_; + } + /** + * + * + *
+   * Required. Specifies the fields to be updated.
+   * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + @java.lang.Override + public com.google.protobuf.FieldMaskOrBuilder getUpdateMaskOrBuilder() { + return updateMask_ == null ? com.google.protobuf.FieldMask.getDefaultInstance() : updateMask_; + } + + private byte memoizedIsInitialized = -1; + + @java.lang.Override + public final boolean isInitialized() { + byte isInitialized = memoizedIsInitialized; + if (isInitialized == 1) return true; + if (isInitialized == 0) return false; + + memoizedIsInitialized = 1; + return true; + } + + @java.lang.Override + public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { + if (((bitField0_ & 0x00000001) != 0)) { + output.writeMessage(1, getSecret()); + } + if (((bitField0_ & 0x00000002) != 0)) { + output.writeMessage(2, getUpdateMask()); + } + getUnknownFields().writeTo(output); + } + + @java.lang.Override + public int getSerializedSize() { + int size = memoizedSize; + if (size != -1) return size; + + size = 0; + if (((bitField0_ & 0x00000001) != 0)) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(1, getSecret()); + } + if (((bitField0_ & 0x00000002) != 0)) { + size += com.google.protobuf.CodedOutputStream.computeMessageSize(2, getUpdateMask()); + } + size += getUnknownFields().getSerializedSize(); + memoizedSize = size; + return size; + } + + @java.lang.Override + public boolean equals(final java.lang.Object obj) { + if (obj == this) { + return true; + } + if (!(obj instanceof com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest)) { + return super.equals(obj); + } + com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest other = + (com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest) obj; + + if (hasSecret() != other.hasSecret()) return false; + if (hasSecret()) { + if (!getSecret().equals(other.getSecret())) return false; + } + if (hasUpdateMask() != other.hasUpdateMask()) return false; + if (hasUpdateMask()) { + if (!getUpdateMask().equals(other.getUpdateMask())) return false; + } + if (!getUnknownFields().equals(other.getUnknownFields())) return false; + return true; + } + + @java.lang.Override + public int hashCode() { + if (memoizedHashCode != 0) { + return memoizedHashCode; + } + int hash = 41; + hash = (19 * hash) + getDescriptor().hashCode(); + if (hasSecret()) { + hash = (37 * hash) + SECRET_FIELD_NUMBER; + hash = (53 * hash) + getSecret().hashCode(); + } + if (hasUpdateMask()) { + hash = (37 * hash) + UPDATE_MASK_FIELD_NUMBER; + hash = (53 * hash) + getUpdateMask().hashCode(); + } + hash = (29 * hash) + getUnknownFields().hashCode(); + memoizedHashCode = hash; + return hash; + } + + public static com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest parseFrom( + java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest parseFrom( + java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest parseFrom( + com.google.protobuf.ByteString data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest parseFrom( + com.google.protobuf.ByteString data, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest parseFrom(byte[] data) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data); + } + + public static com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest parseFrom( + byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + return PARSER.parseFrom(data, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest parseFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest parseFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest parseDelimitedFrom( + java.io.InputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest parseDelimitedFrom( + java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( + PARSER, input, extensionRegistry); + } + + public static com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest parseFrom( + com.google.protobuf.CodedInputStream input) throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); + } + + public static com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest parseFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + return com.google.protobuf.GeneratedMessageV3.parseWithIOException( + PARSER, input, extensionRegistry); + } + + @java.lang.Override + public Builder newBuilderForType() { + return newBuilder(); + } + + public static Builder newBuilder() { + return DEFAULT_INSTANCE.toBuilder(); + } + + public static Builder newBuilder( + com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest prototype) { + return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); + } + + @java.lang.Override + public Builder toBuilder() { + return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); + } + + @java.lang.Override + protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + Builder builder = new Builder(parent); + return builder; + } + /** + * + * + *
+   * Request message for [SecretManagerService.UpdateSecret][google.cloud.secrets.v1beta1.SecretManagerService.UpdateSecret].
+   * 
+ * + * Protobuf type {@code google.cloud.secrets.v1beta1.UpdateSecretRequest} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder + implements + // @@protoc_insertion_point(builder_implements:google.cloud.secrets.v1beta1.UpdateSecretRequest) + com.google.cloud.secretmanager.v1beta1.UpdateSecretRequestOrBuilder { + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_UpdateSecretRequest_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_UpdateSecretRequest_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest.class, + com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest.Builder.class); + } + + // Construct using com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest.newBuilder() + private Builder() { + maybeForceBuilderInitialization(); + } + + private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { + super(parent); + maybeForceBuilderInitialization(); + } + + private void maybeForceBuilderInitialization() { + if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) { + getSecretFieldBuilder(); + getUpdateMaskFieldBuilder(); + } + } + + @java.lang.Override + public Builder clear() { + super.clear(); + bitField0_ = 0; + secret_ = null; + if (secretBuilder_ != null) { + secretBuilder_.dispose(); + secretBuilder_ = null; + } + updateMask_ = null; + if (updateMaskBuilder_ != null) { + updateMaskBuilder_.dispose(); + updateMaskBuilder_ = null; + } + return this; + } + + @java.lang.Override + public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { + return com.google.cloud.secretmanager.v1beta1.ServiceProto + .internal_static_google_cloud_secrets_v1beta1_UpdateSecretRequest_descriptor; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest getDefaultInstanceForType() { + return com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest.getDefaultInstance(); + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest build() { + com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest result = buildPartial(); + if (!result.isInitialized()) { + throw newUninitializedMessageException(result); + } + return result; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest buildPartial() { + com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest result = + new com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest(this); + if (bitField0_ != 0) { + buildPartial0(result); + } + onBuilt(); + return result; + } + + private void buildPartial0(com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest result) { + int from_bitField0_ = bitField0_; + int to_bitField0_ = 0; + if (((from_bitField0_ & 0x00000001) != 0)) { + result.secret_ = secretBuilder_ == null ? secret_ : secretBuilder_.build(); + to_bitField0_ |= 0x00000001; + } + if (((from_bitField0_ & 0x00000002) != 0)) { + result.updateMask_ = updateMaskBuilder_ == null ? updateMask_ : updateMaskBuilder_.build(); + to_bitField0_ |= 0x00000002; + } + result.bitField0_ |= to_bitField0_; + } + + @java.lang.Override + public Builder clone() { + return super.clone(); + } + + @java.lang.Override + public Builder setField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.setField(field, value); + } + + @java.lang.Override + public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { + return super.clearField(field); + } + + @java.lang.Override + public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { + return super.clearOneof(oneof); + } + + @java.lang.Override + public Builder setRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { + return super.setRepeatedField(field, index, value); + } + + @java.lang.Override + public Builder addRepeatedField( + com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { + return super.addRepeatedField(field, value); + } + + @java.lang.Override + public Builder mergeFrom(com.google.protobuf.Message other) { + if (other instanceof com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest) { + return mergeFrom((com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest) other); + } else { + super.mergeFrom(other); + return this; + } + } + + public Builder mergeFrom(com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest other) { + if (other == com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest.getDefaultInstance()) + return this; + if (other.hasSecret()) { + mergeSecret(other.getSecret()); + } + if (other.hasUpdateMask()) { + mergeUpdateMask(other.getUpdateMask()); + } + this.mergeUnknownFields(other.getUnknownFields()); + onChanged(); + return this; + } + + @java.lang.Override + public final boolean isInitialized() { + return true; + } + + @java.lang.Override + public Builder mergeFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws java.io.IOException { + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + input.readMessage(getSecretFieldBuilder().getBuilder(), extensionRegistry); + bitField0_ |= 0x00000001; + break; + } // case 10 + case 18: + { + input.readMessage(getUpdateMaskFieldBuilder().getBuilder(), extensionRegistry); + bitField0_ |= 0x00000002; + break; + } // case 18 + default: + { + if (!super.parseUnknownField(input, extensionRegistry, tag)) { + done = true; // was an endgroup tag + } + break; + } // default: + } // switch (tag) + } // while (!done) + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.unwrapIOException(); + } finally { + onChanged(); + } // finally + return this; + } + + private int bitField0_; + + private com.google.cloud.secretmanager.v1beta1.Secret secret_; + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.Secret, + com.google.cloud.secretmanager.v1beta1.Secret.Builder, + com.google.cloud.secretmanager.v1beta1.SecretOrBuilder> + secretBuilder_; + /** + * + * + *
+     * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the secret field is set. + */ + public boolean hasSecret() { + return ((bitField0_ & 0x00000001) != 0); + } + /** + * + * + *
+     * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return The secret. + */ + public com.google.cloud.secretmanager.v1beta1.Secret getSecret() { + if (secretBuilder_ == null) { + return secret_ == null + ? com.google.cloud.secretmanager.v1beta1.Secret.getDefaultInstance() + : secret_; + } else { + return secretBuilder_.getMessage(); + } + } + /** + * + * + *
+     * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder setSecret(com.google.cloud.secretmanager.v1beta1.Secret value) { + if (secretBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + secret_ = value; + } else { + secretBuilder_.setMessage(value); + } + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder setSecret( + com.google.cloud.secretmanager.v1beta1.Secret.Builder builderForValue) { + if (secretBuilder_ == null) { + secret_ = builderForValue.build(); + } else { + secretBuilder_.setMessage(builderForValue.build()); + } + bitField0_ |= 0x00000001; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder mergeSecret(com.google.cloud.secretmanager.v1beta1.Secret value) { + if (secretBuilder_ == null) { + if (((bitField0_ & 0x00000001) != 0) + && secret_ != null + && secret_ != com.google.cloud.secretmanager.v1beta1.Secret.getDefaultInstance()) { + getSecretBuilder().mergeFrom(value); + } else { + secret_ = value; + } + } else { + secretBuilder_.mergeFrom(value); + } + if (secret_ != null) { + bitField0_ |= 0x00000001; + onChanged(); + } + return this; + } + /** + * + * + *
+     * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder clearSecret() { + bitField0_ = (bitField0_ & ~0x00000001); + secret_ = null; + if (secretBuilder_ != null) { + secretBuilder_.dispose(); + secretBuilder_ = null; + } + onChanged(); + return this; + } + /** + * + * + *
+     * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secretmanager.v1beta1.Secret.Builder getSecretBuilder() { + bitField0_ |= 0x00000001; + onChanged(); + return getSecretFieldBuilder().getBuilder(); + } + /** + * + * + *
+     * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.cloud.secretmanager.v1beta1.SecretOrBuilder getSecretOrBuilder() { + if (secretBuilder_ != null) { + return secretBuilder_.getMessageOrBuilder(); + } else { + return secret_ == null + ? com.google.cloud.secretmanager.v1beta1.Secret.getDefaultInstance() + : secret_; + } + } + /** + * + * + *
+     * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+     * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + private com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.Secret, + com.google.cloud.secretmanager.v1beta1.Secret.Builder, + com.google.cloud.secretmanager.v1beta1.SecretOrBuilder> + getSecretFieldBuilder() { + if (secretBuilder_ == null) { + secretBuilder_ = + new com.google.protobuf.SingleFieldBuilderV3< + com.google.cloud.secretmanager.v1beta1.Secret, + com.google.cloud.secretmanager.v1beta1.Secret.Builder, + com.google.cloud.secretmanager.v1beta1.SecretOrBuilder>( + getSecret(), getParentForChildren(), isClean()); + secret_ = null; + } + return secretBuilder_; + } + + private com.google.protobuf.FieldMask updateMask_; + private com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.FieldMask, + com.google.protobuf.FieldMask.Builder, + com.google.protobuf.FieldMaskOrBuilder> + updateMaskBuilder_; + /** + * + * + *
+     * Required. Specifies the fields to be updated.
