From eee435821b1c52fe5b2604ddf1183ae95efe774f Mon Sep 17 00:00:00 2001 From: WhiteSource Renovate Date: Thu, 26 May 2022 00:20:13 +0200 Subject: [PATCH 01/19] chore(deps): update dependency com.google.cloud:google-cloud-secretmanager to v2.2.0 (#778) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit [![Mend Renovate](https://app.renovatebot.com/images/banner.svg)](https://renovatebot.com) This PR contains the following updates: | Package | Change | Age | Adoption | Passing | Confidence | |---|---|---|---|---|---| | [com.google.cloud:google-cloud-secretmanager](https://togithub.com/googleapis/java-secretmanager) | `2.1.7` -> `2.2.0` | [![age](https://badges.renovateapi.com/packages/maven/com.google.cloud:google-cloud-secretmanager/2.2.0/age-slim)](https://docs.renovatebot.com/merge-confidence/) | [![adoption](https://badges.renovateapi.com/packages/maven/com.google.cloud:google-cloud-secretmanager/2.2.0/adoption-slim)](https://docs.renovatebot.com/merge-confidence/) | [![passing](https://badges.renovateapi.com/packages/maven/com.google.cloud:google-cloud-secretmanager/2.2.0/compatibility-slim/2.1.7)](https://docs.renovatebot.com/merge-confidence/) | [![confidence](https://badges.renovateapi.com/packages/maven/com.google.cloud:google-cloud-secretmanager/2.2.0/confidence-slim/2.1.7)](https://docs.renovatebot.com/merge-confidence/) | --- ### Configuration 📅 **Schedule**: At any time (no schedule defined). 🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied. ♻ **Rebasing**: Renovate will not automatically rebase this PR, because other commits have been found. 🔕 **Ignore**: Close this PR and you won't be reminded about these updates again. --- - [ ] If you want to rebase/retry this PR, click this checkbox. ⚠ **Warning**: custom changes will be lost. --- This PR has been generated by [Mend Renovate](https://www.mend.io/free-developer-tools/renovate/). View repository job log [here](https://app.renovatebot.com/dashboard#github/googleapis/java-secretmanager). --- README.md | 6 +++--- samples/install-without-bom/pom.xml | 2 +- samples/snapshot/pom.xml | 2 +- 3 files changed, 5 insertions(+), 5 deletions(-) diff --git a/README.md b/README.md index bf5f5808..fc5c4585 100644 --- a/README.md +++ b/README.md @@ -42,7 +42,7 @@ If you are using Maven without BOM, add this to your dependencies: com.google.cloud google-cloud-secretmanager - 2.1.7 + 2.2.0 ``` @@ -57,13 +57,13 @@ implementation 'com.google.cloud:google-cloud-secretmanager' If you are using Gradle without BOM, add this to your dependencies ```Groovy -implementation 'com.google.cloud:google-cloud-secretmanager:2.1.7' +implementation 'com.google.cloud:google-cloud-secretmanager:2.2.0' ``` If you are using SBT, add this to your dependencies ```Scala -libraryDependencies += "com.google.cloud" % "google-cloud-secretmanager" % "2.1.7" +libraryDependencies += "com.google.cloud" % "google-cloud-secretmanager" % "2.2.0" ``` ## Authentication diff --git a/samples/install-without-bom/pom.xml b/samples/install-without-bom/pom.xml index ca51f949..35393dae 100644 --- a/samples/install-without-bom/pom.xml +++ b/samples/install-without-bom/pom.xml @@ -29,7 +29,7 @@ com.google.cloud google-cloud-secretmanager - 2.1.7 + 2.2.0 diff --git a/samples/snapshot/pom.xml b/samples/snapshot/pom.xml index a6dfd6ef..7819890f 100644 --- a/samples/snapshot/pom.xml +++ b/samples/snapshot/pom.xml @@ -28,7 +28,7 @@ com.google.cloud google-cloud-secretmanager - 2.1.7 + 2.2.0 From d38f1dbd5fea21d3edc06045e5c892313a0524b4 Mon Sep 17 00:00:00 2001 From: WhiteSource Renovate Date: Thu, 26 May 2022 16:34:23 +0200 Subject: [PATCH 02/19] deps: update dependency com.google.protobuf:protobuf-java-util to v3.21.0 (#779) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit [![Mend Renovate](https://app.renovatebot.com/images/banner.svg)](https://renovatebot.com) This PR contains the following updates: | Package | Change | Age | Adoption | Passing | Confidence | |---|---|---|---|---|---| | [com.google.protobuf:protobuf-java-util](https://developers.google.com/protocol-buffers/) ([source](https://togithub.com/protocolbuffers/protobuf)) | `3.20.1` -> `3.21.0` | [![age](https://badges.renovateapi.com/packages/maven/com.google.protobuf:protobuf-java-util/3.21.0/age-slim)](https://docs.renovatebot.com/merge-confidence/) | [![adoption](https://badges.renovateapi.com/packages/maven/com.google.protobuf:protobuf-java-util/3.21.0/adoption-slim)](https://docs.renovatebot.com/merge-confidence/) | [![passing](https://badges.renovateapi.com/packages/maven/com.google.protobuf:protobuf-java-util/3.21.0/compatibility-slim/3.20.1)](https://docs.renovatebot.com/merge-confidence/) | [![confidence](https://badges.renovateapi.com/packages/maven/com.google.protobuf:protobuf-java-util/3.21.0/confidence-slim/3.20.1)](https://docs.renovatebot.com/merge-confidence/) | --- ### Release Notes
protocolbuffers/protobuf ### [`v3.21.0`](https://togithub.com/protocolbuffers/protobuf/compare/v3.20.1...v3.21.0) [Compare Source](https://togithub.com/protocolbuffers/protobuf/compare/v3.20.1...v3.21.0)
--- ### Configuration 📅 **Schedule**: At any time (no schedule defined). 🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied. ♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox. 🔕 **Ignore**: Close this PR and you won't be reminded about this update again. --- - [ ] If you want to rebase/retry this PR, click this checkbox. --- This PR has been generated by [Mend Renovate](https://www.mend.io/free-developer-tools/renovate/). View repository job log [here](https://app.renovatebot.com/dashboard#github/googleapis/java-secretmanager). --- samples/install-without-bom/pom.xml | 2 +- samples/snapshot/pom.xml | 2 +- samples/snippets/pom.xml | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/samples/install-without-bom/pom.xml b/samples/install-without-bom/pom.xml index 35393dae..8fafd3a2 100644 --- a/samples/install-without-bom/pom.xml +++ b/samples/install-without-bom/pom.xml @@ -36,7 +36,7 @@ com.google.protobuf protobuf-java-util - 3.20.1 + 3.21.0 junit diff --git a/samples/snapshot/pom.xml b/samples/snapshot/pom.xml index 7819890f..446b9d35 100644 --- a/samples/snapshot/pom.xml +++ b/samples/snapshot/pom.xml @@ -34,7 +34,7 @@ com.google.protobuf protobuf-java-util - 3.20.1 + 3.21.0 diff --git a/samples/snippets/pom.xml b/samples/snippets/pom.xml index 6c1dc022..ce65718f 100644 --- a/samples/snippets/pom.xml +++ b/samples/snippets/pom.xml @@ -46,7 +46,7 @@ com.google.protobuf protobuf-java-util - 3.20.1 + 3.21.0 junit From e816726fc36d2103d171ce02908da8803c7e196e Mon Sep 17 00:00:00 2001 From: "gcf-owl-bot[bot]" <78513119+gcf-owl-bot[bot]@users.noreply.github.com> Date: Fri, 27 May 2022 04:06:12 +0000 Subject: [PATCH 03/19] chore(deps): upgrade gapic-generator-java to 2.8.0 and update gax-java to 2.18.1 (#775) - [ ] Regenerate this pull request now. PiperOrigin-RevId: 450543911 Source-Link: https://github.com/googleapis/googleapis/commit/55283447ab72f10b6c2571d770af0498b593e84f Source-Link: https://github.com/googleapis/googleapis-gen/commit/9f6775cab1958982b88967a43e5e806af0f135db Copy-Tag: eyJwIjoiLmdpdGh1Yi8uT3dsQm90LnlhbWwiLCJoIjoiOWY2Nzc1Y2FiMTk1ODk4MmI4ODk2N2E0M2U1ZTgwNmFmMGYxMzVkYiJ9 --- .../cloud/secretmanager/v1/SecretManagerServiceClient.java | 4 ---- .../v1/stub/SecretManagerServiceStubSettings.java | 1 - 2 files changed, 5 deletions(-) diff --git a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClient.java b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClient.java index d1bb06c8..1b4554ad 100644 --- a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClient.java +++ b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClient.java @@ -18,7 +18,6 @@ import com.google.api.core.ApiFuture; import com.google.api.core.ApiFutures; -import com.google.api.core.BetaApi; import com.google.api.gax.core.BackgroundResource; import com.google.api.gax.paging.AbstractFixedSizeCollection; import com.google.api.gax.paging.AbstractPage; @@ -143,7 +142,6 @@ public static final SecretManagerServiceClient create(SecretManagerServiceSettin * Constructs an instance of SecretManagerServiceClient, using the given stub for making calls. * This is for advanced usage - prefer using create(SecretManagerServiceSettings). */ - @BetaApi("A restructuring of stub classes is planned, so this may break in the future") public static final SecretManagerServiceClient create(SecretManagerServiceStub stub) { return new SecretManagerServiceClient(stub); } @@ -158,7 +156,6 @@ protected SecretManagerServiceClient(SecretManagerServiceSettings settings) thro this.stub = ((SecretManagerServiceStubSettings) settings.getStubSettings()).createStub(); } - @BetaApi("A restructuring of stub classes is planned, so this may break in the future") protected SecretManagerServiceClient(SecretManagerServiceStub stub) { this.settings = null; this.stub = stub; @@ -168,7 +165,6 @@ public final SecretManagerServiceSettings getSettings() { return settings; } - @BetaApi("A restructuring of stub classes is planned, so this may break in the future") public SecretManagerServiceStub getStub() { return stub; } diff --git a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/stub/SecretManagerServiceStubSettings.java b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/stub/SecretManagerServiceStubSettings.java index 03f58789..40db8649 100644 --- a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/stub/SecretManagerServiceStubSettings.java +++ b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/stub/SecretManagerServiceStubSettings.java @@ -336,7 +336,6 @@ public UnaryCallSettings getIamPolicySettings() { return testIamPermissionsSettings; } - @BetaApi("A restructuring of stub classes is planned, so this may break in the future") public SecretManagerServiceStub createStub() throws IOException { if (getTransportChannelProvider() .getTransportName() From 6c613daee4f406e501ad92742fc7dae0d4172298 Mon Sep 17 00:00:00 2001 From: WhiteSource Renovate Date: Mon, 6 Jun 2022 19:10:15 +0200 Subject: [PATCH 04/19] deps: update dependency com.google.protobuf:protobuf-java-util to v3.21.1 (#780) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit [![Mend Renovate](https://app.renovatebot.com/images/banner.svg)](https://renovatebot.com) This PR contains the following updates: | Package | Change | Age | Adoption | Passing | Confidence | |---|---|---|---|---|---| | [com.google.protobuf:protobuf-java-util](https://developers.google.com/protocol-buffers/) ([source](https://togithub.com/protocolbuffers/protobuf)) | `3.21.0` -> `3.21.1` | [![age](https://badges.renovateapi.com/packages/maven/com.google.protobuf:protobuf-java-util/3.21.1/age-slim)](https://docs.renovatebot.com/merge-confidence/) | [![adoption](https://badges.renovateapi.com/packages/maven/com.google.protobuf:protobuf-java-util/3.21.1/adoption-slim)](https://docs.renovatebot.com/merge-confidence/) | [![passing](https://badges.renovateapi.com/packages/maven/com.google.protobuf:protobuf-java-util/3.21.1/compatibility-slim/3.21.0)](https://docs.renovatebot.com/merge-confidence/) | [![confidence](https://badges.renovateapi.com/packages/maven/com.google.protobuf:protobuf-java-util/3.21.1/confidence-slim/3.21.0)](https://docs.renovatebot.com/merge-confidence/) | --- ### Release Notes