+     * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the updateMask field is set. + */ + public boolean hasUpdateMask() { + return ((bitField0_ & 0x00000002) != 0); + } + /** + * + * + *
+     * Required. Specifies the fields to be updated.
+     * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return The updateMask. + */ + public com.google.protobuf.FieldMask getUpdateMask() { + if (updateMaskBuilder_ == null) { + return updateMask_ == null + ? com.google.protobuf.FieldMask.getDefaultInstance() + : updateMask_; + } else { + return updateMaskBuilder_.getMessage(); + } + } + /** + * + * + *
+     * Required. Specifies the fields to be updated.
+     * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder setUpdateMask(com.google.protobuf.FieldMask value) { + if (updateMaskBuilder_ == null) { + if (value == null) { + throw new NullPointerException(); + } + updateMask_ = value; + } else { + updateMaskBuilder_.setMessage(value); + } + bitField0_ |= 0x00000002; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. Specifies the fields to be updated.
+     * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder setUpdateMask(com.google.protobuf.FieldMask.Builder builderForValue) { + if (updateMaskBuilder_ == null) { + updateMask_ = builderForValue.build(); + } else { + updateMaskBuilder_.setMessage(builderForValue.build()); + } + bitField0_ |= 0x00000002; + onChanged(); + return this; + } + /** + * + * + *
+     * Required. Specifies the fields to be updated.
+     * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder mergeUpdateMask(com.google.protobuf.FieldMask value) { + if (updateMaskBuilder_ == null) { + if (((bitField0_ & 0x00000002) != 0) + && updateMask_ != null + && updateMask_ != com.google.protobuf.FieldMask.getDefaultInstance()) { + getUpdateMaskBuilder().mergeFrom(value); + } else { + updateMask_ = value; + } + } else { + updateMaskBuilder_.mergeFrom(value); + } + if (updateMask_ != null) { + bitField0_ |= 0x00000002; + onChanged(); + } + return this; + } + /** + * + * + *
+     * Required. Specifies the fields to be updated.
+     * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public Builder clearUpdateMask() { + bitField0_ = (bitField0_ & ~0x00000002); + updateMask_ = null; + if (updateMaskBuilder_ != null) { + updateMaskBuilder_.dispose(); + updateMaskBuilder_ = null; + } + onChanged(); + return this; + } + /** + * + * + *
+     * Required. Specifies the fields to be updated.
+     * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.protobuf.FieldMask.Builder getUpdateMaskBuilder() { + bitField0_ |= 0x00000002; + onChanged(); + return getUpdateMaskFieldBuilder().getBuilder(); + } + /** + * + * + *
+     * Required. Specifies the fields to be updated.
+     * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + public com.google.protobuf.FieldMaskOrBuilder getUpdateMaskOrBuilder() { + if (updateMaskBuilder_ != null) { + return updateMaskBuilder_.getMessageOrBuilder(); + } else { + return updateMask_ == null + ? com.google.protobuf.FieldMask.getDefaultInstance() + : updateMask_; + } + } + /** + * + * + *
+     * Required. Specifies the fields to be updated.
+     * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + private com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.FieldMask, + com.google.protobuf.FieldMask.Builder, + com.google.protobuf.FieldMaskOrBuilder> + getUpdateMaskFieldBuilder() { + if (updateMaskBuilder_ == null) { + updateMaskBuilder_ = + new com.google.protobuf.SingleFieldBuilderV3< + com.google.protobuf.FieldMask, + com.google.protobuf.FieldMask.Builder, + com.google.protobuf.FieldMaskOrBuilder>( + getUpdateMask(), getParentForChildren(), isClean()); + updateMask_ = null; + } + return updateMaskBuilder_; + } + + @java.lang.Override + public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.setUnknownFields(unknownFields); + } + + @java.lang.Override + public final Builder mergeUnknownFields( + final com.google.protobuf.UnknownFieldSet unknownFields) { + return super.mergeUnknownFields(unknownFields); + } + + // @@protoc_insertion_point(builder_scope:google.cloud.secrets.v1beta1.UpdateSecretRequest) + } + + // @@protoc_insertion_point(class_scope:google.cloud.secrets.v1beta1.UpdateSecretRequest) + private static final com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest DEFAULT_INSTANCE; + + static { + DEFAULT_INSTANCE = new com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest(); + } + + public static com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest getDefaultInstance() { + return DEFAULT_INSTANCE; + } + + private static final com.google.protobuf.Parser PARSER = + new com.google.protobuf.AbstractParser() { + @java.lang.Override + public UpdateSecretRequest parsePartialFrom( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + Builder builder = newBuilder(); + try { + builder.mergeFrom(input, extensionRegistry); + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(builder.buildPartial()); + } catch (com.google.protobuf.UninitializedMessageException e) { + throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial()); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e) + .setUnfinishedMessage(builder.buildPartial()); + } + return builder.buildPartial(); + } + }; + + public static com.google.protobuf.Parser parser() { + return PARSER; + } + + @java.lang.Override + public com.google.protobuf.Parser getParserForType() { + return PARSER; + } + + @java.lang.Override + public com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest getDefaultInstanceForType() { + return DEFAULT_INSTANCE; + } +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/UpdateSecretRequestOrBuilder.java b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/UpdateSecretRequestOrBuilder.java new file mode 100644 index 000000000000..ac789f7bc43d --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/java/com/google/cloud/secretmanager/v1beta1/UpdateSecretRequestOrBuilder.java @@ -0,0 +1,105 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +// Generated by the protocol buffer compiler. DO NOT EDIT! +// source: google/cloud/secrets/v1beta1/service.proto + +// Protobuf Java Version: 3.25.5 +package com.google.cloud.secretmanager.v1beta1; + +public interface UpdateSecretRequestOrBuilder + extends + // @@protoc_insertion_point(interface_extends:google.cloud.secrets.v1beta1.UpdateSecretRequest) + com.google.protobuf.MessageOrBuilder { + + /** + * + * + *
+   * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the secret field is set. + */ + boolean hasSecret(); + /** + * + * + *
+   * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return The secret. + */ + com.google.cloud.secretmanager.v1beta1.Secret getSecret(); + /** + * + * + *
+   * Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
+   * 
+ * + * + * .google.cloud.secrets.v1beta1.Secret secret = 1 [(.google.api.field_behavior) = REQUIRED]; + * + */ + com.google.cloud.secretmanager.v1beta1.SecretOrBuilder getSecretOrBuilder(); + + /** + * + * + *
+   * Required. Specifies the fields to be updated.
+   * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return Whether the updateMask field is set. + */ + boolean hasUpdateMask(); + /** + * + * + *
+   * Required. Specifies the fields to be updated.
+   * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + * + * @return The updateMask. + */ + com.google.protobuf.FieldMask getUpdateMask(); + /** + * + * + *
+   * Required. Specifies the fields to be updated.
+   * 
+ * + * .google.protobuf.FieldMask update_mask = 2 [(.google.api.field_behavior) = REQUIRED]; + * + */ + com.google.protobuf.FieldMaskOrBuilder getUpdateMaskOrBuilder(); +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/resources.proto b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/resources.proto new file mode 100644 index 000000000000..a9908e61701f --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/resources.proto @@ -0,0 +1,155 @@ +// Copyright 2024 Google LLC +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +syntax = "proto3"; + +package google.cloud.secrets.v1beta1; + +import "google/api/field_behavior.proto"; +import "google/api/resource.proto"; +import "google/protobuf/timestamp.proto"; + +option cc_enable_arenas = true; +option csharp_namespace = "Google.Cloud.SecretManager.V1Beta1"; +option go_package = "cloud.google.com/go/secrets/apiv1beta1/secretspb;secretspb"; +option java_multiple_files = true; +option java_outer_classname = "ResourcesProto"; +option java_package = "com.google.cloud.secretmanager.v1beta1"; +option objc_class_prefix = "GSM"; +option php_namespace = "Google\\Cloud\\SecretManager\\V1beta1"; +option ruby_package = "Google::Cloud::SecretManager::V1beta1"; + +// A [Secret][google.cloud.secrets.v1beta1.Secret] is a logical secret whose value and versions can +// be accessed. +// +// A [Secret][google.cloud.secrets.v1beta1.Secret] is made up of zero or more [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] that +// represent the secret data. +message Secret { + option (google.api.resource) = { + type: "secretmanager.googleapis.com/Secret" + pattern: "projects/{project}/secrets/{secret}" + }; + + // Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the format `projects/*/secrets/*`. + string name = 1 [(google.api.field_behavior) = OUTPUT_ONLY]; + + // Required. Immutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.v1beta1.Secret]. + // + // The replication policy cannot be changed after the Secret has been created. + Replication replication = 2 [ + (google.api.field_behavior) = IMMUTABLE, + (google.api.field_behavior) = REQUIRED + ]; + + // Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created. + google.protobuf.Timestamp create_time = 3 [(google.api.field_behavior) = OUTPUT_ONLY]; + + // The labels assigned to this Secret. + // + // Label keys must be between 1 and 63 characters long, have a UTF-8 encoding + // of maximum 128 bytes, and must conform to the following PCRE regular + // expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}` + // + // Label values must be between 0 and 63 characters long, have a UTF-8 + // encoding of maximum 128 bytes, and must conform to the following PCRE + // regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}` + // + // No more than 64 labels can be assigned to a given resource. + map labels = 4; +} + +// A secret version resource in the Secret Manager API. +message SecretVersion { + option (google.api.resource) = { + type: "secretmanager.googleapis.com/SecretVersion" + pattern: "projects/{project}/secrets/{secret}/versions/{secret_version}" + }; + + // The state of a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion], indicating if it can be accessed. + enum State { + // Not specified. This value is unused and invalid. + STATE_UNSPECIFIED = 0; + + // The [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] may be accessed. + ENABLED = 1; + + // The [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] may not be accessed, but the secret data + // is still available and can be placed back into the [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED] + // state. + DISABLED = 2; + + // The [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] is destroyed and the secret data is no longer + // stored. A version may not leave this state once entered. + DESTROYED = 3; + } + + // Output only. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the + // format `projects/*/secrets/*/versions/*`. + // + // [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] IDs in a [Secret][google.cloud.secrets.v1beta1.Secret] start at 1 and + // are incremented for each subsequent version of the secret. + string name = 1 [(google.api.field_behavior) = OUTPUT_ONLY]; + + // Output only. The time at which the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was created. + google.protobuf.Timestamp create_time = 2 [(google.api.field_behavior) = OUTPUT_ONLY]; + + // Output only. The time this [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] was destroyed. + // Only present if [state][google.cloud.secrets.v1beta1.SecretVersion.state] is + // [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED]. + google.protobuf.Timestamp destroy_time = 3 [(google.api.field_behavior) = OUTPUT_ONLY]; + + // Output only. The current state of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + State state = 4 [(google.api.field_behavior) = OUTPUT_ONLY]; +} + +// A policy that defines the replication configuration of data. +message Replication { + // A replication policy that replicates the [Secret][google.cloud.secrets.v1beta1.Secret] payload without any + // restrictions. + message Automatic { + + } + + // A replication policy that replicates the [Secret][google.cloud.secrets.v1beta1.Secret] payload into the + // locations specified in [Secret.replication.user_managed.replicas][] + message UserManaged { + // Represents a Replica for this [Secret][google.cloud.secrets.v1beta1.Secret]. + message Replica { + // The canonical IDs of the location to replicate data. + // For example: `"us-east1"`. + string location = 1; + } + + // Required. The list of Replicas for this [Secret][google.cloud.secrets.v1beta1.Secret]. + // + // Cannot be empty. + repeated Replica replicas = 1 [(google.api.field_behavior) = REQUIRED]; + } + + // The replication policy for this secret. + oneof replication { + // The [Secret][google.cloud.secrets.v1beta1.Secret] will automatically be replicated without any restrictions. + Automatic automatic = 1; + + // The [Secret][google.cloud.secrets.v1beta1.Secret] will only be replicated into the locations specified. + UserManaged user_managed = 2; + } +} + +// A secret payload resource in the Secret Manager API. This contains the +// sensitive secret data that is associated with a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. +message SecretPayload { + // The secret data. Must be no larger than 64KiB. + bytes data = 1; +} diff --git a/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/service.proto b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/service.proto new file mode 100644 index 000000000000..6a3dd69bb345 --- /dev/null +++ b/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/service.proto @@ -0,0 +1,417 @@ +// Copyright 2024 Google LLC +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +syntax = "proto3"; + +package google.cloud.secrets.v1beta1; + +import "google/api/annotations.proto"; +import "google/api/client.proto"; +import "google/api/field_behavior.proto"; +import "google/api/resource.proto"; +import "google/cloud/secrets/v1beta1/resources.proto"; +import "google/iam/v1/iam_policy.proto"; +import "google/iam/v1/policy.proto"; +import "google/protobuf/empty.proto"; +import "google/protobuf/field_mask.proto"; + +option cc_enable_arenas = true; +option csharp_namespace = "Google.Cloud.SecretManager.V1Beta1"; +option go_package = "cloud.google.com/go/secrets/apiv1beta1/secretspb;secretspb"; +option java_multiple_files = true; +option java_outer_classname = "ServiceProto"; +option java_package = "com.google.cloud.secretmanager.v1beta1"; +option objc_class_prefix = "GSM"; +option php_namespace = "Google\\Cloud\\SecretManager\\V1beta1"; +option ruby_package = "Google::Cloud::SecretManager::V1beta1"; + +// Secret Manager Service +// +// Manages secrets and operations using those secrets. Implements a REST +// model with the following objects: +// +// * [Secret][google.cloud.secrets.v1beta1.Secret] +// * [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] +service SecretManagerService { + option (google.api.default_host) = "secretmanager.googleapis.com"; + option (google.api.oauth_scopes) = "https://www.googleapis.com/auth/cloud-platform"; + + // Lists [Secrets][google.cloud.secrets.v1beta1.Secret]. + rpc ListSecrets(ListSecretsRequest) returns (ListSecretsResponse) { + option (google.api.http) = { + get: "/v1beta1/{parent=projects/*}/secrets" + }; + option (google.api.method_signature) = "parent"; + } + + // Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. + rpc CreateSecret(CreateSecretRequest) returns (Secret) { + option (google.api.http) = { + post: "/v1beta1/{parent=projects/*}/secrets" + body: "secret" + }; + option (google.api.method_signature) = "parent,secret_id,secret"; + } + + // Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret data and attaches + // it to an existing [Secret][google.cloud.secrets.v1beta1.Secret]. + rpc AddSecretVersion(AddSecretVersionRequest) returns (SecretVersion) { + option (google.api.http) = { + post: "/v1beta1/{parent=projects/*/secrets/*}:addVersion" + body: "*" + }; + option (google.api.method_signature) = "parent,payload"; + } + + // Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret]. + rpc GetSecret(GetSecretRequest) returns (Secret) { + option (google.api.http) = { + get: "/v1beta1/{name=projects/*/secrets/*}" + }; + option (google.api.method_signature) = "name"; + } + + // Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret]. + rpc UpdateSecret(UpdateSecretRequest) returns (Secret) { + option (google.api.http) = { + patch: "/v1beta1/{secret.name=projects/*/secrets/*}" + body: "secret" + }; + option (google.api.method_signature) = "secret,update_mask"; + } + + // Deletes a [Secret][google.cloud.secrets.v1beta1.Secret]. + rpc DeleteSecret(DeleteSecretRequest) returns (google.protobuf.Empty) { + option (google.api.http) = { + delete: "/v1beta1/{name=projects/*/secrets/*}" + }; + option (google.api.method_signature) = "name"; + } + + // Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return secret + // data. + rpc ListSecretVersions(ListSecretVersionsRequest) returns (ListSecretVersionsResponse) { + option (google.api.http) = { + get: "/v1beta1/{parent=projects/*/secrets/*}/versions" + }; + option (google.api.method_signature) = "parent"; + } + + // Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + // + // `projects/*/secrets/*/versions/latest` is an alias to the `latest` + // [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + rpc GetSecretVersion(GetSecretVersionRequest) returns (SecretVersion) { + option (google.api.http) = { + get: "/v1beta1/{name=projects/*/secrets/*/versions/*}" + }; + option (google.api.method_signature) = "name"; + } + + // Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the secret data. + // + // `projects/*/secrets/*/versions/latest` is an alias to the `latest` + // [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + rpc AccessSecretVersion(AccessSecretVersionRequest) returns (AccessSecretVersionResponse) { + option (google.api.http) = { + get: "/v1beta1/{name=projects/*/secrets/*/versions/*}:access" + }; + option (google.api.method_signature) = "name"; + } + + // Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + // + // Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + // [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED]. + rpc DisableSecretVersion(DisableSecretVersionRequest) returns (SecretVersion) { + option (google.api.http) = { + post: "/v1beta1/{name=projects/*/secrets/*/versions/*}:disable" + body: "*" + }; + option (google.api.method_signature) = "name"; + } + + // Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + // + // Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + // [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED]. + rpc EnableSecretVersion(EnableSecretVersionRequest) returns (SecretVersion) { + option (google.api.http) = { + post: "/v1beta1/{name=projects/*/secrets/*/versions/*}:enable" + body: "*" + }; + option (google.api.method_signature) = "name"; + } + + // Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + // + // Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to + // [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably destroys the + // secret data. + rpc DestroySecretVersion(DestroySecretVersionRequest) returns (SecretVersion) { + option (google.api.http) = { + post: "/v1beta1/{name=projects/*/secrets/*/versions/*}:destroy" + body: "*" + }; + option (google.api.method_signature) = "name"; + } + + // Sets the access control policy on the specified secret. Replaces any + // existing policy. + // + // Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced according + // to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret]. + rpc SetIamPolicy(google.iam.v1.SetIamPolicyRequest) returns (google.iam.v1.Policy) { + option (google.api.http) = { + post: "/v1beta1/{resource=projects/*/secrets/*}:setIamPolicy" + body: "*" + }; + } + + // Gets the access control policy for a secret. + // Returns empty policy if the secret exists and does not have a policy set. + rpc GetIamPolicy(google.iam.v1.GetIamPolicyRequest) returns (google.iam.v1.Policy) { + option (google.api.http) = { + get: "/v1beta1/{resource=projects/*/secrets/*}:getIamPolicy" + }; + } + + // Returns permissions that a caller has for the specified secret. + // If the secret does not exist, this call returns an empty set of + // permissions, not a NOT_FOUND error. + // + // Note: This operation is designed to be used for building permission-aware + // UIs and command-line tools, not for authorization checking. This operation + // may "fail open" without warning. + rpc TestIamPermissions(google.iam.v1.TestIamPermissionsRequest) returns (google.iam.v1.TestIamPermissionsResponse) { + option (google.api.http) = { + post: "/v1beta1/{resource=projects/*/secrets/*}:testIamPermissions" + body: "*" + }; + } +} + +// Request message for [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets]. +message ListSecretsRequest { + // Required. The resource name of the project associated with the + // [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`. + string parent = 1 [ + (google.api.field_behavior) = REQUIRED, + (google.api.resource_reference) = { + type: "cloudresourcemanager.googleapis.com/Project" + } + ]; + + // Optional. The maximum number of results to be returned in a single page. If + // set to 0, the server decides the number of results to return. If the + // number is greater than 25000, it is capped at 25000. + int32 page_size = 2 [(google.api.field_behavior) = OPTIONAL]; + + // Optional. Pagination token, returned earlier via + // [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token]. + string page_token = 3 [(google.api.field_behavior) = OPTIONAL]; +} + +// Response message for [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets]. +message ListSecretsResponse { + // The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest + // first). + repeated Secret secrets = 1; + + // A token to retrieve the next page of results. Pass this value in + // [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page. + string next_page_token = 2; + + // The total number of [Secrets][google.cloud.secrets.v1beta1.Secret]. + int32 total_size = 3; +} + +// Request message for [SecretManagerService.CreateSecret][google.cloud.secrets.v1beta1.SecretManagerService.CreateSecret]. +message CreateSecretRequest { + // Required. The resource name of the project to associate with the + // [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`. + string parent = 1 [ + (google.api.field_behavior) = REQUIRED, + (google.api.resource_reference) = { + type: "cloudresourcemanager.googleapis.com/Project" + } + ]; + + // Required. This must be unique within the project. + // + // A secret ID is a string with a maximum length of 255 characters and can + // contain uppercase and lowercase letters, numerals, and the hyphen (`-`) and + // underscore (`_`) characters. + string secret_id = 2 [(google.api.field_behavior) = REQUIRED]; + + // Required. A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values. + Secret secret = 3 [(google.api.field_behavior) = REQUIRED]; +} + +// Request message for [SecretManagerService.AddSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AddSecretVersion]. +message AddSecretVersionRequest { + // Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the + // [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`. + string parent = 1 [ + (google.api.field_behavior) = REQUIRED, + (google.api.resource_reference) = { + type: "secretmanager.googleapis.com/Secret" + } + ]; + + // Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + SecretPayload payload = 2 [(google.api.field_behavior) = REQUIRED]; +} + +// Request message for [SecretManagerService.GetSecret][google.cloud.secrets.v1beta1.SecretManagerService.GetSecret]. +message GetSecretRequest { + // Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`. + string name = 1 [ + (google.api.field_behavior) = REQUIRED, + (google.api.resource_reference) = { + type: "secretmanager.googleapis.com/Secret" + } + ]; +} + +// Request message for [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions]. +message ListSecretVersionsRequest { + // Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the + // [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format + // `projects/*/secrets/*`. + string parent = 1 [ + (google.api.field_behavior) = REQUIRED, + (google.api.resource_reference) = { + type: "secretmanager.googleapis.com/Secret" + } + ]; + + // Optional. The maximum number of results to be returned in a single page. If + // set to 0, the server decides the number of results to return. If the + // number is greater than 25000, it is capped at 25000. + int32 page_size = 2 [(google.api.field_behavior) = OPTIONAL]; + + // Optional. Pagination token, returned earlier via + // ListSecretVersionsResponse.next_page_token][]. + string page_token = 3 [(google.api.field_behavior) = OPTIONAL]; +} + +// Response message for [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions]. +message ListSecretVersionsResponse { + // The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by + // create_time (newest first). + repeated SecretVersion versions = 1; + + // A token to retrieve the next page of results. Pass this value in + // [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page. + string next_page_token = 2; + + // The total number of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. + int32 total_size = 3; +} + +// Request message for [SecretManagerService.GetSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.GetSecretVersion]. +message GetSecretVersionRequest { + // Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format + // `projects/*/secrets/*/versions/*`. + // `projects/*/secrets/*/versions/latest` is an alias to the `latest` + // [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. + string name = 1 [ + (google.api.field_behavior) = REQUIRED, + (google.api.resource_reference) = { + type: "secretmanager.googleapis.com/SecretVersion" + } + ]; +} + +// Request message for [SecretManagerService.UpdateSecret][google.cloud.secrets.v1beta1.SecretManagerService.UpdateSecret]. +message UpdateSecretRequest { + // Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values. + Secret secret = 1 [(google.api.field_behavior) = REQUIRED]; + + // Required. Specifies the fields to be updated. + google.protobuf.FieldMask update_mask = 2 [(google.api.field_behavior) = REQUIRED]; +} + +// Request message for [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion]. +message AccessSecretVersionRequest { + // Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format + // `projects/*/secrets/*/versions/*`. + string name = 1 [ + (google.api.field_behavior) = REQUIRED, + (google.api.resource_reference) = { + type: "secretmanager.googleapis.com/SecretVersion" + } + ]; +} + +// Response message for [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion]. +message AccessSecretVersionResponse { + // The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format + // `projects/*/secrets/*/versions/*`. + string name = 1 [(google.api.resource_reference) = { + type: "secretmanager.googleapis.com/SecretVersion" + }]; + + // Secret payload + SecretPayload payload = 2; +} + +// Request message for [SecretManagerService.DeleteSecret][google.cloud.secrets.v1beta1.SecretManagerService.DeleteSecret]. +message DeleteSecretRequest { + // Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format + // `projects/*/secrets/*`. + string name = 1 [ + (google.api.field_behavior) = REQUIRED, + (google.api.resource_reference) = { + type: "secretmanager.googleapis.com/Secret" + } + ]; +} + +// Request message for [SecretManagerService.DisableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DisableSecretVersion]. +message DisableSecretVersionRequest { + // Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format + // `projects/*/secrets/*/versions/*`. + string name = 1 [ + (google.api.field_behavior) = REQUIRED, + (google.api.resource_reference) = { + type: "secretmanager.googleapis.com/SecretVersion" + } + ]; +} + +// Request message for [SecretManagerService.EnableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.EnableSecretVersion]. +message EnableSecretVersionRequest { + // Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format + // `projects/*/secrets/*/versions/*`. + string name = 1 [ + (google.api.field_behavior) = REQUIRED, + (google.api.resource_reference) = { + type: "secretmanager.googleapis.com/SecretVersion" + } + ]; +} + +// Request message for [SecretManagerService.DestroySecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DestroySecretVersion]. +message DestroySecretVersionRequest { + // Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format + // `projects/*/secrets/*/versions/*`. + string name = 1 [ + (google.api.field_behavior) = REQUIRED, + (google.api.resource_reference) = { + type: "secretmanager.googleapis.com/SecretVersion" + } + ]; +} diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/accesssecretversion/AsyncAccessSecretVersion.