protocolbuffers/protobuf ### [`v3.21.1`](https://togithub.com/protocolbuffers/protobuf/compare/v3.21.0...v3.21.1) [Compare Source](https://togithub.com/protocolbuffers/protobuf/compare/v3.21.0...v3.21.1)
--- ### Configuration 📅 **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined). 🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied. ♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox. 🔕 **Ignore**: Close this PR and you won't be reminded about this update again. --- - [ ] If you want to rebase/retry this PR, click this checkbox. --- This PR has been generated by [Mend Renovate](https://www.mend.io/free-developer-tools/renovate/). View repository job log [here](https://app.renovatebot.com/dashboard#github/googleapis/java-secretmanager). --- samples/install-without-bom/pom.xml | 2 +- samples/snapshot/pom.xml | 2 +- samples/snippets/pom.xml | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/samples/install-without-bom/pom.xml b/samples/install-without-bom/pom.xml index 8fafd3a2..24d2188a 100644 --- a/samples/install-without-bom/pom.xml +++ b/samples/install-without-bom/pom.xml @@ -36,7 +36,7 @@ com.google.protobuf protobuf-java-util - 3.21.0 + 3.21.1 junit diff --git a/samples/snapshot/pom.xml b/samples/snapshot/pom.xml index 446b9d35..ac0e5d89 100644 --- a/samples/snapshot/pom.xml +++ b/samples/snapshot/pom.xml @@ -34,7 +34,7 @@ com.google.protobuf protobuf-java-util - 3.21.0 + 3.21.1 diff --git a/samples/snippets/pom.xml b/samples/snippets/pom.xml index ce65718f..6bd8c584 100644 --- a/samples/snippets/pom.xml +++ b/samples/snippets/pom.xml @@ -46,7 +46,7 @@ com.google.protobuf protobuf-java-util - 3.21.0 + 3.21.1 junit From 59af9cc7620411d2b7ef6903eb36486705fb398b Mon Sep 17 00:00:00 2001 From: WhiteSource Renovate Date: Mon, 6 Jun 2022 19:12:23 +0200 Subject: [PATCH 05/19] chore(deps): update dependency com.google.cloud:libraries-bom to v25.4.0 (#781) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit [![Mend Renovate](https://app.renovatebot.com/images/banner.svg)](https://renovatebot.com) This PR contains the following updates: | Package | Change | Age | Adoption | Passing | Confidence | |---|---|---|---|---|---| | [com.google.cloud:libraries-bom](https://cloud.google.com/java/docs/bom) ([source](https://togithub.com/GoogleCloudPlatform/cloud-opensource-java)) | `25.3.0` -> `25.4.0` | [![age](https://badges.renovateapi.com/packages/maven/com.google.cloud:libraries-bom/25.4.0/age-slim)](https://docs.renovatebot.com/merge-confidence/) | [![adoption](https://badges.renovateapi.com/packages/maven/com.google.cloud:libraries-bom/25.4.0/adoption-slim)](https://docs.renovatebot.com/merge-confidence/) | [![passing](https://badges.renovateapi.com/packages/maven/com.google.cloud:libraries-bom/25.4.0/compatibility-slim/25.3.0)](https://docs.renovatebot.com/merge-confidence/) | [![confidence](https://badges.renovateapi.com/packages/maven/com.google.cloud:libraries-bom/25.4.0/confidence-slim/25.3.0)](https://docs.renovatebot.com/merge-confidence/) | --- ### Configuration 📅 **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined). 🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied. ♻ **Rebasing**: Renovate will not automatically rebase this PR, because other commits have been found. 🔕 **Ignore**: Close this PR and you won't be reminded about these updates again. --- - [ ] If you want to rebase/retry this PR, click this checkbox. ⚠ **Warning**: custom changes will be lost. --- This PR has been generated by [Mend Renovate](https://www.mend.io/free-developer-tools/renovate/). View repository job log [here](https://app.renovatebot.com/dashboard#github/googleapis/java-secretmanager). --- README.md | 4 ++-- samples/native-image-sample/pom.xml | 2 +- samples/snippets/pom.xml | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index fc5c4585..5bce8799 100644 --- a/README.md +++ b/README.md @@ -19,7 +19,7 @@ If you are using Maven with [BOM][libraries-bom], add this to your pom.xml file com.google.cloud libraries-bom - 25.3.0 + 25.4.0 pom import @@ -50,7 +50,7 @@ If you are using Maven without BOM, add this to your dependencies: If you are using Gradle 5.x or later, add this to your dependencies ```Groovy -implementation platform('com.google.cloud:libraries-bom:25.3.0') +implementation platform('com.google.cloud:libraries-bom:25.4.0') implementation 'com.google.cloud:google-cloud-secretmanager' ``` diff --git a/samples/native-image-sample/pom.xml b/samples/native-image-sample/pom.xml index dd84510a..37309535 100644 --- a/samples/native-image-sample/pom.xml +++ b/samples/native-image-sample/pom.xml @@ -28,7 +28,7 @@ com.google.cloud libraries-bom - 25.3.0 + 25.4.0 pom import diff --git a/samples/snippets/pom.xml b/samples/snippets/pom.xml index 6bd8c584..820feec9 100644 --- a/samples/snippets/pom.xml +++ b/samples/snippets/pom.xml @@ -30,7 +30,7 @@ com.google.cloud libraries-bom - 25.3.0 + 25.4.0 pom import From 65f3dafe4ce1586701cf872eb3549e60b1455e4e Mon Sep 17 00:00:00 2001 From: WhiteSource Renovate Date: Mon, 13 Jun 2022 18:58:18 +0200 Subject: [PATCH 06/19] build(deps): update dependency com.google.cloud:google-cloud-shared-config to v1.5.0 (#784) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit [![Mend Renovate](https://app.renovatebot.com/images/banner.svg)](https://renovatebot.com) This PR contains the following updates: | Package | Change | Age | Adoption | Passing | Confidence | |---|---|---|---|---|---| | [com.google.cloud:google-cloud-shared-config](https://togithub.com/googleapis/java-shared-config) | `1.4.0` -> `1.5.0` | [![age](https://badges.renovateapi.com/packages/maven/com.google.cloud:google-cloud-shared-config/1.5.0/age-slim)](https://docs.renovatebot.com/merge-confidence/) | [![adoption](https://badges.renovateapi.com/packages/maven/com.google.cloud:google-cloud-shared-config/1.5.0/adoption-slim)](https://docs.renovatebot.com/merge-confidence/) | [![passing](https://badges.renovateapi.com/packages/maven/com.google.cloud:google-cloud-shared-config/1.5.0/compatibility-slim/1.4.0)](https://docs.renovatebot.com/merge-confidence/) | [![confidence](https://badges.renovateapi.com/packages/maven/com.google.cloud:google-cloud-shared-config/1.5.0/confidence-slim/1.4.0)](https://docs.renovatebot.com/merge-confidence/) | --- ### Release Notes
googleapis/java-shared-config ### [`v1.5.0`](https://togithub.com/googleapis/java-shared-config/blob/HEAD/CHANGELOG.md#​150-httpsgithubcomgoogleapisjava-shared-configcomparev140v150-2022-06-10) [Compare Source](https://togithub.com/googleapis/java-shared-config/compare/v1.4.0...v1.5.0) ##### Features - add build scripts for native image testing in Java 17 ([#​1440](https://togithub.com/googleapis/java-shared-config/issues/1440)) ([#​475](https://togithub.com/googleapis/java-shared-config/issues/475)) ([e4dfc1b](https://togithub.com/googleapis/java-shared-config/commit/e4dfc1ba29295158c78c8fcf94467d2a6a33538a)) - to produce Java 8 compatible bytecode when using JDK 9+ ([2468276](https://togithub.com/googleapis/java-shared-config/commit/2468276145cdfe1ca911b52f765e026e77661a09)) ##### Dependencies - update surefire.version to v3.0.0-m7 ([bbfe663](https://togithub.com/googleapis/java-shared-config/commit/bbfe66393af3e49612c9c1e4334ba39c133ea1d0))
--- ### Configuration 📅 **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined). 🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied. ♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox. 🔕 **Ignore**: Close this PR and you won't be reminded about this update again. --- - [ ] If you want to rebase/retry this PR, click this checkbox. --- This PR has been generated by [Mend Renovate](https://www.mend.io/free-developer-tools/renovate/). View repository job log [here](https://app.renovatebot.com/dashboard#github/googleapis/java-secretmanager). --- google-cloud-secretmanager-bom/pom.xml | 2 +- pom.xml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/google-cloud-secretmanager-bom/pom.xml b/google-cloud-secretmanager-bom/pom.xml index b066e56d..47ce5fd9 100644 --- a/google-cloud-secretmanager-bom/pom.xml +++ b/google-cloud-secretmanager-bom/pom.xml @@ -8,7 +8,7 @@ com.google.cloud google-cloud-shared-config - 1.4.0 + 1.5.0 Google Cloud Secret Manager BOM diff --git a/pom.xml b/pom.xml index 0a6467f1..35a4c4bd 100644 --- a/pom.xml +++ b/pom.xml @@ -14,7 +14,7 @@ com.google.cloud google-cloud-shared-config - 1.4.0 + 1.5.0 From c6b1755fae6c4d705d420e9c538d7f4af6f34dd1 Mon Sep 17 00:00:00 2001 From: "gcf-owl-bot[bot]" <78513119+gcf-owl-bot[bot]@users.noreply.github.com> Date: Mon, 13 Jun 2022 20:16:30 +0000 Subject: [PATCH 07/19] chore: Integrate new gapic-generator-java and rules_gapic (#782) - [ ] Regenerate this pull request now. PiperOrigin-RevId: 454027580 Source-Link: https://github.com/googleapis/googleapis/commit/1b222777baa702e7135610355706570ed2b56318 Source-Link: https://github.com/googleapis/googleapis-gen/commit/e04cea20d0d12eb5c3bdb360a9e72b654edcb638 Copy-Tag: eyJwIjoiLmdpdGh1Yi8uT3dsQm90LnlhbWwiLCJoIjoiZTA0Y2VhMjBkMGQxMmViNWMzYmRiMzYwYTllNzJiNjU0ZWRjYjYzOCJ9 --- .../v1/SecretManagerServiceClient.java | 16 ++++++++-------- .../v1/SecretManagerServiceClientTest.java | 12 ++++++------ 2 files changed, 14 insertions(+), 14 deletions(-) diff --git a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClient.java b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClient.java index 1b4554ad..3d5ee677 100644 --- a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClient.java +++ b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClient.java @@ -310,7 +310,7 @@ public final ListSecretsPagedResponse listSecrets(ListSecretsRequest request) { * while (true) { * ListSecretsResponse response = * secretManagerServiceClient.listSecretsCallable().call(request); - * for (Secret element : response.getResponsesList()) { + * for (Secret element : response.getSecretsList()) { * // doThingsWith(element); * } * String nextPageToken = response.getNextPageToken(); @@ -1026,7 +1026,7 @@ public final ListSecretVersionsPagedResponse listSecretVersions( * while (true) { * ListSecretVersionsResponse response = * secretManagerServiceClient.listSecretVersionsCallable().call(request); - * for (SecretVersion element : response.getResponsesList()) { + * for (SecretVersion element : response.getVersionsList()) { * // doThingsWith(element); * } * String nextPageToken = response.getNextPageToken(); @@ -1696,7 +1696,7 @@ public final SecretVersion destroySecretVersion(DestroySecretVersionRequest requ * SecretManagerServiceClient.create()) { * SetIamPolicyRequest request = * SetIamPolicyRequest.newBuilder() - * .setResource(ProjectName.of("[PROJECT]").toString()) + * .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) * .setPolicy(Policy.newBuilder().build()) * .setUpdateMask(FieldMask.newBuilder().build()) * .build(); @@ -1727,7 +1727,7 @@ public final Policy setIamPolicy(SetIamPolicyRequest request) { * SecretManagerServiceClient.create()) { * SetIamPolicyRequest request = * SetIamPolicyRequest.newBuilder() - * .setResource(ProjectName.of("[PROJECT]").toString()) + * .