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/accesssecretversion/AsyncAccessSecretVersion.java new file mode 100644 index 000000000000..c30cccd3f382 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/accesssecretversion/AsyncAccessSecretVersion.java @@ -0,0 +1,51 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_AccessSecretVersion_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretVersionName; + +public class AsyncAccessSecretVersion { + + public static void main(String[] args) throws Exception { + asyncAccessSecretVersion(); + } + + public static void asyncAccessSecretVersion() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + AccessSecretVersionRequest request = + AccessSecretVersionRequest.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .build(); + ApiFuture future = + secretManagerServiceClient.accessSecretVersionCallable().futureCall(request); + // Do something. + AccessSecretVersionResponse response = future.get(); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_AccessSecretVersion_async] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/accesssecretversion/SyncAccessSecretVersion.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/accesssecretversion/SyncAccessSecretVersion.java new file mode 100644 index 000000000000..14e32e8d1cc2 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/accesssecretversion/SyncAccessSecretVersion.java @@ -0,0 +1,48 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_AccessSecretVersion_sync] +import com.google.cloud.secretmanager.v1beta1.AccessSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretVersionName; + +public class SyncAccessSecretVersion { + + public static void main(String[] args) throws Exception { + syncAccessSecretVersion(); + } + + public static void syncAccessSecretVersion() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + AccessSecretVersionRequest request = + AccessSecretVersionRequest.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .build(); + AccessSecretVersionResponse response = + secretManagerServiceClient.accessSecretVersion(request); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_AccessSecretVersion_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/accesssecretversion/SyncAccessSecretVersionSecretversionname.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/accesssecretversion/SyncAccessSecretVersionSecretversionname.java new file mode 100644 index 000000000000..6656b7e4862f --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/accesssecretversion/SyncAccessSecretVersionSecretversionname.java @@ -0,0 +1,43 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_AccessSecretVersion_Secretversionname_sync] +import com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretVersionName; + +public class SyncAccessSecretVersionSecretversionname { + + public static void main(String[] args) throws Exception { + syncAccessSecretVersionSecretversionname(); + } + + public static void syncAccessSecretVersionSecretversionname() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + AccessSecretVersionResponse response = secretManagerServiceClient.accessSecretVersion(name); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_AccessSecretVersion_Secretversionname_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/accesssecretversion/SyncAccessSecretVersionString.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/accesssecretversion/SyncAccessSecretVersionString.java new file mode 100644 index 000000000000..0f528970ea91 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/accesssecretversion/SyncAccessSecretVersionString.java @@ -0,0 +1,43 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_AccessSecretVersion_String_sync] +import com.google.cloud.secretmanager.v1beta1.AccessSecretVersionResponse; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretVersionName; + +public class SyncAccessSecretVersionString { + + public static void main(String[] args) throws Exception { + syncAccessSecretVersionString(); + } + + public static void syncAccessSecretVersionString() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + String name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString(); + AccessSecretVersionResponse response = secretManagerServiceClient.accessSecretVersion(name); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_AccessSecretVersion_String_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/addsecretversion/AsyncAddSecretVersion.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/addsecretversion/AsyncAddSecretVersion.java new file mode 100644 index 000000000000..40da5d3d176c --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/addsecretversion/AsyncAddSecretVersion.java @@ -0,0 +1,53 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_AddSecretVersion_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretName; +import com.google.cloud.secretmanager.v1beta1.SecretPayload; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; + +public class AsyncAddSecretVersion { + + public static void main(String[] args) throws Exception { + asyncAddSecretVersion(); + } + + public static void asyncAddSecretVersion() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + AddSecretVersionRequest request = + AddSecretVersionRequest.newBuilder() + .setParent(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setPayload(SecretPayload.newBuilder().build()) + .build(); + ApiFuture future = + secretManagerServiceClient.addSecretVersionCallable().futureCall(request); + // Do something. + SecretVersion response = future.get(); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_AddSecretVersion_async] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/addsecretversion/SyncAddSecretVersion.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/addsecretversion/SyncAddSecretVersion.java new file mode 100644 index 000000000000..9824d3cf3043 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/addsecretversion/SyncAddSecretVersion.java @@ -0,0 +1,49 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_AddSecretVersion_sync] +import com.google.cloud.secretmanager.v1beta1.AddSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretName; +import com.google.cloud.secretmanager.v1beta1.SecretPayload; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; + +public class SyncAddSecretVersion { + + public static void main(String[] args) throws Exception { + syncAddSecretVersion(); + } + + public static void syncAddSecretVersion() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + AddSecretVersionRequest request = + AddSecretVersionRequest.newBuilder() + .setParent(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setPayload(SecretPayload.newBuilder().build()) + .build(); + SecretVersion response = secretManagerServiceClient.addSecretVersion(request); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_AddSecretVersion_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/addsecretversion/SyncAddSecretVersionSecretnameSecretpayload.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/addsecretversion/SyncAddSecretVersionSecretnameSecretpayload.java new file mode 100644 index 000000000000..eab91afa2f2e --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/addsecretversion/SyncAddSecretVersionSecretnameSecretpayload.java @@ -0,0 +1,45 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_AddSecretVersion_SecretnameSecretpayload_sync] +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretName; +import com.google.cloud.secretmanager.v1beta1.SecretPayload; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; + +public class SyncAddSecretVersionSecretnameSecretpayload { + + public static void main(String[] args) throws Exception { + syncAddSecretVersionSecretnameSecretpayload(); + } + + public static void syncAddSecretVersionSecretnameSecretpayload() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + SecretName parent = SecretName.of("[PROJECT]", "[SECRET]"); + SecretPayload payload = SecretPayload.newBuilder().build(); + SecretVersion response = secretManagerServiceClient.addSecretVersion(parent, payload); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_AddSecretVersion_SecretnameSecretpayload_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/addsecretversion/SyncAddSecretVersionStringSecretpayload.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/addsecretversion/SyncAddSecretVersionStringSecretpayload.java new file mode 100644 index 000000000000..d66726fef0a6 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/addsecretversion/SyncAddSecretVersionStringSecretpayload.java @@ -0,0 +1,45 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_AddSecretVersion_StringSecretpayload_sync] +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretName; +import com.google.cloud.secretmanager.v1beta1.SecretPayload; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; + +public class SyncAddSecretVersionStringSecretpayload { + + public static void main(String[] args) throws Exception { + syncAddSecretVersionStringSecretpayload(); + } + + public static void syncAddSecretVersionStringSecretpayload() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + String parent = SecretName.of("[PROJECT]", "[SECRET]").toString(); + SecretPayload payload = SecretPayload.newBuilder().build(); + SecretVersion response = secretManagerServiceClient.addSecretVersion(parent, payload); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_AddSecretVersion_StringSecretpayload_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/create/SyncCreateSetCredentialsProvider.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/create/SyncCreateSetCredentialsProvider.java new file mode 100644 index 000000000000..acc49fb4436c --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/create/SyncCreateSetCredentialsProvider.java @@ -0,0 +1,45 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_Create_SetCredentialsProvider_sync] +import com.google.api.gax.core.FixedCredentialsProvider; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceSettings; +import com.google.cloud.secretmanager.v1beta1.myCredentials; + +public class SyncCreateSetCredentialsProvider { + + public static void main(String[] args) throws Exception { + syncCreateSetCredentialsProvider(); + } + + public static void syncCreateSetCredentialsProvider() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + SecretManagerServiceSettings secretManagerServiceSettings = + SecretManagerServiceSettings.newBuilder() + .setCredentialsProvider(FixedCredentialsProvider.create(myCredentials)) + .build(); + SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create(secretManagerServiceSettings); + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_Create_SetCredentialsProvider_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/create/SyncCreateSetEndpoint.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/create/SyncCreateSetEndpoint.java new file mode 100644 index 000000000000..6be44d700858 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/create/SyncCreateSetEndpoint.java @@ -0,0 +1,42 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_Create_SetEndpoint_sync] +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceSettings; +import com.google.cloud.secretmanager.v1beta1.myEndpoint; + +public class SyncCreateSetEndpoint { + + public static void main(String[] args) throws Exception { + syncCreateSetEndpoint(); + } + + public static void syncCreateSetEndpoint() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + SecretManagerServiceSettings secretManagerServiceSettings = + SecretManagerServiceSettings.newBuilder().setEndpoint(myEndpoint).build(); + SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create(secretManagerServiceSettings); + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_Create_SetEndpoint_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/create/SyncCreateUseHttpJsonTransport.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/create/SyncCreateUseHttpJsonTransport.java new file mode 100644 index 000000000000..c62f3304132e --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/create/SyncCreateUseHttpJsonTransport.java @@ -0,0 +1,41 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_Create_UseHttpJsonTransport_sync] +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceSettings; + +public class SyncCreateUseHttpJsonTransport { + + public static void main(String[] args) throws Exception { + syncCreateUseHttpJsonTransport(); + } + + public static void syncCreateUseHttpJsonTransport() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + SecretManagerServiceSettings secretManagerServiceSettings = + SecretManagerServiceSettings.newHttpJsonBuilder().build(); + SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create(secretManagerServiceSettings); + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_Create_UseHttpJsonTransport_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/createsecret/AsyncCreateSecret.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/createsecret/AsyncCreateSecret.java new file mode 100644 index 000000000000..20160d1b2122 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/createsecret/AsyncCreateSecret.java @@ -0,0 +1,53 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_CreateSecret_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1beta1.CreateSecretRequest; +import com.google.cloud.secretmanager.v1beta1.ProjectName; +import com.google.cloud.secretmanager.v1beta1.Secret; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; + +public class AsyncCreateSecret { + + public static void main(String[] args) throws Exception { + asyncCreateSecret(); + } + + public static void asyncCreateSecret() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + CreateSecretRequest request = + CreateSecretRequest.newBuilder() + .setParent(ProjectName.of("[PROJECT]").toString()) + .setSecretId("secretId945974251") + .setSecret(Secret.newBuilder().build()) + .build(); + ApiFuture future = + secretManagerServiceClient.createSecretCallable().futureCall(request); + // Do something. + Secret response = future.get(); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_CreateSecret_async] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/createsecret/SyncCreateSecret.