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) * .setPolicy(Policy.newBuilder().build()) * .setUpdateMask(FieldMask.newBuilder().build()) * .build(); @@ -1756,7 +1756,7 @@ public final UnaryCallable setIamPolicyCallable() { * SecretManagerServiceClient.create()) { * GetIamPolicyRequest request = * GetIamPolicyRequest.newBuilder() - * .setResource(ProjectName.of("[PROJECT]").toString()) + * .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) * .setOptions(GetPolicyOptions.newBuilder().build()) * .build(); * Policy response = secretManagerServiceClient.getIamPolicy(request); @@ -1784,7 +1784,7 @@ public final Policy getIamPolicy(GetIamPolicyRequest request) { * SecretManagerServiceClient.create()) { * GetIamPolicyRequest request = * GetIamPolicyRequest.newBuilder() - * .setResource(ProjectName.of("[PROJECT]").toString()) + * .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) * .setOptions(GetPolicyOptions.newBuilder().build()) * .build(); * ApiFuture future = @@ -1816,7 +1816,7 @@ public final UnaryCallable getIamPolicyCallable() { * SecretManagerServiceClient.create()) { * TestIamPermissionsRequest request = * TestIamPermissionsRequest.newBuilder() - * .setResource(ProjectName.of("[PROJECT]").toString()) + * .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) * .addAllPermissions(new ArrayList()) * .build(); * TestIamPermissionsResponse response = secretManagerServiceClient.testIamPermissions(request); @@ -1848,7 +1848,7 @@ public final TestIamPermissionsResponse testIamPermissions(TestIamPermissionsReq * SecretManagerServiceClient.create()) { * TestIamPermissionsRequest request = * TestIamPermissionsRequest.newBuilder() - * .setResource(ProjectName.of("[PROJECT]").toString()) + * .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) * .addAllPermissions(new ArrayList()) * .build(); * ApiFuture future = diff --git a/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClientTest.java b/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClientTest.java index 60f8a41f..f9ece048 100644 --- a/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClientTest.java +++ b/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClientTest.java @@ -1108,7 +1108,7 @@ public void setIamPolicyTest() throws Exception { SetIamPolicyRequest request = SetIamPolicyRequest.newBuilder() - .setResource(ProjectName.of("[PROJECT]").toString()) + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) .setPolicy(Policy.newBuilder().build()) .setUpdateMask(FieldMask.newBuilder().build()) .build(); @@ -1137,7 +1137,7 @@ public void setIamPolicyExceptionTest() throws Exception { try { SetIamPolicyRequest request = SetIamPolicyRequest.newBuilder() - .setResource(ProjectName.of("[PROJECT]").toString()) + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) .setPolicy(Policy.newBuilder().build()) .setUpdateMask(FieldMask.newBuilder().build()) .build(); @@ -1161,7 +1161,7 @@ public void getIamPolicyTest() throws Exception { GetIamPolicyRequest request = GetIamPolicyRequest.newBuilder() - .setResource(ProjectName.of("[PROJECT]").toString()) + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) .setOptions(GetPolicyOptions.newBuilder().build()) .build(); @@ -1188,7 +1188,7 @@ public void getIamPolicyExceptionTest() throws Exception { try { GetIamPolicyRequest request = GetIamPolicyRequest.newBuilder() - .setResource(ProjectName.of("[PROJECT]").toString()) + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) .setOptions(GetPolicyOptions.newBuilder().build()) .build(); client.getIamPolicy(request); @@ -1206,7 +1206,7 @@ public void testIamPermissionsTest() throws Exception { TestIamPermissionsRequest request = TestIamPermissionsRequest.newBuilder() - .setResource(ProjectName.of("[PROJECT]").toString()) + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) .addAllPermissions(new ArrayList()) .build(); @@ -1233,7 +1233,7 @@ public void testIamPermissionsExceptionTest() throws Exception { try { TestIamPermissionsRequest request = TestIamPermissionsRequest.newBuilder() - .setResource(ProjectName.of("[PROJECT]").toString()) + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) .addAllPermissions(new ArrayList()) .build(); client.testIamPermissions(request); From f61545d8636578eada261339554787c23225e643 Mon Sep 17 00:00:00 2001 From: Emily Ball Date: Tue, 14 Jun 2022 19:49:27 +0000 Subject: [PATCH 08/19] chore: include generated samples dir (#783) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * chore: include generated samples dir * 🦉 Updates from OwlBot post-processor See https://github.com/googleapis/repo-automation-bots/blob/main/packages/owl-bot/README.md * update file Co-authored-by: Owl Bot --- .github/.OwlBot.yaml | 3 +++ samples/native-image-sample/.sdkmanrc | 3 +++ samples/native-image-sample/pom.xml | 3 ++- 3 files changed, 8 insertions(+), 1 deletion(-) create mode 100644 samples/native-image-sample/.sdkmanrc diff --git a/.github/.OwlBot.yaml b/.github/.OwlBot.yaml index f9e2e064..8595b466 100644 --- a/.github/.OwlBot.yaml +++ b/.github/.OwlBot.yaml @@ -16,6 +16,7 @@ docker: image: "gcr.io/cloud-devrel-public-resources/owlbot-java:latest" deep-remove-regex: +- "/samples/snippets/generated" - "/grpc-google-.*/src" - "/proto-google-.*/src" - "/google-.*/src" @@ -36,3 +37,5 @@ deep-copy-regex: dest: "/owl-bot-staging/$1/grpc-google-cloud-secretmanager-$1/src" - source: "/google/cloud/secretmanager/(v\\d)/.*-java/gapic-google-.*/src" dest: "/owl-bot-staging/$1/google-cloud-secretmanager/src" +- source: "/google/cloud/secretmanager/(v\\d)/.*-java/samples/snippets/generated" + dest: "/owl-bot-staging/$1/samples/snippets/generated" diff --git a/samples/native-image-sample/.sdkmanrc b/samples/native-image-sample/.sdkmanrc new file mode 100644 index 00000000..403b4ac5 --- /dev/null +++ b/samples/native-image-sample/.sdkmanrc @@ -0,0 +1,3 @@ +# Enable auto-env through the sdkman_auto_env config +# Add key=value pairs of SDKs to use below +java=11.0.14-ms diff --git a/samples/native-image-sample/pom.xml b/samples/native-image-sample/pom.xml index 37309535..a549cf29 100644 --- a/samples/native-image-sample/pom.xml +++ b/samples/native-image-sample/pom.xml @@ -141,6 +141,7 @@ --no-fallback --no-server + --allow-incomplete-classpath @@ -165,4 +166,4 @@ - \ No newline at end of file + From 67260d74d7c5f05dc08957267ae809eb3ea66281 Mon Sep 17 00:00:00 2001 From: Mridula <66699525+mpeddada1@users.noreply.github.com> Date: Wed, 15 Jun 2022 15:30:34 -0400 Subject: [PATCH 09/19] docs(sample): clean up README for native image sample (#785) --- samples/native-image-sample/README.md | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/samples/native-image-sample/README.md b/samples/native-image-sample/README.md index 326375d2..5e1d3aa0 100644 --- a/samples/native-image-sample/README.md +++ b/samples/native-image-sample/README.md @@ -21,25 +21,25 @@ You will need to follow these prerequisite steps in order to run these samples: **Note:** Authenticating with Application Default Credentials is convenient to use during development, but we recommend [alternate methods of authentication](https://cloud.google.com/docs/authentication/production) during production use. -3. Install the GraalVM compiler. +3. Install the native image compiler. - You can follow the [official installation instructions](https://www.graalvm.org/docs/getting-started/#install-graalvm) from the GraalVM website. + You can follow the [official installation instructions](https://www.graalvm.org/docs/getting-started/#install-graalvm). After following the instructions, ensure that you install the Native Image extension installed by running: ``` gu install native-image ``` - Once you finish following the instructions, verify that the default version of Java is set to the GraalVM version by running `java -version` in a terminal. + Once you finish following the instructions, verify that the default version of Java is set to the correct version by running `java -version` in a terminal. You will see something similar to the below output: ``` $ java -version - openjdk version "11.0.7" 2020-04-14 - OpenJDK Runtime Environment GraalVM CE 20.1.0 (build 11.0.7+10-jvmci-20.1-b02) - OpenJDK 64-Bit Server VM GraalVM CE 20.1.0 (build 11.0.7+10-jvmci-20.1-b02, mixed mode, sharing) + openjdk version "17.0.3" 2022-04-19 + OpenJDK Runtime Environment GraalVM CE 22.1.0 (build 17.0.3+7-jvmci-22.1-b06) + OpenJDK 64-Bit Server VM GraalVM CE 22.1.0 (build 17.0.3+7-jvmci-22.1-b06, mixed mode, sharing) ``` 4. [Enable the Secret Manager APIs](https://console.cloud.google.com/apis/api/secretmanager.googleapis.com). @@ -48,7 +48,7 @@ You will need to follow these prerequisite steps in order to run these samples: Navigate to this directory in a new terminal. -1. Compile the application using the Native Image Compiler. This step may take a few minutes. +1. Compile the application using the native image compiler. This step may take a few minutes. ``` mvn package -P native -DskipTests @@ -75,4 +75,4 @@ In order to run the sample integration test as a native image, call the followin ``` mvn test -Pnative - ``` \ No newline at end of file + ``` From a2e0e977ae70f38c8cf1e61d4245a34ebd0d1af5 Mon Sep 17 00:00:00 2001 From: WhiteSource Renovate Date: Wed, 22 Jun 2022 02:06:19 +0200 Subject: [PATCH 10/19] deps: update dependency org.graalvm.buildtools:junit-platform-native to v0.9.12 (#787) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit [![Mend Renovate](https://app.renovatebot.com/images/banner.svg)](https://renovatebot.com) This PR contains the following updates: | Package | Change | Age | Adoption | Passing | Confidence | |---|---|---|---|---|---| | [org.graalvm.buildtools:junit-platform-native](https://togithub.com/graalvm/native-build-tools) | `0.9.11` -> `0.9.12` | [![age](https://badges.renovateapi.com/packages/maven/org.graalvm.buildtools:junit-platform-native/0.9.12/age-slim)](https://docs.renovatebot.com/merge-confidence/) | [![adoption](https://badges.renovateapi.com/packages/maven/org.graalvm.buildtools:junit-platform-native/0.9.12/adoption-slim)](https://docs.renovatebot.com/merge-confidence/) | [![passing](https://badges.renovateapi.com/packages/maven/org.graalvm.buildtools:junit-platform-native/0.9.12/compatibility-slim/0.9.11)](https://docs.renovatebot.com/merge-confidence/) | [![confidence](https://badges.renovateapi.com/packages/maven/org.graalvm.buildtools:junit-platform-native/0.9.12/confidence-slim/0.9.11)](https://docs.renovatebot.com/merge-confidence/) | --- ### Release Notes