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/createsecret/SyncCreateSecret.java new file mode 100644 index 000000000000..2e824b6f439f --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/createsecret/SyncCreateSecret.java @@ -0,0 +1,49 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_CreateSecret_sync] +import com.google.cloud.secretmanager.v1beta1.CreateSecretRequest; +import com.google.cloud.secretmanager.v1beta1.ProjectName; +import com.google.cloud.secretmanager.v1beta1.Secret; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; + +public class SyncCreateSecret { + + public static void main(String[] args) throws Exception { + syncCreateSecret(); + } + + public static void syncCreateSecret() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + CreateSecretRequest request = + CreateSecretRequest.newBuilder() + .setParent(ProjectName.of("[PROJECT]").toString()) + .setSecretId("secretId945974251") + .setSecret(Secret.newBuilder().build()) + .build(); + Secret response = secretManagerServiceClient.createSecret(request); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_CreateSecret_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/createsecret/SyncCreateSecretProjectnameStringSecret.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/createsecret/SyncCreateSecretProjectnameStringSecret.java new file mode 100644 index 000000000000..cd92a3c021a4 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/createsecret/SyncCreateSecretProjectnameStringSecret.java @@ -0,0 +1,45 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_CreateSecret_ProjectnameStringSecret_sync] +import com.google.cloud.secretmanager.v1beta1.ProjectName; +import com.google.cloud.secretmanager.v1beta1.Secret; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; + +public class SyncCreateSecretProjectnameStringSecret { + + public static void main(String[] args) throws Exception { + syncCreateSecretProjectnameStringSecret(); + } + + public static void syncCreateSecretProjectnameStringSecret() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + ProjectName parent = ProjectName.of("[PROJECT]"); + String secretId = "secretId945974251"; + Secret secret = Secret.newBuilder().build(); + Secret response = secretManagerServiceClient.createSecret(parent, secretId, secret); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_CreateSecret_ProjectnameStringSecret_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/createsecret/SyncCreateSecretStringStringSecret.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/createsecret/SyncCreateSecretStringStringSecret.java new file mode 100644 index 000000000000..78bb3e98dbcc --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/createsecret/SyncCreateSecretStringStringSecret.java @@ -0,0 +1,45 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_CreateSecret_StringStringSecret_sync] +import com.google.cloud.secretmanager.v1beta1.ProjectName; +import com.google.cloud.secretmanager.v1beta1.Secret; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; + +public class SyncCreateSecretStringStringSecret { + + public static void main(String[] args) throws Exception { + syncCreateSecretStringStringSecret(); + } + + public static void syncCreateSecretStringStringSecret() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + String parent = ProjectName.of("[PROJECT]").toString(); + String secretId = "secretId945974251"; + Secret secret = Secret.newBuilder().build(); + Secret response = secretManagerServiceClient.createSecret(parent, secretId, secret); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_CreateSecret_StringStringSecret_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/deletesecret/AsyncDeleteSecret.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/deletesecret/AsyncDeleteSecret.java new file mode 100644 index 000000000000..aea54200826f --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/deletesecret/AsyncDeleteSecret.java @@ -0,0 +1,51 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_DeleteSecret_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretName; +import com.google.protobuf.Empty; + +public class AsyncDeleteSecret { + + public static void main(String[] args) throws Exception { + asyncDeleteSecret(); + } + + public static void asyncDeleteSecret() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + DeleteSecretRequest request = + DeleteSecretRequest.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .build(); + ApiFuture future = + secretManagerServiceClient.deleteSecretCallable().futureCall(request); + // Do something. + future.get(); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_DeleteSecret_async] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/deletesecret/SyncDeleteSecret.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/deletesecret/SyncDeleteSecret.java new file mode 100644 index 000000000000..13cf344427a0 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/deletesecret/SyncDeleteSecret.java @@ -0,0 +1,47 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_DeleteSecret_sync] +import com.google.cloud.secretmanager.v1beta1.DeleteSecretRequest; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretName; +import com.google.protobuf.Empty; + +public class SyncDeleteSecret { + + public static void main(String[] args) throws Exception { + syncDeleteSecret(); + } + + public static void syncDeleteSecret() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + DeleteSecretRequest request = + DeleteSecretRequest.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .build(); + secretManagerServiceClient.deleteSecret(request); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_DeleteSecret_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/deletesecret/SyncDeleteSecretSecretname.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/deletesecret/SyncDeleteSecretSecretname.java new file mode 100644 index 000000000000..5654b55932cb --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/deletesecret/SyncDeleteSecretSecretname.java @@ -0,0 +1,43 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_DeleteSecret_Secretname_sync] +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretName; +import com.google.protobuf.Empty; + +public class SyncDeleteSecretSecretname { + + public static void main(String[] args) throws Exception { + syncDeleteSecretSecretname(); + } + + public static void syncDeleteSecretSecretname() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + SecretName name = SecretName.of("[PROJECT]", "[SECRET]"); + secretManagerServiceClient.deleteSecret(name); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_DeleteSecret_Secretname_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/deletesecret/SyncDeleteSecretString.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/deletesecret/SyncDeleteSecretString.java new file mode 100644 index 000000000000..6a2311e4c0fd --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/deletesecret/SyncDeleteSecretString.java @@ -0,0 +1,43 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_DeleteSecret_String_sync] +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretName; +import com.google.protobuf.Empty; + +public class SyncDeleteSecretString { + + public static void main(String[] args) throws Exception { + syncDeleteSecretString(); + } + + public static void syncDeleteSecretString() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + String name = SecretName.of("[PROJECT]", "[SECRET]").toString(); + secretManagerServiceClient.deleteSecret(name); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_DeleteSecret_String_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/destroysecretversion/AsyncDestroySecretVersion.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/destroysecretversion/AsyncDestroySecretVersion.java new file mode 100644 index 000000000000..c4d3851ddd22 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/destroysecretversion/AsyncDestroySecretVersion.java @@ -0,0 +1,51 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_DestroySecretVersion_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; +import com.google.cloud.secretmanager.v1beta1.SecretVersionName; + +public class AsyncDestroySecretVersion { + + public static void main(String[] args) throws Exception { + asyncDestroySecretVersion(); + } + + public static void asyncDestroySecretVersion() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + DestroySecretVersionRequest request = + DestroySecretVersionRequest.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .build(); + ApiFuture future = + secretManagerServiceClient.destroySecretVersionCallable().futureCall(request); + // Do something. + SecretVersion response = future.get(); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_DestroySecretVersion_async] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/destroysecretversion/SyncDestroySecretVersion.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/destroysecretversion/SyncDestroySecretVersion.java new file mode 100644 index 000000000000..6260dc95b869 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/destroysecretversion/SyncDestroySecretVersion.java @@ -0,0 +1,47 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_DestroySecretVersion_sync] +import com.google.cloud.secretmanager.v1beta1.DestroySecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; +import com.google.cloud.secretmanager.v1beta1.SecretVersionName; + +public class SyncDestroySecretVersion { + + public static void main(String[] args) throws Exception { + syncDestroySecretVersion(); + } + + public static void syncDestroySecretVersion() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + DestroySecretVersionRequest request = + DestroySecretVersionRequest.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .build(); + SecretVersion response = secretManagerServiceClient.destroySecretVersion(request); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_DestroySecretVersion_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/destroysecretversion/SyncDestroySecretVersionSecretversionname.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/destroysecretversion/SyncDestroySecretVersionSecretversionname.java new file mode 100644 index 000000000000..2da43b4c1135 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/destroysecretversion/SyncDestroySecretVersionSecretversionname.java @@ -0,0 +1,43 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_DestroySecretVersion_Secretversionname_sync] +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; +import com.google.cloud.secretmanager.v1beta1.SecretVersionName; + +public class SyncDestroySecretVersionSecretversionname { + + public static void main(String[] args) throws Exception { + syncDestroySecretVersionSecretversionname(); + } + + public static void syncDestroySecretVersionSecretversionname() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + SecretVersion response = secretManagerServiceClient.destroySecretVersion(name); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_DestroySecretVersion_Secretversionname_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/destroysecretversion/SyncDestroySecretVersionString.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/destroysecretversion/SyncDestroySecretVersionString.java new file mode 100644 index 000000000000..1ec3762329ca --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/destroysecretversion/SyncDestroySecretVersionString.java @@ -0,0 +1,43 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_DestroySecretVersion_String_sync] +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; +import com.google.cloud.secretmanager.v1beta1.SecretVersionName; + +public class SyncDestroySecretVersionString { + + public static void main(String[] args) throws Exception { + syncDestroySecretVersionString(); + } + + public static void syncDestroySecretVersionString() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + String name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString(); + SecretVersion response = secretManagerServiceClient.destroySecretVersion(name); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_DestroySecretVersion_String_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/disablesecretversion/AsyncDisableSecretVersion.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/disablesecretversion/AsyncDisableSecretVersion.java new file mode 100644 index 000000000000..8b21821684c4 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/disablesecretversion/AsyncDisableSecretVersion.java @@ -0,0 +1,51 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_DisableSecretVersion_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; +import com.google.cloud.secretmanager.v1beta1.SecretVersionName; + +public class AsyncDisableSecretVersion { + + public static void main(String[] args) throws Exception { + asyncDisableSecretVersion(); + } + + public static void asyncDisableSecretVersion() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + DisableSecretVersionRequest request = + DisableSecretVersionRequest.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .build(); + ApiFuture future = + secretManagerServiceClient.disableSecretVersionCallable().futureCall(request); + // Do something. + SecretVersion response = future.get(); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_DisableSecretVersion_async] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/disablesecretversion/SyncDisableSecretVersion.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/disablesecretversion/SyncDisableSecretVersion.java new file mode 100644 index 000000000000..1ac93c771162 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/disablesecretversion/SyncDisableSecretVersion.java @@ -0,0 +1,47 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_DisableSecretVersion_sync] +import com.google.cloud.secretmanager.v1beta1.DisableSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; +import com.google.cloud.secretmanager.v1beta1.SecretVersionName; + +public class SyncDisableSecretVersion { + + public static void main(String[] args) throws Exception { + syncDisableSecretVersion(); + } + + public static void syncDisableSecretVersion() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + DisableSecretVersionRequest request = + DisableSecretVersionRequest.