graalvm/native-build-tools ### [`v0.9.12`](https://togithub.com/graalvm/native-build-tools/releases/tag/0.9.12) [Compare Source](https://togithub.com/graalvm/native-build-tools/compare/0.9.11...0.9.12) ##### What's Changed Read what's new in the [documentation](https://graalvm.github.io/native-build-tools/latest/index.html#changelog). - Add Mockito / Byte Buddy support documentation by [@​lazar-mitrovic](https://togithub.com/lazar-mitrovic) in [https://github.com/graalvm/native-build-tools/pull/236](https://togithub.com/graalvm/native-build-tools/pull/236) - Prevent builds from failing if no test list is present by [@​lazar-mitrovic](https://togithub.com/lazar-mitrovic) in [https://github.com/graalvm/native-build-tools/pull/239](https://togithub.com/graalvm/native-build-tools/pull/239) - Support different agent modes in the native-image Gradle plugin by [@​gradinac](https://togithub.com/gradinac) in [https://github.com/graalvm/native-build-tools/pull/230](https://togithub.com/graalvm/native-build-tools/pull/230) - JVM Reachability Metadata support for Maven by [@​alvarosanchez](https://togithub.com/alvarosanchez) in [https://github.com/graalvm/native-build-tools/pull/240](https://togithub.com/graalvm/native-build-tools/pull/240) - Warn about deprecated agent DSL by [@​gradinac](https://togithub.com/gradinac) in [https://github.com/graalvm/native-build-tools/pull/242](https://togithub.com/graalvm/native-build-tools/pull/242) - Rework Maven plugin by [@​lazar-mitrovic](https://togithub.com/lazar-mitrovic) in [https://github.com/graalvm/native-build-tools/pull/247](https://togithub.com/graalvm/native-build-tools/pull/247) - Add Gradle rich output support, configure default metadata URL on Maven by [@​lazar-mitrovic](https://togithub.com/lazar-mitrovic) in [https://github.com/graalvm/native-build-tools/pull/249](https://togithub.com/graalvm/native-build-tools/pull/249) - Fix wrong scope for test dependencies by [@​melix](https://togithub.com/melix) in [https://github.com/graalvm/native-build-tools/pull/251](https://togithub.com/graalvm/native-build-tools/pull/251) - Add documentation for alternative build systems. by [@​gradinac](https://togithub.com/gradinac) in [https://github.com/graalvm/native-build-tools/pull/248](https://togithub.com/graalvm/native-build-tools/pull/248) **Full Changelog**: https://github.com/graalvm/native-build-tools/compare/0.9.11...0.9.12
--- ### Configuration 📅 **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined). 🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied. ♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox. 🔕 **Ignore**: Close this PR and you won't be reminded about this update again. --- - [ ] If you want to rebase/retry this PR, click this checkbox. --- This PR has been generated by [Mend Renovate](https://www.mend.io/free-developer-tools/renovate/). View repository job log [here](https://app.renovatebot.com/dashboard#github/googleapis/java-secretmanager). --- samples/native-image-sample/pom.xml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/samples/native-image-sample/pom.xml b/samples/native-image-sample/pom.xml index a549cf29..8f720a14 100644 --- a/samples/native-image-sample/pom.xml +++ b/samples/native-image-sample/pom.xml @@ -113,7 +113,7 @@ org.graalvm.buildtools junit-platform-native - 0.9.11 + 0.9.12 test From 8662fe687369eab23a185eba0bf9a48110d5856b Mon Sep 17 00:00:00 2001 From: WhiteSource Renovate Date: Wed, 22 Jun 2022 02:06:31 +0200 Subject: [PATCH 11/19] deps: update dependency org.graalvm.buildtools:native-maven-plugin to v0.9.12 (#788) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit [![Mend Renovate](https://app.renovatebot.com/images/banner.svg)](https://renovatebot.com) This PR contains the following updates: | Package | Change | Age | Adoption | Passing | Confidence | |---|---|---|---|---|---| | [org.graalvm.buildtools:native-maven-plugin](https://togithub.com/graalvm/native-build-tools) | `0.9.11` -> `0.9.12` | [![age](https://badges.renovateapi.com/packages/maven/org.graalvm.buildtools:native-maven-plugin/0.9.12/age-slim)](https://docs.renovatebot.com/merge-confidence/) | [![adoption](https://badges.renovateapi.com/packages/maven/org.graalvm.buildtools:native-maven-plugin/0.9.12/adoption-slim)](https://docs.renovatebot.com/merge-confidence/) | [![passing](https://badges.renovateapi.com/packages/maven/org.graalvm.buildtools:native-maven-plugin/0.9.12/compatibility-slim/0.9.11)](https://docs.renovatebot.com/merge-confidence/) | [![confidence](https://badges.renovateapi.com/packages/maven/org.graalvm.buildtools:native-maven-plugin/0.9.12/confidence-slim/0.9.11)](https://docs.renovatebot.com/merge-confidence/) | --- ### Release Notes
graalvm/native-build-tools ### [`v0.9.12`](https://togithub.com/graalvm/native-build-tools/releases/tag/0.9.12) [Compare Source](https://togithub.com/graalvm/native-build-tools/compare/0.9.11...0.9.12) ##### What's Changed Read what's new in the [documentation](https://graalvm.github.io/native-build-tools/latest/index.html#changelog). - Add Mockito / Byte Buddy support documentation by [@​lazar-mitrovic](https://togithub.com/lazar-mitrovic) in [https://github.com/graalvm/native-build-tools/pull/236](https://togithub.com/graalvm/native-build-tools/pull/236) - Prevent builds from failing if no test list is present by [@​lazar-mitrovic](https://togithub.com/lazar-mitrovic) in [https://github.com/graalvm/native-build-tools/pull/239](https://togithub.com/graalvm/native-build-tools/pull/239) - Support different agent modes in the native-image Gradle plugin by [@​gradinac](https://togithub.com/gradinac) in [https://github.com/graalvm/native-build-tools/pull/230](https://togithub.com/graalvm/native-build-tools/pull/230) - JVM Reachability Metadata support for Maven by [@​alvarosanchez](https://togithub.com/alvarosanchez) in [https://github.com/graalvm/native-build-tools/pull/240](https://togithub.com/graalvm/native-build-tools/pull/240) - Warn about deprecated agent DSL by [@​gradinac](https://togithub.com/gradinac) in [https://github.com/graalvm/native-build-tools/pull/242](https://togithub.com/graalvm/native-build-tools/pull/242) - Rework Maven plugin by [@​lazar-mitrovic](https://togithub.com/lazar-mitrovic) in [https://github.com/graalvm/native-build-tools/pull/247](https://togithub.com/graalvm/native-build-tools/pull/247) - Add Gradle rich output support, configure default metadata URL on Maven by [@​lazar-mitrovic](https://togithub.com/lazar-mitrovic) in [https://github.com/graalvm/native-build-tools/pull/249](https://togithub.com/graalvm/native-build-tools/pull/249) - Fix wrong scope for test dependencies by [@​melix](https://togithub.com/melix) in [https://github.com/graalvm/native-build-tools/pull/251](https://togithub.com/graalvm/native-build-tools/pull/251) - Add documentation for alternative build systems. by [@​gradinac](https://togithub.com/gradinac) in [https://github.com/graalvm/native-build-tools/pull/248](https://togithub.com/graalvm/native-build-tools/pull/248) **Full Changelog**: https://github.com/graalvm/native-build-tools/compare/0.9.11...0.9.12
--- ### Configuration 📅 **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined). 🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied. ♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox. 🔕 **Ignore**: Close this PR and you won't be reminded about this update again. --- - [ ] If you want to rebase/retry this PR, click this checkbox. --- This PR has been generated by [Mend Renovate](https://www.mend.io/free-developer-tools/renovate/). View repository job log [here](https://app.renovatebot.com/dashboard#github/googleapis/java-secretmanager). --- samples/native-image-sample/pom.xml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/samples/native-image-sample/pom.xml b/samples/native-image-sample/pom.xml index 8f720a14..adff43ac 100644 --- a/samples/native-image-sample/pom.xml +++ b/samples/native-image-sample/pom.xml @@ -134,7 +134,7 @@ org.graalvm.buildtools native-maven-plugin - 0.9.11 + 0.9.12 true secretmanager.NativeImageSecretManagerSample From 71aae1d94136082ed323a6591e5cfe6a0d02875c Mon Sep 17 00:00:00 2001 From: WhiteSource Renovate Date: Thu, 23 Jun 2022 17:30:11 +0200 Subject: [PATCH 12/19] deps: update dependency com.google.cloud:google-cloud-shared-dependencies to v2.13.0 (#789) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit [![Mend Renovate](https://app.renovatebot.com/images/banner.svg)](https://renovatebot.com) This PR contains the following updates: | Package | Change | Age | Adoption | Passing | Confidence | |---|---|---|---|---|---| | [com.google.cloud:google-cloud-shared-dependencies](https://togithub.com/googleapis/java-shared-dependencies) | `2.12.0` -> `2.13.0` | [![age](https://badges.renovateapi.com/packages/maven/com.google.cloud:google-cloud-shared-dependencies/2.13.0/age-slim)](https://docs.renovatebot.com/merge-confidence/) | [![adoption](https://badges.renovateapi.com/packages/maven/com.google.cloud:google-cloud-shared-dependencies/2.13.0/adoption-slim)](https://docs.renovatebot.com/merge-confidence/) | [![passing](https://badges.renovateapi.com/packages/maven/com.google.cloud:google-cloud-shared-dependencies/2.13.0/compatibility-slim/2.12.0)](https://docs.renovatebot.com/merge-confidence/) | [![confidence](https://badges.renovateapi.com/packages/maven/com.google.cloud:google-cloud-shared-dependencies/2.13.0/confidence-slim/2.12.0)](https://docs.renovatebot.com/merge-confidence/) | --- ### Release Notes
googleapis/java-shared-dependencies ### [`v2.13.0`](https://togithub.com/googleapis/java-shared-dependencies/blob/HEAD/CHANGELOG.md#​2130-httpsgithubcomgoogleapisjava-shared-dependenciescomparev2120v2130-2022-06-22) [Compare Source](https://togithub.com/googleapis/java-shared-dependencies/compare/v2.12.0...v2.13.0) ##### Dependencies - update dependency com.google.api-client:google-api-client-bom to v1.35.0 ([#​709](https://togithub.com/googleapis/java-shared-dependencies/issues/709)) ([239f8c3](https://togithub.com/googleapis/java-shared-dependencies/commit/239f8c33a11e233e6af79aee8c7e68cd156a0554)) - update dependency com.google.api-client:google-api-client-bom to v1.35.1 ([#​713](https://togithub.com/googleapis/java-shared-dependencies/issues/713)) ([6559b45](https://togithub.com/googleapis/java-shared-dependencies/commit/6559b45b027dba783a9525d35e32183d78773cbe)) - update dependency com.google.api:api-common to v2.2.1 ([#​710](https://togithub.com/googleapis/java-shared-dependencies/issues/710)) ([650d4c5](https://togithub.com/googleapis/java-shared-dependencies/commit/650d4c5f8c3cfce711257d47280ad773cd2e2414)) - update dependency com.google.errorprone:error_prone_annotations to v2.14.0 ([#​701](https://togithub.com/googleapis/java-shared-dependencies/issues/701)) ([d24730f](https://togithub.com/googleapis/java-shared-dependencies/commit/d24730f78669f80b109e590b903446e5552e3e36)) - update dependency com.google.http-client:google-http-client-bom to v1.42.0 ([#​711](https://togithub.com/googleapis/java-shared-dependencies/issues/711)) ([5168a18](https://togithub.com/googleapis/java-shared-dependencies/commit/5168a181722128d434a0d0d2ab5cc485686bbc78)) - update dependency com.google.oauth-client:google-oauth-client-bom to v1.34.0 ([#​708](https://togithub.com/googleapis/java-shared-dependencies/issues/708)) ([620336e](https://togithub.com/googleapis/java-shared-dependencies/commit/620336e6733e2017116e5e8a7b403b183a728bc1)) - update dependency com.google.oauth-client:google-oauth-client-bom to v1.34.1 ([#​712](https://togithub.com/googleapis/java-shared-dependencies/issues/712)) ([a2c18a5](https://togithub.com/googleapis/java-shared-dependencies/commit/a2c18a5bc4152cc9034cec691a29f54a35c38a51)) - update dependency com.google.protobuf:protobuf-bom to v3.21.0 ([#​703](https://togithub.com/googleapis/java-shared-dependencies/issues/703)) ([5f9fe12](https://togithub.com/googleapis/java-shared-dependencies/commit/5f9fe1200b4bdf4c54bf947c21bd3ed02f26f990)) - update dependency com.google.protobuf:protobuf-bom to v3.21.1 ([#​705](https://togithub.com/googleapis/java-shared-dependencies/issues/705)) ([c68edfb](https://togithub.com/googleapis/java-shared-dependencies/commit/c68edfbe7e1993e1112640b867b29aa2fbcf7579)) - update dependency io.grpc:grpc-bom to v1.47.0 ([#​707](https://togithub.com/googleapis/java-shared-dependencies/issues/707)) ([d02918a](https://togithub.com/googleapis/java-shared-dependencies/commit/d02918a0418cd65d1d247f27afb0637f1f8f5666)) - update dependency org.checkerframework:checker-qual to v3.22.1 ([#​706](https://togithub.com/googleapis/java-shared-dependencies/issues/706)) ([545843b](https://togithub.com/googleapis/java-shared-dependencies/commit/545843b492cead230b8cc72a1dae7d4922f33b39)) - update dependency org.checkerframework:checker-qual to v3.22.2 ([#​717](https://togithub.com/googleapis/java-shared-dependencies/issues/717)) ([142852a](https://togithub.com/googleapis/java-shared-dependencies/commit/142852a37140f221197f5c71aed451def353b1e0)) - update gax.version to v2.18.2 ([#​718](https://togithub.com/googleapis/java-shared-dependencies/issues/718)) ([5f8156e](https://togithub.com/googleapis/java-shared-dependencies/commit/5f8156e55c6a07b018a8c5efafa68be781b4288b)) - update google.common-protos.version to v2.9.0 ([#​714](https://togithub.com/googleapis/java-shared-dependencies/issues/714)) ([9e5591e](https://togithub.com/googleapis/java-shared-dependencies/commit/9e5591ec3035350450ecbfebd00e08216433b06c)) - update google.core.version to v2.8.0 ([#​719](https://togithub.com/googleapis/java-shared-dependencies/issues/719)) ([4023c60](https://togithub.com/googleapis/java-shared-dependencies/commit/4023c6063a2c5b5308da531df1a08c90c491965d)) - update iam.version to v1.4.0 ([#​700](https://togithub.com/googleapis/java-shared-dependencies/issues/700)) ([c1097a4](https://togithub.com/googleapis/java-shared-dependencies/commit/c1097a46ab0739b0b7234bc510e4c3d9ce2c2861)) - update iam.version to v1.4.1 ([#​716](https://togithub.com/googleapis/java-shared-dependencies/issues/716)) ([e2dc7c2](https://togithub.com/googleapis/java-shared-dependencies/commit/e2dc7c21c39e007878841e2664d548ec44a72d54))
--- ### Configuration 📅 **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined). 🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied. ♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox. 🔕 **Ignore**: Close this PR and you won't be reminded about this update again. --- - [ ] If you want to rebase/retry this PR, click this checkbox. --- This PR has been generated by [Mend Renovate](https://www.mend.io/free-developer-tools/renovate/). View repository job log [here](https://app.renovatebot.com/dashboard#github/googleapis/java-secretmanager). --- pom.xml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pom.xml b/pom.xml index 35a4c4bd..55fd50bb 100644 --- a/pom.xml +++ b/pom.xml @@ -87,7 +87,7 @@ com.google.cloud google-cloud-shared-dependencies - 2.12.0 + 2.13.0 pom import From d51c8fa85243d4b71b805a67141168898542a851 Mon Sep 17 00:00:00 2001 From: "gcf-owl-bot[bot]" <78513119+gcf-owl-bot[bot]@users.noreply.github.com> Date: Fri, 24 Jun 2022 15:18:21 +0000 Subject: [PATCH 13/19] feat: Enable REST transport for most of Java and Go clients (#790) - [ ] Regenerate this pull request now. PiperOrigin-RevId: 456641589 Source-Link: https://github.com/googleapis/googleapis/commit/8a251f5225b789b2383207ffd978f6aa3d77fcf7 Source-Link: https://github.com/googleapis/googleapis-gen/commit/4ca52a529cf01308d9714950edffbea3560cfbdb Copy-Tag: eyJwIjoiLmdpdGh1Yi8uT3dsQm90LnlhbWwiLCJoIjoiNGNhNTJhNTI5Y2YwMTMwOGQ5NzE0OTUwZWRmZmJlYTM1NjBjZmJkYiJ9 --- google-cloud-secretmanager/pom.xml | 16 + .../v1/SecretManagerServiceClient.java | 15 + .../v1/SecretManagerServiceSettings.java | 23 +- ...onSecretManagerServiceCallableFactory.java | 105 ++ .../HttpJsonSecretManagerServiceStub.java | 980 ++++++++++++ .../SecretManagerServiceStubSettings.java | 53 +- ...ecretManagerServiceClientHttpJsonTest.java | 1403 +++++++++++++++++ .../AsyncAccessSecretVersion.java | 48 + .../SyncAccessSecretVersion.java | 45 + ...cAccessSecretVersionSecretversionname.java | 42 + .../SyncAccessSecretVersionString.java | 40 + .../AsyncAddSecretVersion.java | 50 + .../SyncAddSecretVersion.java | 46 + ...dSecretVersionSecretnameSecretpayload.java | 44 + ...ncAddSecretVersionStringSecretpayload.java | 44 + .../SyncCreateSetCredentialsProvider.java | 42 + .../SyncCreateSetCredentialsProvider1.java | 41 + .../create/SyncCreateSetEndpoint.java | 39 + .../createsecret/AsyncCreateSecret.java | 50 + .../createsecret/SyncCreateSecret.java | 46 + ...ncCreateSecretProjectnameStringSecret.java | 44 + .../SyncCreateSecretStringStringSecret.java | 43 + .../deletesecret/AsyncDeleteSecret.java | 49 + .../deletesecret/SyncDeleteSecret.java | 44 + .../SyncDeleteSecretSecretname.java | 39 + .../deletesecret/SyncDeleteSecretString.java | 39 + .../AsyncDestroySecretVersion.java | 49 + .../SyncDestroySecretVersion.java | 45 + ...DestroySecretVersionSecretversionname.java | 42 + .../SyncDestroySecretVersionString.java | 40 + .../AsyncDisableSecretVersion.java | 49 + .../SyncDisableSecretVersion.java | 45 + ...DisableSecretVersionSecretversionname.java | 42 + .../SyncDisableSecretVersionString.java | 40 + .../AsyncEnableSecretVersion.java | 49 + .../SyncEnableSecretVersion.java | 45 + ...cEnableSecretVersionSecretversionname.java | 42 + .../SyncEnableSecretVersionString.java | 40 + .../getiampolicy/AsyncGetIamPolicy.java | 50 + .../getiampolicy/SyncGetIamPolicy.java | 46 + .../getsecret/AsyncGetSecret.java | 47 + .../getsecret/SyncGetSecret.java | 44 + .../getsecret/SyncGetSecretSecretname.java | 40 + .../getsecret/SyncGetSecretString.java | 40 + .../AsyncGetSecretVersion.java | 48 + .../SyncGetSecretVersion.java | 44 + ...SyncGetSecretVersionSecretversionname.java | 42 + .../SyncGetSecretVersionString.java | 40 + .../listsecrets/AsyncListSecrets.java | 53 + .../listsecrets/AsyncListSecretsPaged.java | 61 + .../listsecrets/SyncListSecrets.java | 49 + .../SyncListSecretsProjectname.java | 42 + .../listsecrets/SyncListSecretsString.java | 42 + .../AsyncListSecretVersions.java | 53 + .../AsyncListSecretVersionsPaged.java | 61 + .../SyncListSecretVersions.java | 50 + .../SyncListSecretVersionsSecretname.java | 43 + .../SyncListSecretVersionsString.java | 43 + .../setiampolicy/AsyncSetIamPolicy.java | 51 + .../setiampolicy/SyncSetIamPolicy.java | 47 + .../AsyncTestIamPermissions.java | 50 + .../SyncTestIamPermissions.java | 46 + .../updatesecret/AsyncUpdateSecret.java | 49 + .../updatesecret/SyncUpdateSecret.java | 45 + .../SyncUpdateSecretSecretFieldmask.java | 41 + .../createsecret/SyncCreateSecret.java | 47 + .../createsecret/SyncCreateSecret.java | 47 + 67 files changed, 5314 insertions(+), 5 deletions(-) create mode 100644 google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/stub/HttpJsonSecretManagerServiceCallableFactory.java create mode 100644 google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/stub/HttpJsonSecretManagerServiceStub.java create mode 100644 google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClientHttpJsonTest.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/accesssecretversion/AsyncAccessSecretVersion.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/accesssecretversion/SyncAccessSecretVersion.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/accesssecretversion/SyncAccessSecretVersionSecretversionname.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/accesssecretversion/SyncAccessSecretVersionString.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/addsecretversion/AsyncAddSecretVersion.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/addsecretversion/SyncAddSecretVersion.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/addsecretversion/SyncAddSecretVersionSecretnameSecretpayload.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/addsecretversion/SyncAddSecretVersionStringSecretpayload.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/create/SyncCreateSetCredentialsProvider.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/create/SyncCreateSetCredentialsProvider1.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/create/SyncCreateSetEndpoint.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/createsecret/AsyncCreateSecret.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/createsecret/SyncCreateSecret.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/createsecret/SyncCreateSecretProjectnameStringSecret.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/createsecret/SyncCreateSecretStringStringSecret.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/deletesecret/AsyncDeleteSecret.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/deletesecret/SyncDeleteSecret.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/deletesecret/SyncDeleteSecretSecretname.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/deletesecret/SyncDeleteSecretString.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/destroysecretversion/AsyncDestroySecretVersion.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/destroysecretversion/SyncDestroySecretVersion.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/destroysecretversion/SyncDestroySecretVersionSecretversionname.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/destroysecretversion/SyncDestroySecretVersionString.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/disablesecretversion/AsyncDisableSecretVersion.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/disablesecretversion/SyncDisableSecretVersion.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/disablesecretversion/SyncDisableSecretVersionSecretversionname.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/disablesecretversion/SyncDisableSecretVersionString.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/enablesecretversion/AsyncEnableSecretVersion.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/enablesecretversion/SyncEnableSecretVersion.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/enablesecretversion/SyncEnableSecretVersionSecretversionname.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/enablesecretversion/SyncEnableSecretVersionString.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getiampolicy/AsyncGetIamPolicy.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getiampolicy/SyncGetIamPolicy.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecret/AsyncGetSecret.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecret/SyncGetSecret.