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .build(); + SecretVersion response = secretManagerServiceClient.disableSecretVersion(request); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_DisableSecretVersion_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/disablesecretversion/SyncDisableSecretVersionSecretversionname.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/disablesecretversion/SyncDisableSecretVersionSecretversionname.java new file mode 100644 index 000000000000..aee86def2db3 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/disablesecretversion/SyncDisableSecretVersionSecretversionname.java @@ -0,0 +1,43 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_DisableSecretVersion_Secretversionname_sync] +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; +import com.google.cloud.secretmanager.v1beta1.SecretVersionName; + +public class SyncDisableSecretVersionSecretversionname { + + public static void main(String[] args) throws Exception { + syncDisableSecretVersionSecretversionname(); + } + + public static void syncDisableSecretVersionSecretversionname() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + SecretVersion response = secretManagerServiceClient.disableSecretVersion(name); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_DisableSecretVersion_Secretversionname_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/disablesecretversion/SyncDisableSecretVersionString.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/disablesecretversion/SyncDisableSecretVersionString.java new file mode 100644 index 000000000000..a29c78a9d3ac --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/disablesecretversion/SyncDisableSecretVersionString.java @@ -0,0 +1,43 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_DisableSecretVersion_String_sync] +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; +import com.google.cloud.secretmanager.v1beta1.SecretVersionName; + +public class SyncDisableSecretVersionString { + + public static void main(String[] args) throws Exception { + syncDisableSecretVersionString(); + } + + public static void syncDisableSecretVersionString() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + String name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString(); + SecretVersion response = secretManagerServiceClient.disableSecretVersion(name); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_DisableSecretVersion_String_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/enablesecretversion/AsyncEnableSecretVersion.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/enablesecretversion/AsyncEnableSecretVersion.java new file mode 100644 index 000000000000..c930284c93ad --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/enablesecretversion/AsyncEnableSecretVersion.java @@ -0,0 +1,51 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_EnableSecretVersion_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; +import com.google.cloud.secretmanager.v1beta1.SecretVersionName; + +public class AsyncEnableSecretVersion { + + public static void main(String[] args) throws Exception { + asyncEnableSecretVersion(); + } + + public static void asyncEnableSecretVersion() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + EnableSecretVersionRequest request = + EnableSecretVersionRequest.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .build(); + ApiFuture future = + secretManagerServiceClient.enableSecretVersionCallable().futureCall(request); + // Do something. + SecretVersion response = future.get(); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_EnableSecretVersion_async] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/enablesecretversion/SyncEnableSecretVersion.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/enablesecretversion/SyncEnableSecretVersion.java new file mode 100644 index 000000000000..5ce9dca6d537 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/enablesecretversion/SyncEnableSecretVersion.java @@ -0,0 +1,47 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_EnableSecretVersion_sync] +import com.google.cloud.secretmanager.v1beta1.EnableSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; +import com.google.cloud.secretmanager.v1beta1.SecretVersionName; + +public class SyncEnableSecretVersion { + + public static void main(String[] args) throws Exception { + syncEnableSecretVersion(); + } + + public static void syncEnableSecretVersion() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + EnableSecretVersionRequest request = + EnableSecretVersionRequest.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .build(); + SecretVersion response = secretManagerServiceClient.enableSecretVersion(request); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_EnableSecretVersion_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/enablesecretversion/SyncEnableSecretVersionSecretversionname.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/enablesecretversion/SyncEnableSecretVersionSecretversionname.java new file mode 100644 index 000000000000..230c72893491 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/enablesecretversion/SyncEnableSecretVersionSecretversionname.java @@ -0,0 +1,43 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_EnableSecretVersion_Secretversionname_sync] +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; +import com.google.cloud.secretmanager.v1beta1.SecretVersionName; + +public class SyncEnableSecretVersionSecretversionname { + + public static void main(String[] args) throws Exception { + syncEnableSecretVersionSecretversionname(); + } + + public static void syncEnableSecretVersionSecretversionname() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + SecretVersion response = secretManagerServiceClient.enableSecretVersion(name); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_EnableSecretVersion_Secretversionname_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/enablesecretversion/SyncEnableSecretVersionString.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/enablesecretversion/SyncEnableSecretVersionString.java new file mode 100644 index 000000000000..a1c3a3155ea3 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/enablesecretversion/SyncEnableSecretVersionString.java @@ -0,0 +1,43 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_EnableSecretVersion_String_sync] +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; +import com.google.cloud.secretmanager.v1beta1.SecretVersionName; + +public class SyncEnableSecretVersionString { + + public static void main(String[] args) throws Exception { + syncEnableSecretVersionString(); + } + + public static void syncEnableSecretVersionString() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + String name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString(); + SecretVersion response = secretManagerServiceClient.enableSecretVersion(name); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_EnableSecretVersion_String_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getiampolicy/AsyncGetIamPolicy.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getiampolicy/AsyncGetIamPolicy.java new file mode 100644 index 000000000000..5fc572a9bdb9 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getiampolicy/AsyncGetIamPolicy.java @@ -0,0 +1,53 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_GetIamPolicy_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretName; +import com.google.iam.v1.GetIamPolicyRequest; +import com.google.iam.v1.GetPolicyOptions; +import com.google.iam.v1.Policy; + +public class AsyncGetIamPolicy { + + public static void main(String[] args) throws Exception { + asyncGetIamPolicy(); + } + + public static void asyncGetIamPolicy() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + GetIamPolicyRequest request = + GetIamPolicyRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setOptions(GetPolicyOptions.newBuilder().build()) + .build(); + ApiFuture future = + secretManagerServiceClient.getIamPolicyCallable().futureCall(request); + // Do something. + Policy response = future.get(); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_GetIamPolicy_async] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getiampolicy/SyncGetIamPolicy.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getiampolicy/SyncGetIamPolicy.java new file mode 100644 index 000000000000..531576e2e422 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getiampolicy/SyncGetIamPolicy.java @@ -0,0 +1,49 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_GetIamPolicy_sync] +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretName; +import com.google.iam.v1.GetIamPolicyRequest; +import com.google.iam.v1.GetPolicyOptions; +import com.google.iam.v1.Policy; + +public class SyncGetIamPolicy { + + public static void main(String[] args) throws Exception { + syncGetIamPolicy(); + } + + public static void syncGetIamPolicy() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + GetIamPolicyRequest request = + GetIamPolicyRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setOptions(GetPolicyOptions.newBuilder().build()) + .build(); + Policy response = secretManagerServiceClient.getIamPolicy(request); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_GetIamPolicy_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecret/AsyncGetSecret.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecret/AsyncGetSecret.java new file mode 100644 index 000000000000..0788be41ea24 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecret/AsyncGetSecret.java @@ -0,0 +1,50 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_GetSecret_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1beta1.GetSecretRequest; +import com.google.cloud.secretmanager.v1beta1.Secret; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretName; + +public class AsyncGetSecret { + + public static void main(String[] args) throws Exception { + asyncGetSecret(); + } + + public static void asyncGetSecret() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + GetSecretRequest request = + GetSecretRequest.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .build(); + ApiFuture future = secretManagerServiceClient.getSecretCallable().futureCall(request); + // Do something. + Secret response = future.get(); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_GetSecret_async] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecret/SyncGetSecret.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecret/SyncGetSecret.java new file mode 100644 index 000000000000..d31039e73d1b --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecret/SyncGetSecret.java @@ -0,0 +1,47 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_GetSecret_sync] +import com.google.cloud.secretmanager.v1beta1.GetSecretRequest; +import com.google.cloud.secretmanager.v1beta1.Secret; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretName; + +public class SyncGetSecret { + + public static void main(String[] args) throws Exception { + syncGetSecret(); + } + + public static void syncGetSecret() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + GetSecretRequest request = + GetSecretRequest.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .build(); + Secret response = secretManagerServiceClient.getSecret(request); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_GetSecret_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecret/SyncGetSecretSecretname.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecret/SyncGetSecretSecretname.java new file mode 100644 index 000000000000..d2a16a9a1008 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecret/SyncGetSecretSecretname.java @@ -0,0 +1,43 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_GetSecret_Secretname_sync] +import com.google.cloud.secretmanager.v1beta1.Secret; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretName; + +public class SyncGetSecretSecretname { + + public static void main(String[] args) throws Exception { + syncGetSecretSecretname(); + } + + public static void syncGetSecretSecretname() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + SecretName name = SecretName.of("[PROJECT]", "[SECRET]"); + Secret response = secretManagerServiceClient.getSecret(name); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_GetSecret_Secretname_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecret/SyncGetSecretString.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecret/SyncGetSecretString.java new file mode 100644 index 000000000000..911e41b0898f --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecret/SyncGetSecretString.java @@ -0,0 +1,43 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_GetSecret_String_sync] +import com.google.cloud.secretmanager.v1beta1.Secret; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretName; + +public class SyncGetSecretString { + + public static void main(String[] args) throws Exception { + syncGetSecretString(); + } + + public static void syncGetSecretString() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + String name = SecretName.of("[PROJECT]", "[SECRET]").toString(); + Secret response = secretManagerServiceClient.getSecret(name); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_GetSecret_String_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecretversion/AsyncGetSecretVersion.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecretversion/AsyncGetSecretVersion.java new file mode 100644 index 000000000000..011b97f86c6b --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecretversion/AsyncGetSecretVersion.java @@ -0,0 +1,51 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_GetSecretVersion_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; +import com.google.cloud.secretmanager.v1beta1.SecretVersionName; + +public class AsyncGetSecretVersion { + + public static void main(String[] args) throws Exception { + asyncGetSecretVersion(); + } + + public static void asyncGetSecretVersion() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + GetSecretVersionRequest request = + GetSecretVersionRequest.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .build(); + ApiFuture future = + secretManagerServiceClient.getSecretVersionCallable().futureCall(request); + // Do something. + SecretVersion response = future.get(); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_GetSecretVersion_async] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecretversion/SyncGetSecretVersion.