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecret/SyncGetSecretSecretname.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecret/SyncGetSecretString.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecretversion/AsyncGetSecretVersion.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecretversion/SyncGetSecretVersion.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecretversion/SyncGetSecretVersionSecretversionname.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecretversion/SyncGetSecretVersionString.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecrets/AsyncListSecrets.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecrets/AsyncListSecretsPaged.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecrets/SyncListSecrets.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecrets/SyncListSecretsProjectname.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecrets/SyncListSecretsString.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecretversions/AsyncListSecretVersions.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecretversions/AsyncListSecretVersionsPaged.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecretversions/SyncListSecretVersions.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecretversions/SyncListSecretVersionsSecretname.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecretversions/SyncListSecretVersionsString.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/setiampolicy/AsyncSetIamPolicy.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/setiampolicy/SyncSetIamPolicy.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/testiampermissions/AsyncTestIamPermissions.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/testiampermissions/SyncTestIamPermissions.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/updatesecret/AsyncUpdateSecret.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/updatesecret/SyncUpdateSecret.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/updatesecret/SyncUpdateSecretSecretFieldmask.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerservicesettings/createsecret/SyncCreateSecret.java create mode 100644 samples/snippets/generated/com/google/cloud/secretmanager/v1/stub/secretmanagerservicestubsettings/createsecret/SyncCreateSecret.java diff --git a/google-cloud-secretmanager/pom.xml b/google-cloud-secretmanager/pom.xml index 1096ca53..d9de6b87 100644 --- a/google-cloud-secretmanager/pom.xml +++ b/google-cloud-secretmanager/pom.xml @@ -65,6 +65,10 @@ com.google.api gax-grpc
+ + com.google.api + gax-httpjson + org.threeten threetenbp @@ -92,12 +96,24 @@ test + + com.google.api + gax + testlib + test + com.google.api gax-grpc testlib test + + com.google.api + gax-httpjson + testlib + test + diff --git a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClient.java b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClient.java index 3d5ee677..6fa339b7 100644 --- a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClient.java +++ b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClient.java @@ -117,6 +117,21 @@ * SecretManagerServiceClient.create(secretManagerServiceSettings); * } * + *

To use REST (HTTP1.1/JSON) transport (instead of gRPC) for sending and receiving requests over + * the wire: + * + *

{@code
+ * // This snippet has been automatically generated for illustrative purposes only.
+ * // It may require modifications to work in your environment.
+ * SecretManagerServiceSettings secretManagerServiceSettings =
+ *     SecretManagerServiceSettings.newBuilder()
+ *         .setTransportChannelProvider(
+ *             SecretManagerServiceSettings.defaultHttpJsonTransportProviderBuilder().build())
+ *         .build();
+ * SecretManagerServiceClient secretManagerServiceClient =
+ *     SecretManagerServiceClient.create(secretManagerServiceSettings);
+ * }
+ * *

Please refer to the GitHub repository's samples for more quickstart code snippets. */ @Generated("by gapic-generator-java") diff --git a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/SecretManagerServiceSettings.java b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/SecretManagerServiceSettings.java index 6dc35d86..2ea377e6 100644 --- a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/SecretManagerServiceSettings.java +++ b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/SecretManagerServiceSettings.java @@ -24,6 +24,7 @@ import com.google.api.gax.core.GoogleCredentialsProvider; import com.google.api.gax.core.InstantiatingExecutorProvider; import com.google.api.gax.grpc.InstantiatingGrpcChannelProvider; +import com.google.api.gax.httpjson.InstantiatingHttpJsonChannelProvider; import com.google.api.gax.rpc.ApiClientHeaderProvider; import com.google.api.gax.rpc.ClientContext; import com.google.api.gax.rpc.ClientSettings; @@ -187,11 +188,18 @@ public static GoogleCredentialsProvider.Builder defaultCredentialsProviderBuilde return SecretManagerServiceStubSettings.defaultCredentialsProviderBuilder(); } - /** Returns a builder for the default ChannelProvider for this service. */ + /** Returns a builder for the default gRPC ChannelProvider for this service. */ public static InstantiatingGrpcChannelProvider.Builder defaultGrpcTransportProviderBuilder() { return SecretManagerServiceStubSettings.defaultGrpcTransportProviderBuilder(); } + /** Returns a builder for the default REST ChannelProvider for this service. */ + @BetaApi + public static InstantiatingHttpJsonChannelProvider.Builder + defaultHttpJsonTransportProviderBuilder() { + return SecretManagerServiceStubSettings.defaultHttpJsonTransportProviderBuilder(); + } + public static TransportChannelProvider defaultTransportChannelProvider() { return SecretManagerServiceStubSettings.defaultTransportChannelProvider(); } @@ -201,11 +209,17 @@ public static ApiClientHeaderProvider.Builder defaultApiClientHeaderProviderBuil return SecretManagerServiceStubSettings.defaultApiClientHeaderProviderBuilder(); } - /** Returns a new builder for this class. */ + /** Returns a new gRPC builder for this class. */ public static Builder newBuilder() { return Builder.createDefault(); } + /** Returns a new REST builder for this class. */ + @BetaApi + public static Builder newHttpJsonBuilder() { + return Builder.createHttpJsonDefault(); + } + /** Returns a new builder for this class. */ public static Builder newBuilder(ClientContext clientContext) { return new Builder(clientContext); @@ -244,6 +258,11 @@ private static Builder createDefault() { return new Builder(SecretManagerServiceStubSettings.newBuilder()); } + @BetaApi + private static Builder createHttpJsonDefault() { + return new Builder(SecretManagerServiceStubSettings.newHttpJsonBuilder()); + } + public SecretManagerServiceStubSettings.Builder getStubSettingsBuilder() { return ((SecretManagerServiceStubSettings.Builder) getStubSettings()); } diff --git a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/stub/HttpJsonSecretManagerServiceCallableFactory.java b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/stub/HttpJsonSecretManagerServiceCallableFactory.java new file mode 100644 index 00000000..ddd37849 --- /dev/null +++ b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/stub/HttpJsonSecretManagerServiceCallableFactory.java @@ -0,0 +1,105 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.stub; + +import com.google.api.core.BetaApi; +import com.google.api.gax.httpjson.HttpJsonCallSettings; +import com.google.api.gax.httpjson.HttpJsonCallableFactory; +import com.google.api.gax.httpjson.HttpJsonOperationSnapshotCallable; +import com.google.api.gax.httpjson.HttpJsonStubCallableFactory; +import com.google.api.gax.httpjson.longrunning.stub.OperationsStub; +import com.google.api.gax.rpc.BatchingCallSettings; +import com.google.api.gax.rpc.ClientContext; +import com.google.api.gax.rpc.OperationCallSettings; +import com.google.api.gax.rpc.OperationCallable; +import com.google.api.gax.rpc.PagedCallSettings; +import com.google.api.gax.rpc.ServerStreamingCallSettings; +import com.google.api.gax.rpc.ServerStreamingCallable; +import com.google.api.gax.rpc.UnaryCallSettings; +import com.google.api.gax.rpc.UnaryCallable; +import com.google.longrunning.Operation; +import javax.annotation.Generated; + +// AUTO-GENERATED DOCUMENTATION AND CLASS. +/** + * REST callable factory implementation for the SecretManagerService service API. + * + *

This class is for advanced usage. + */ +@Generated("by gapic-generator-java") +@BetaApi +public class HttpJsonSecretManagerServiceCallableFactory + implements HttpJsonStubCallableFactory { + + @Override + public UnaryCallable createUnaryCallable( + HttpJsonCallSettings httpJsonCallSettings, + UnaryCallSettings callSettings, + ClientContext clientContext) { + return HttpJsonCallableFactory.createUnaryCallable( + httpJsonCallSettings, callSettings, clientContext); + } + + @Override + public + UnaryCallable createPagedCallable( + HttpJsonCallSettings httpJsonCallSettings, + PagedCallSettings callSettings, + ClientContext clientContext) { + return HttpJsonCallableFactory.createPagedCallable( + httpJsonCallSettings, callSettings, clientContext); + } + + @Override + public UnaryCallable createBatchingCallable( + HttpJsonCallSettings httpJsonCallSettings, + BatchingCallSettings callSettings, + ClientContext clientContext) { + return HttpJsonCallableFactory.createBatchingCallable( + httpJsonCallSettings, callSettings, clientContext); + } + + @BetaApi( + "The surface for long-running operations is not stable yet and may change in the future.") + @Override + public + OperationCallable createOperationCallable( + HttpJsonCallSettings httpJsonCallSettings, + OperationCallSettings callSettings, + ClientContext clientContext, + OperationsStub operationsStub) { + UnaryCallable innerCallable = + HttpJsonCallableFactory.createBaseUnaryCallable( + httpJsonCallSettings, callSettings.getInitialCallSettings(), clientContext); + HttpJsonOperationSnapshotCallable initialCallable = + new HttpJsonOperationSnapshotCallable( + innerCallable, + httpJsonCallSettings.getMethodDescriptor().getOperationSnapshotFactory()); + return HttpJsonCallableFactory.createOperationCallable( + callSettings, clientContext, operationsStub.longRunningClient(), initialCallable); + } + + @Override + public + ServerStreamingCallable createServerStreamingCallable( + HttpJsonCallSettings httpJsonCallSettings, + ServerStreamingCallSettings callSettings, + ClientContext clientContext) { + return HttpJsonCallableFactory.createServerStreamingCallable( + httpJsonCallSettings, callSettings, clientContext); + } +} diff --git a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/stub/HttpJsonSecretManagerServiceStub.java b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/stub/HttpJsonSecretManagerServiceStub.java new file mode 100644 index 00000000..66d40436 --- /dev/null +++ b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/stub/HttpJsonSecretManagerServiceStub.java @@ -0,0 +1,980 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.stub; + +import static