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecretversion/SyncGetSecretVersion.java new file mode 100644 index 000000000000..265474eba76e --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecretversion/SyncGetSecretVersion.java @@ -0,0 +1,47 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_GetSecretVersion_sync] +import com.google.cloud.secretmanager.v1beta1.GetSecretVersionRequest; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; +import com.google.cloud.secretmanager.v1beta1.SecretVersionName; + +public class SyncGetSecretVersion { + + public static void main(String[] args) throws Exception { + syncGetSecretVersion(); + } + + public static void syncGetSecretVersion() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + GetSecretVersionRequest request = + GetSecretVersionRequest.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .build(); + SecretVersion response = secretManagerServiceClient.getSecretVersion(request); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_GetSecretVersion_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecretversion/SyncGetSecretVersionSecretversionname.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecretversion/SyncGetSecretVersionSecretversionname.java new file mode 100644 index 000000000000..af6b0a0e80ed --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecretversion/SyncGetSecretVersionSecretversionname.java @@ -0,0 +1,43 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_GetSecretVersion_Secretversionname_sync] +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; +import com.google.cloud.secretmanager.v1beta1.SecretVersionName; + +public class SyncGetSecretVersionSecretversionname { + + public static void main(String[] args) throws Exception { + syncGetSecretVersionSecretversionname(); + } + + public static void syncGetSecretVersionSecretversionname() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + SecretVersion response = secretManagerServiceClient.getSecretVersion(name); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_GetSecretVersion_Secretversionname_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecretversion/SyncGetSecretVersionString.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecretversion/SyncGetSecretVersionString.java new file mode 100644 index 000000000000..03dddd627ae0 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/getsecretversion/SyncGetSecretVersionString.java @@ -0,0 +1,43 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_GetSecretVersion_String_sync] +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; +import com.google.cloud.secretmanager.v1beta1.SecretVersionName; + +public class SyncGetSecretVersionString { + + public static void main(String[] args) throws Exception { + syncGetSecretVersionString(); + } + + public static void syncGetSecretVersionString() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + String name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString(); + SecretVersion response = secretManagerServiceClient.getSecretVersion(name); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_GetSecretVersion_String_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecrets/AsyncListSecrets.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecrets/AsyncListSecrets.java new file mode 100644 index 000000000000..7e72bae2d85f --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecrets/AsyncListSecrets.java @@ -0,0 +1,55 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_ListSecrets_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1beta1.ListSecretsRequest; +import com.google.cloud.secretmanager.v1beta1.ProjectName; +import com.google.cloud.secretmanager.v1beta1.Secret; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; + +public class AsyncListSecrets { + + public static void main(String[] args) throws Exception { + asyncListSecrets(); + } + + public static void asyncListSecrets() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + ListSecretsRequest request = + ListSecretsRequest.newBuilder() + .setParent(ProjectName.of("[PROJECT]").toString()) + .setPageSize(883849137) + .setPageToken("pageToken873572522") + .build(); + ApiFuture future = + secretManagerServiceClient.listSecretsPagedCallable().futureCall(request); + // Do something. + for (Secret element : future.get().iterateAll()) { + // doThingsWith(element); + } + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_ListSecrets_async] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecrets/AsyncListSecretsPaged.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecrets/AsyncListSecretsPaged.java new file mode 100644 index 000000000000..4a1cf642d736 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecrets/AsyncListSecretsPaged.java @@ -0,0 +1,63 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_ListSecrets_Paged_async] +import com.google.cloud.secretmanager.v1beta1.ListSecretsRequest; +import com.google.cloud.secretmanager.v1beta1.ListSecretsResponse; +import com.google.cloud.secretmanager.v1beta1.ProjectName; +import com.google.cloud.secretmanager.v1beta1.Secret; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.common.base.Strings; + +public class AsyncListSecretsPaged { + + public static void main(String[] args) throws Exception { + asyncListSecretsPaged(); + } + + public static void asyncListSecretsPaged() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + ListSecretsRequest request = + ListSecretsRequest.newBuilder() + .setParent(ProjectName.of("[PROJECT]").toString()) + .setPageSize(883849137) + .setPageToken("pageToken873572522") + .build(); + while (true) { + ListSecretsResponse response = + secretManagerServiceClient.listSecretsCallable().call(request); + for (Secret element : response.getSecretsList()) { + // doThingsWith(element); + } + String nextPageToken = response.getNextPageToken(); + if (!Strings.isNullOrEmpty(nextPageToken)) { + request = request.toBuilder().setPageToken(nextPageToken).build(); + } else { + break; + } + } + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_ListSecrets_Paged_async] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecrets/SyncListSecrets.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecrets/SyncListSecrets.java new file mode 100644 index 000000000000..e6fcfec5af05 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecrets/SyncListSecrets.java @@ -0,0 +1,51 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_ListSecrets_sync] +import com.google.cloud.secretmanager.v1beta1.ListSecretsRequest; +import com.google.cloud.secretmanager.v1beta1.ProjectName; +import com.google.cloud.secretmanager.v1beta1.Secret; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; + +public class SyncListSecrets { + + public static void main(String[] args) throws Exception { + syncListSecrets(); + } + + public static void syncListSecrets() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + ListSecretsRequest request = + ListSecretsRequest.newBuilder() + .setParent(ProjectName.of("[PROJECT]").toString()) + .setPageSize(883849137) + .setPageToken("pageToken873572522") + .build(); + for (Secret element : secretManagerServiceClient.listSecrets(request).iterateAll()) { + // doThingsWith(element); + } + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_ListSecrets_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecrets/SyncListSecretsProjectname.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecrets/SyncListSecretsProjectname.java new file mode 100644 index 000000000000..4e4078f698d2 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecrets/SyncListSecretsProjectname.java @@ -0,0 +1,45 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_ListSecrets_Projectname_sync] +import com.google.cloud.secretmanager.v1beta1.ProjectName; +import com.google.cloud.secretmanager.v1beta1.Secret; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; + +public class SyncListSecretsProjectname { + + public static void main(String[] args) throws Exception { + syncListSecretsProjectname(); + } + + public static void syncListSecretsProjectname() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + ProjectName parent = ProjectName.of("[PROJECT]"); + for (Secret element : secretManagerServiceClient.listSecrets(parent).iterateAll()) { + // doThingsWith(element); + } + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_ListSecrets_Projectname_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecrets/SyncListSecretsString.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecrets/SyncListSecretsString.java new file mode 100644 index 000000000000..7a82c6f54f14 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecrets/SyncListSecretsString.java @@ -0,0 +1,45 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_ListSecrets_String_sync] +import com.google.cloud.secretmanager.v1beta1.ProjectName; +import com.google.cloud.secretmanager.v1beta1.Secret; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; + +public class SyncListSecretsString { + + public static void main(String[] args) throws Exception { + syncListSecretsString(); + } + + public static void syncListSecretsString() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + String parent = ProjectName.of("[PROJECT]").toString(); + for (Secret element : secretManagerServiceClient.listSecrets(parent).iterateAll()) { + // doThingsWith(element); + } + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_ListSecrets_String_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecretversions/AsyncListSecretVersions.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecretversions/AsyncListSecretVersions.java new file mode 100644 index 000000000000..6c46d7cef08b --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecretversions/AsyncListSecretVersions.java @@ -0,0 +1,55 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_ListSecretVersions_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretName; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; + +public class AsyncListSecretVersions { + + public static void main(String[] args) throws Exception { + asyncListSecretVersions(); + } + + public static void asyncListSecretVersions() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + ListSecretVersionsRequest request = + ListSecretVersionsRequest.newBuilder() + .setParent(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setPageSize(883849137) + .setPageToken("pageToken873572522") + .build(); + ApiFuture future = + secretManagerServiceClient.listSecretVersionsPagedCallable().futureCall(request); + // Do something. + for (SecretVersion element : future.get().iterateAll()) { + // doThingsWith(element); + } + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_ListSecretVersions_async] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecretversions/AsyncListSecretVersionsPaged.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecretversions/AsyncListSecretVersionsPaged.java new file mode 100644 index 000000000000..4853544821bd --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecretversions/AsyncListSecretVersionsPaged.java @@ -0,0 +1,63 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_ListSecretVersions_Paged_async] +import com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest; +import com.google.cloud.secretmanager.v1beta1.ListSecretVersionsResponse; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretName; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; +import com.google.common.base.Strings; + +public class AsyncListSecretVersionsPaged { + + public static void main(String[] args) throws Exception { + asyncListSecretVersionsPaged(); + } + + public static void asyncListSecretVersionsPaged() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + ListSecretVersionsRequest request = + ListSecretVersionsRequest.newBuilder() + .setParent(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setPageSize(883849137) + .setPageToken("pageToken873572522") + .build(); + while (true) { + ListSecretVersionsResponse response = + secretManagerServiceClient.listSecretVersionsCallable().call(request); + for (SecretVersion element : response.getVersionsList()) { + // doThingsWith(element); + } + String nextPageToken = response.getNextPageToken(); + if (!Strings.isNullOrEmpty(nextPageToken)) { + request = request.toBuilder().setPageToken(nextPageToken).build(); + } else { + break; + } + } + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_ListSecretVersions_Paged_async] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecretversions/SyncListSecretVersions.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecretversions/SyncListSecretVersions.java new file mode 100644 index 000000000000..2b7a330efa5c --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecretversions/SyncListSecretVersions.java @@ -0,0 +1,52 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_ListSecretVersions_sync] +import com.google.cloud.secretmanager.v1beta1.ListSecretVersionsRequest; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretName; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; + +public class SyncListSecretVersions { + + public static void main(String[] args) throws Exception { + syncListSecretVersions(); + } + + public static void syncListSecretVersions() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + ListSecretVersionsRequest request = + ListSecretVersionsRequest.newBuilder() + .setParent(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setPageSize(883849137) + .setPageToken("pageToken873572522") + .build(); + for (SecretVersion element : + secretManagerServiceClient.listSecretVersions(request).iterateAll()) { + // doThingsWith(element); + } + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_ListSecretVersions_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecretversions/SyncListSecretVersionsSecretname.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecretversions/SyncListSecretVersionsSecretname.java new file mode 100644 index 000000000000..8ab7d4464f66 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecretversions/SyncListSecretVersionsSecretname.java @@ -0,0 +1,46 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_ListSecretVersions_Secretname_sync] +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretName; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; + +public class SyncListSecretVersionsSecretname { + + public static void main(String[] args) throws Exception { + syncListSecretVersionsSecretname(); + } + + public static void syncListSecretVersionsSecretname() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + SecretName parent = SecretName.of("[PROJECT]", "[SECRET]"); + for (SecretVersion element : + secretManagerServiceClient.listSecretVersions(parent).iterateAll()) { + // doThingsWith(element); + } + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_ListSecretVersions_Secretname_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecretversions/SyncListSecretVersionsString.