com.google.cloud.secretmanager.v1.SecretManagerServiceClient.ListSecretVersionsPagedResponse; +import static com.google.cloud.secretmanager.v1.SecretManagerServiceClient.ListSecretsPagedResponse; + +import com.google.api.core.BetaApi; +import com.google.api.core.InternalApi; +import com.google.api.gax.core.BackgroundResource; +import com.google.api.gax.core.BackgroundResourceAggregation; +import com.google.api.gax.httpjson.ApiMethodDescriptor; +import com.google.api.gax.httpjson.HttpJsonCallSettings; +import com.google.api.gax.httpjson.HttpJsonStubCallableFactory; +import com.google.api.gax.httpjson.ProtoMessageRequestFormatter; +import com.google.api.gax.httpjson.ProtoMessageResponseParser; +import com.google.api.gax.httpjson.ProtoRestSerializer; +import com.google.api.gax.rpc.ClientContext; +import com.google.api.gax.rpc.UnaryCallable; +import com.google.cloud.secretmanager.v1.AccessSecretVersionRequest; +import com.google.cloud.secretmanager.v1.AccessSecretVersionResponse; +import com.google.cloud.secretmanager.v1.AddSecretVersionRequest; +import com.google.cloud.secretmanager.v1.CreateSecretRequest; +import com.google.cloud.secretmanager.v1.DeleteSecretRequest; +import com.google.cloud.secretmanager.v1.DestroySecretVersionRequest; +import com.google.cloud.secretmanager.v1.DisableSecretVersionRequest; +import com.google.cloud.secretmanager.v1.EnableSecretVersionRequest; +import com.google.cloud.secretmanager.v1.GetSecretRequest; +import com.google.cloud.secretmanager.v1.GetSecretVersionRequest; +import com.google.cloud.secretmanager.v1.ListSecretVersionsRequest; +import com.google.cloud.secretmanager.v1.ListSecretVersionsResponse; +import com.google.cloud.secretmanager.v1.ListSecretsRequest; +import com.google.cloud.secretmanager.v1.ListSecretsResponse; +import com.google.cloud.secretmanager.v1.Secret; +import com.google.cloud.secretmanager.v1.SecretVersion; +import com.google.cloud.secretmanager.v1.UpdateSecretRequest; +import com.google.iam.v1.GetIamPolicyRequest; +import com.google.iam.v1.Policy; +import com.google.iam.v1.SetIamPolicyRequest; +import com.google.iam.v1.TestIamPermissionsRequest; +import com.google.iam.v1.TestIamPermissionsResponse; +import com.google.protobuf.Empty; +import com.google.protobuf.TypeRegistry; +import java.io.IOException; +import java.util.ArrayList; +import java.util.HashMap; +import java.util.List; +import java.util.Map; +import java.util.concurrent.TimeUnit; +import javax.annotation.Generated; + +// AUTO-GENERATED DOCUMENTATION AND CLASS. +/** + * REST stub implementation for the SecretManagerService service API. + * + *

This class is for advanced usage and reflects the underlying API directly. + */ +@Generated("by gapic-generator-java") +@BetaApi +public class HttpJsonSecretManagerServiceStub extends SecretManagerServiceStub { + private static final TypeRegistry typeRegistry = TypeRegistry.newBuilder().build(); + + private static final ApiMethodDescriptor + listSecretsMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName("google.cloud.secretmanager.v1.SecretManagerService/ListSecrets") + .setHttpMethod("GET") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1/{parent=projects/*}/secrets", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "parent", request.getParent()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putQueryParam(fields, "filter", request.getFilter()); + serializer.putQueryParam(fields, "pageSize", request.getPageSize()); + serializer.putQueryParam(fields, "pageToken", request.getPageToken()); + return fields; + }) + .setRequestBodyExtractor(request -> null) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(ListSecretsResponse.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + createSecretMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName("google.cloud.secretmanager.v1.SecretManagerService/CreateSecret") + .setHttpMethod("POST") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1/{parent=projects/*}/secrets", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "parent", request.getParent()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putQueryParam(fields, "secretId", request.getSecretId()); + return fields; + }) + .setRequestBodyExtractor( + request -> + ProtoRestSerializer.create().toBody("secret", request.getSecret())) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(Secret.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + addSecretVersionMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName( + "google.cloud.secretmanager.v1.SecretManagerService/AddSecretVersion") + .setHttpMethod("POST") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1/{parent=projects/*/secrets/*}:addVersion", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "parent", request.getParent()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + return fields; + }) + .setRequestBodyExtractor( + request -> + ProtoRestSerializer.create() + .toBody("*", request.toBuilder().clearParent().build())) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(SecretVersion.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor getSecretMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName("google.cloud.secretmanager.v1.SecretManagerService/GetSecret") + .setHttpMethod("GET") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1/{name=projects/*/secrets/*}", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "name", request.getName()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + return fields; + }) + .setRequestBodyExtractor(request -> null) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(Secret.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + updateSecretMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName("google.cloud.secretmanager.v1.SecretManagerService/UpdateSecret") + .setHttpMethod("PATCH") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1/{secret.name=projects/*/secrets/*}", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam( + fields, "secret.name", request.getSecret().getName()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putQueryParam(fields, "updateMask", request.getUpdateMask()); + return fields; + }) + .setRequestBodyExtractor( + request -> + ProtoRestSerializer.create().toBody("secret", request.getSecret())) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(Secret.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + deleteSecretMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName("google.cloud.secretmanager.v1.SecretManagerService/DeleteSecret") + .setHttpMethod("DELETE") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1/{name=projects/*/secrets/*}", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "name", request.getName()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putQueryParam(fields, "etag", request.getEtag()); + return fields; + }) + .setRequestBodyExtractor(request -> null) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(Empty.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + listSecretVersionsMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName( + "google.cloud.secretmanager.v1.SecretManagerService/ListSecretVersions") + .setHttpMethod("GET") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1/{parent=projects/*/secrets/*}/versions", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "parent", request.getParent()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putQueryParam(fields, "filter", request.getFilter()); + serializer.putQueryParam(fields, "pageSize", request.getPageSize()); + serializer.putQueryParam(fields, "pageToken", request.getPageToken()); + return fields; + }) + .setRequestBodyExtractor(request -> null) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(ListSecretVersionsResponse.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + getSecretVersionMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName( + "google.cloud.secretmanager.v1.SecretManagerService/GetSecretVersion") + .setHttpMethod("GET") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1/{name=projects/*/secrets/*/versions/*}", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "name", request.getName()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + return fields; + }) + .setRequestBodyExtractor(request -> null) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(SecretVersion.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + accessSecretVersionMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName( + "google.cloud.secretmanager.v1.SecretManagerService/AccessSecretVersion") + .setHttpMethod("GET") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1/{name=projects/*/secrets/*/versions/*}:access", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "name", request.getName()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + return fields; + }) + .setRequestBodyExtractor(request -> null) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(AccessSecretVersionResponse.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + disableSecretVersionMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName( + "google.cloud.secretmanager.v1.SecretManagerService/DisableSecretVersion") + .setHttpMethod("POST") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1/{name=projects/*/secrets/*/versions/*}:disable", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "name", request.getName()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + return fields; + }) + .setRequestBodyExtractor( + request -> + ProtoRestSerializer.create() + .toBody("*", request.toBuilder().clearName().build())) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(SecretVersion.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + enableSecretVersionMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName( + "google.cloud.secretmanager.v1.SecretManagerService/EnableSecretVersion") + .setHttpMethod("POST") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1/{name=projects/*/secrets/*/versions/*}:enable", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "name", request.getName()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + return fields; + }) + .setRequestBodyExtractor( + request -> + ProtoRestSerializer.create() + .toBody("*", request.toBuilder().clearName().build())) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(SecretVersion.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + destroySecretVersionMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName( + "google.cloud.secretmanager.v1.SecretManagerService/DestroySecretVersion") + .setHttpMethod("POST") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1/{name=projects/*/secrets/*/versions/*}:destroy", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "name", request.getName()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + return fields; + }) + .setRequestBodyExtractor( + request -> + ProtoRestSerializer.create() + .toBody("*", request.toBuilder().clearName().build())) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(SecretVersion.