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecretversions/SyncListSecretVersionsString.java new file mode 100644 index 000000000000..eab5fa3eeb24 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/listsecretversions/SyncListSecretVersionsString.java @@ -0,0 +1,46 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_ListSecretVersions_String_sync] +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretName; +import com.google.cloud.secretmanager.v1beta1.SecretVersion; + +public class SyncListSecretVersionsString { + + public static void main(String[] args) throws Exception { + syncListSecretVersionsString(); + } + + public static void syncListSecretVersionsString() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + String parent = SecretName.of("[PROJECT]", "[SECRET]").toString(); + for (SecretVersion element : + secretManagerServiceClient.listSecretVersions(parent).iterateAll()) { + // doThingsWith(element); + } + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_ListSecretVersions_String_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/setiampolicy/AsyncSetIamPolicy.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/setiampolicy/AsyncSetIamPolicy.java new file mode 100644 index 000000000000..3992653726f3 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/setiampolicy/AsyncSetIamPolicy.java @@ -0,0 +1,54 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_SetIamPolicy_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretName; +import com.google.iam.v1.Policy; +import com.google.iam.v1.SetIamPolicyRequest; +import com.google.protobuf.FieldMask; + +public class AsyncSetIamPolicy { + + public static void main(String[] args) throws Exception { + asyncSetIamPolicy(); + } + + public static void asyncSetIamPolicy() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + SetIamPolicyRequest request = + SetIamPolicyRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setPolicy(Policy.newBuilder().build()) + .setUpdateMask(FieldMask.newBuilder().build()) + .build(); + ApiFuture future = + secretManagerServiceClient.setIamPolicyCallable().futureCall(request); + // Do something. + Policy response = future.get(); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_SetIamPolicy_async] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/setiampolicy/SyncSetIamPolicy.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/setiampolicy/SyncSetIamPolicy.java new file mode 100644 index 000000000000..174e45c196ed --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/setiampolicy/SyncSetIamPolicy.java @@ -0,0 +1,50 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_SetIamPolicy_sync] +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretName; +import com.google.iam.v1.Policy; +import com.google.iam.v1.SetIamPolicyRequest; +import com.google.protobuf.FieldMask; + +public class SyncSetIamPolicy { + + public static void main(String[] args) throws Exception { + syncSetIamPolicy(); + } + + public static void syncSetIamPolicy() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + SetIamPolicyRequest request = + SetIamPolicyRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setPolicy(Policy.newBuilder().build()) + .setUpdateMask(FieldMask.newBuilder().build()) + .build(); + Policy response = secretManagerServiceClient.setIamPolicy(request); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_SetIamPolicy_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/testiampermissions/AsyncTestIamPermissions.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/testiampermissions/AsyncTestIamPermissions.java new file mode 100644 index 000000000000..68d8eaf646ba --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/testiampermissions/AsyncTestIamPermissions.java @@ -0,0 +1,53 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_TestIamPermissions_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretName; +import com.google.iam.v1.TestIamPermissionsRequest; +import com.google.iam.v1.TestIamPermissionsResponse; +import java.util.ArrayList; + +public class AsyncTestIamPermissions { + + public static void main(String[] args) throws Exception { + asyncTestIamPermissions(); + } + + public static void asyncTestIamPermissions() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + TestIamPermissionsRequest request = + TestIamPermissionsRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .addAllPermissions(new ArrayList()) + .build(); + ApiFuture future = + secretManagerServiceClient.testIamPermissionsCallable().futureCall(request); + // Do something. + TestIamPermissionsResponse response = future.get(); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_TestIamPermissions_async] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/testiampermissions/SyncTestIamPermissions.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/testiampermissions/SyncTestIamPermissions.java new file mode 100644 index 000000000000..d5ddc9df95be --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/testiampermissions/SyncTestIamPermissions.java @@ -0,0 +1,49 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_TestIamPermissions_sync] +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.SecretName; +import com.google.iam.v1.TestIamPermissionsRequest; +import com.google.iam.v1.TestIamPermissionsResponse; +import java.util.ArrayList; + +public class SyncTestIamPermissions { + + public static void main(String[] args) throws Exception { + syncTestIamPermissions(); + } + + public static void syncTestIamPermissions() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + TestIamPermissionsRequest request = + TestIamPermissionsRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .addAllPermissions(new ArrayList()) + .build(); + TestIamPermissionsResponse response = secretManagerServiceClient.testIamPermissions(request); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_TestIamPermissions_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/updatesecret/AsyncUpdateSecret.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/updatesecret/AsyncUpdateSecret.java new file mode 100644 index 000000000000..e69fd8f68325 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/updatesecret/AsyncUpdateSecret.java @@ -0,0 +1,52 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_UpdateSecret_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1beta1.Secret; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest; +import com.google.protobuf.FieldMask; + +public class AsyncUpdateSecret { + + public static void main(String[] args) throws Exception { + asyncUpdateSecret(); + } + + public static void asyncUpdateSecret() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + UpdateSecretRequest request = + UpdateSecretRequest.newBuilder() + .setSecret(Secret.newBuilder().build()) + .setUpdateMask(FieldMask.newBuilder().build()) + .build(); + ApiFuture future = + secretManagerServiceClient.updateSecretCallable().futureCall(request); + // Do something. + Secret response = future.get(); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_UpdateSecret_async] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/updatesecret/SyncUpdateSecret.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/updatesecret/SyncUpdateSecret.java new file mode 100644 index 000000000000..e051222afbfa --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/updatesecret/SyncUpdateSecret.java @@ -0,0 +1,48 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_UpdateSecret_sync] +import com.google.cloud.secretmanager.v1beta1.Secret; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1beta1.UpdateSecretRequest; +import com.google.protobuf.FieldMask; + +public class SyncUpdateSecret { + + public static void main(String[] args) throws Exception { + syncUpdateSecret(); + } + + public static void syncUpdateSecret() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + UpdateSecretRequest request = + UpdateSecretRequest.newBuilder() + .setSecret(Secret.newBuilder().build()) + .setUpdateMask(FieldMask.newBuilder().build()) + .build(); + Secret response = secretManagerServiceClient.updateSecret(request); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_UpdateSecret_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/updatesecret/SyncUpdateSecretSecretFieldmask.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/updatesecret/SyncUpdateSecretSecretFieldmask.java new file mode 100644 index 000000000000..c3997e00fe0d --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservice/updatesecret/SyncUpdateSecretSecretFieldmask.java @@ -0,0 +1,44 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerService_UpdateSecret_SecretFieldmask_sync] +import com.google.cloud.secretmanager.v1beta1.Secret; +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceClient; +import com.google.protobuf.FieldMask; + +public class SyncUpdateSecretSecretFieldmask { + + public static void main(String[] args) throws Exception { + syncUpdateSecretSecretFieldmask(); + } + + public static void syncUpdateSecretSecretFieldmask() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + Secret secret = Secret.newBuilder().build(); + FieldMask updateMask = FieldMask.newBuilder().build(); + Secret response = secretManagerServiceClient.updateSecret(secret, updateMask); + } + } +} +// [END secretmanager_v1beta1_generated_SecretManagerService_UpdateSecret_SecretFieldmask_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservicesettings/createsecret/SyncCreateSecret.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservicesettings/createsecret/SyncCreateSecret.java new file mode 100644 index 000000000000..c9b5e8409cb0 --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/secretmanagerservicesettings/createsecret/SyncCreateSecret.java @@ -0,0 +1,57 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerServiceSettings_CreateSecret_sync] +import com.google.cloud.secretmanager.v1beta1.SecretManagerServiceSettings; +import java.time.Duration; + +public class SyncCreateSecret { + + public static void main(String[] args) throws Exception { + syncCreateSecret(); + } + + public static void syncCreateSecret() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + SecretManagerServiceSettings.Builder secretManagerServiceSettingsBuilder = + SecretManagerServiceSettings.newBuilder(); + secretManagerServiceSettingsBuilder + .createSecretSettings() + .setRetrySettings( + secretManagerServiceSettingsBuilder + .createSecretSettings() + .getRetrySettings() + .toBuilder() + .setInitialRetryDelayDuration(Duration.ofSeconds(1)) + .setInitialRpcTimeoutDuration(Duration.ofSeconds(5)) + .setMaxAttempts(5) + .setMaxRetryDelayDuration(Duration.ofSeconds(30)) + .setMaxRpcTimeoutDuration(Duration.ofSeconds(60)) + .setRetryDelayMultiplier(1.3) + .setRpcTimeoutMultiplier(1.5) + .setTotalTimeoutDuration(Duration.ofSeconds(300)) + .build()); + SecretManagerServiceSettings secretManagerServiceSettings = + secretManagerServiceSettingsBuilder.build(); + } +} +// [END secretmanager_v1beta1_generated_SecretManagerServiceSettings_CreateSecret_sync] diff --git a/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/stub/secretmanagerservicestubsettings/createsecret/SyncCreateSecret.java b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/stub/secretmanagerservicestubsettings/createsecret/SyncCreateSecret.java new file mode 100644 index 000000000000..a623e176defa --- /dev/null +++ b/java-secretmanager/samples/snippets/generated/com/google/cloud/secretmanager/v1beta1/stub/secretmanagerservicestubsettings/createsecret/SyncCreateSecret.java @@ -0,0 +1,57 @@ +/* + * Copyright 2025 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1beta1.stub.samples; + +// [START secretmanager_v1beta1_generated_SecretManagerServiceStubSettings_CreateSecret_sync] +import com.google.cloud.secretmanager.v1beta1.stub.SecretManagerServiceStubSettings; +import java.time.Duration; + +public class SyncCreateSecret { + + public static void main(String[] args) throws Exception { + syncCreateSecret(); + } + + public static void syncCreateSecret() throws Exception { + // This snippet has been automatically generated and should be regarded as a code template only. + // It will require modifications to work: + // - It may require correct/in-range values for request initialization. + // - It may require specifying regional endpoints when creating the service client as shown in + // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library + SecretManagerServiceStubSettings.Builder secretManagerServiceSettingsBuilder = + SecretManagerServiceStubSettings.newBuilder(); + secretManagerServiceSettingsBuilder + .createSecretSettings() + .setRetrySettings( + secretManagerServiceSettingsBuilder + .createSecretSettings() + .getRetrySettings() + .toBuilder() + .setInitialRetryDelayDuration(Duration.ofSeconds(1)) + .setInitialRpcTimeoutDuration(Duration.ofSeconds(5)) + .setMaxAttempts(5) + .setMaxRetryDelayDuration(Duration.ofSeconds(30)) + .setMaxRpcTimeoutDuration(Duration.ofSeconds(60)) + .setRetryDelayMultiplier(1.3) + .setRpcTimeoutMultiplier(1.5) + .setTotalTimeoutDuration(Duration.ofSeconds(300)) + .build()); + SecretManagerServiceStubSettings secretManagerServiceSettings = + secretManagerServiceSettingsBuilder.build(); + } +} +// [END secretmanager_v1beta1_generated_SecretManagerServiceStubSettings_CreateSecret_sync] diff --git a/versions.txt b/versions.txt index a4cf9bffcf1d..fdf98180a768 100644 --- a/versions.txt +++ b/versions.txt @@ -825,6 +825,8 @@ proto-google-cloud-valkey-v1:0.2.0:0.3.0-SNAPSHOT proto-google-cloud-valkey-v1beta:0.2.0:0.3.0-SNAPSHOT proto-google-cloud-cloudquotas-v1beta:0.24.0:0.25.0-SNAPSHOT grpc-google-cloud-cloudquotas-v1beta:0.24.0:0.25.0-SNAPSHOT +proto-google-cloud-secretmanager-v1beta1:2.57.0-SNAPSHOT:2.57.0-SNAPSHOT +grpc-google-cloud-secretmanager-v1beta1:2.57.0-SNAPSHOT:2.57.0-SNAPSHOT google-cloud-parametermanager:0.0.0:0.0.1-SNAPSHOT proto-google-cloud-parametermanager-v1:0.0.0:0.0.1-SNAPSHOT grpc-google-cloud-parametermanager-v1:0.0.0:0.0.1-SNAPSHOT