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + setIamPolicyMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName("google.cloud.secretmanager.v1.SecretManagerService/SetIamPolicy") + .setHttpMethod("POST") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1/{resource=projects/*/secrets/*}:setIamPolicy", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "resource", request.getResource()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + return fields; + }) + .setRequestBodyExtractor( + request -> + ProtoRestSerializer.create() + .toBody("*", request.toBuilder().clearResource().build())) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(Policy.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + getIamPolicyMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName("google.cloud.secretmanager.v1.SecretManagerService/GetIamPolicy") + .setHttpMethod("GET") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1/{resource=projects/*/secrets/*}:getIamPolicy", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "resource", request.getResource()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putQueryParam(fields, "options", request.getOptions()); + return fields; + }) + .setRequestBodyExtractor(request -> null) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(Policy.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private static final ApiMethodDescriptor + testIamPermissionsMethodDescriptor = + ApiMethodDescriptor.newBuilder() + .setFullMethodName( + "google.cloud.secretmanager.v1.SecretManagerService/TestIamPermissions") + .setHttpMethod("POST") + .setType(ApiMethodDescriptor.MethodType.UNARY) + .setRequestFormatter( + ProtoMessageRequestFormatter.newBuilder() + .setPath( + "/v1/{resource=projects/*/secrets/*}:testIamPermissions", + request -> { + Map fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + serializer.putPathParam(fields, "resource", request.getResource()); + return fields; + }) + .setQueryParamsExtractor( + request -> { + Map> fields = new HashMap<>(); + ProtoRestSerializer serializer = + ProtoRestSerializer.create(); + return fields; + }) + .setRequestBodyExtractor( + request -> + ProtoRestSerializer.create() + .toBody("*", request.toBuilder().clearResource().build())) + .build()) + .setResponseParser( + ProtoMessageResponseParser.newBuilder() + .setDefaultInstance(TestIamPermissionsResponse.getDefaultInstance()) + .setDefaultTypeRegistry(typeRegistry) + .build()) + .build(); + + private final UnaryCallable listSecretsCallable; + private final UnaryCallable + listSecretsPagedCallable; + private final UnaryCallable createSecretCallable; + private final UnaryCallable addSecretVersionCallable; + private final UnaryCallable getSecretCallable; + private final UnaryCallable updateSecretCallable; + private final UnaryCallable deleteSecretCallable; + private final UnaryCallable + listSecretVersionsCallable; + private final UnaryCallable + listSecretVersionsPagedCallable; + private final UnaryCallable getSecretVersionCallable; + private final UnaryCallable + accessSecretVersionCallable; + private final UnaryCallable + disableSecretVersionCallable; + private final UnaryCallable + enableSecretVersionCallable; + private final UnaryCallable + destroySecretVersionCallable; + private final UnaryCallable setIamPolicyCallable; + private final UnaryCallable getIamPolicyCallable; + private final UnaryCallable + testIamPermissionsCallable; + + private final BackgroundResource backgroundResources; + private final HttpJsonStubCallableFactory callableFactory; + + public static final HttpJsonSecretManagerServiceStub create( + SecretManagerServiceStubSettings settings) throws IOException { + return new HttpJsonSecretManagerServiceStub(settings, ClientContext.create(settings)); + } + + public static final HttpJsonSecretManagerServiceStub create(ClientContext clientContext) + throws IOException { + return new HttpJsonSecretManagerServiceStub( + SecretManagerServiceStubSettings.newHttpJsonBuilder().build(), clientContext); + } + + public static final HttpJsonSecretManagerServiceStub create( + ClientContext clientContext, HttpJsonStubCallableFactory callableFactory) throws IOException { + return new HttpJsonSecretManagerServiceStub( + SecretManagerServiceStubSettings.newHttpJsonBuilder().build(), + clientContext, + callableFactory); + } + + /** + * Constructs an instance of HttpJsonSecretManagerServiceStub, using the given settings. This is + * protected so that it is easy to make a subclass, but otherwise, the static factory methods + * should be preferred. + */ + protected HttpJsonSecretManagerServiceStub( + SecretManagerServiceStubSettings settings, ClientContext clientContext) throws IOException { + this(settings, clientContext, new HttpJsonSecretManagerServiceCallableFactory()); + } + + /** + * Constructs an instance of HttpJsonSecretManagerServiceStub, using the given settings. This is + * protected so that it is easy to make a subclass, but otherwise, the static factory methods + * should be preferred. + */ + protected HttpJsonSecretManagerServiceStub( + SecretManagerServiceStubSettings settings, + ClientContext clientContext, + HttpJsonStubCallableFactory callableFactory) + throws IOException { + this.callableFactory = callableFactory; + + HttpJsonCallSettings listSecretsTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(listSecretsMethodDescriptor) + .setTypeRegistry(typeRegistry) + .build(); + HttpJsonCallSettings createSecretTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(createSecretMethodDescriptor) + .setTypeRegistry(typeRegistry) + .build(); + HttpJsonCallSettings addSecretVersionTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(addSecretVersionMethodDescriptor) + .setTypeRegistry(typeRegistry) + .build(); + HttpJsonCallSettings getSecretTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(getSecretMethodDescriptor) + .setTypeRegistry(typeRegistry) + .build(); + HttpJsonCallSettings updateSecretTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(updateSecretMethodDescriptor) + .setTypeRegistry(typeRegistry) + .build(); + HttpJsonCallSettings deleteSecretTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(deleteSecretMethodDescriptor) + .setTypeRegistry(typeRegistry) + .build(); + HttpJsonCallSettings + listSecretVersionsTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(listSecretVersionsMethodDescriptor) + .setTypeRegistry(typeRegistry) + .build(); + HttpJsonCallSettings getSecretVersionTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(getSecretVersionMethodDescriptor) + .setTypeRegistry(typeRegistry) + .build(); + HttpJsonCallSettings + accessSecretVersionTransportSettings = + HttpJsonCallSettings + .newBuilder() + .setMethodDescriptor(accessSecretVersionMethodDescriptor) + .setTypeRegistry(typeRegistry) + .build(); + HttpJsonCallSettings + disableSecretVersionTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(disableSecretVersionMethodDescriptor) + .setTypeRegistry(typeRegistry) + .build(); + HttpJsonCallSettings + enableSecretVersionTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(enableSecretVersionMethodDescriptor) + .setTypeRegistry(typeRegistry) + .build(); + HttpJsonCallSettings + destroySecretVersionTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(destroySecretVersionMethodDescriptor) + .setTypeRegistry(typeRegistry) + .build(); + HttpJsonCallSettings setIamPolicyTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(setIamPolicyMethodDescriptor) + .setTypeRegistry(typeRegistry) + .build(); + HttpJsonCallSettings getIamPolicyTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(getIamPolicyMethodDescriptor) + .setTypeRegistry(typeRegistry) + .build(); + HttpJsonCallSettings + testIamPermissionsTransportSettings = + HttpJsonCallSettings.newBuilder() + .setMethodDescriptor(testIamPermissionsMethodDescriptor) + .setTypeRegistry(typeRegistry) + .build(); + + this.listSecretsCallable = + callableFactory.createUnaryCallable( + listSecretsTransportSettings, settings.listSecretsSettings(), clientContext); + this.listSecretsPagedCallable = + callableFactory.createPagedCallable( + listSecretsTransportSettings, settings.listSecretsSettings(), clientContext); + this.createSecretCallable = + callableFactory.createUnaryCallable( + createSecretTransportSettings, settings.createSecretSettings(), clientContext); + this.addSecretVersionCallable = + callableFactory.createUnaryCallable( + addSecretVersionTransportSettings, settings.addSecretVersionSettings(), clientContext); + this.getSecretCallable = + callableFactory.createUnaryCallable( + getSecretTransportSettings, settings.getSecretSettings(), clientContext); + this.updateSecretCallable = + callableFactory.createUnaryCallable( + updateSecretTransportSettings, settings.updateSecretSettings(), clientContext); + this.deleteSecretCallable = + callableFactory.createUnaryCallable( + deleteSecretTransportSettings, settings.deleteSecretSettings(), clientContext); + this.listSecretVersionsCallable = + callableFactory.createUnaryCallable( + listSecretVersionsTransportSettings, + settings.listSecretVersionsSettings(), + clientContext); + this.listSecretVersionsPagedCallable = + callableFactory.createPagedCallable( + listSecretVersionsTransportSettings, + settings.listSecretVersionsSettings(), + clientContext); + this.getSecretVersionCallable = + callableFactory.createUnaryCallable( + getSecretVersionTransportSettings, settings.getSecretVersionSettings(), clientContext); + this.accessSecretVersionCallable = + callableFactory.createUnaryCallable( + accessSecretVersionTransportSettings, + settings.accessSecretVersionSettings(), + clientContext); + this.disableSecretVersionCallable = + callableFactory.createUnaryCallable( + disableSecretVersionTransportSettings, + settings.disableSecretVersionSettings(), + clientContext); + this.enableSecretVersionCallable = + callableFactory.createUnaryCallable( + enableSecretVersionTransportSettings, + settings.enableSecretVersionSettings(), + clientContext); + this.destroySecretVersionCallable = + callableFactory.createUnaryCallable( + destroySecretVersionTransportSettings, + settings.destroySecretVersionSettings(), + clientContext); + this.setIamPolicyCallable = + callableFactory.createUnaryCallable( + setIamPolicyTransportSettings, settings.setIamPolicySettings(), clientContext); + this.getIamPolicyCallable = + callableFactory.createUnaryCallable( + getIamPolicyTransportSettings, settings.getIamPolicySettings(), clientContext); + this.testIamPermissionsCallable = + callableFactory.createUnaryCallable( + testIamPermissionsTransportSettings, + settings.testIamPermissionsSettings(), + clientContext); + + this.backgroundResources = + new BackgroundResourceAggregation(clientContext.getBackgroundResources()); + } + + @InternalApi + public static List getMethodDescriptors() { + List methodDescriptors = new ArrayList<>(); + methodDescriptors.add(listSecretsMethodDescriptor); + methodDescriptors.add(createSecretMethodDescriptor); + methodDescriptors.add(addSecretVersionMethodDescriptor); + methodDescriptors.add(getSecretMethodDescriptor); + methodDescriptors.add(updateSecretMethodDescriptor); + methodDescriptors.add(deleteSecretMethodDescriptor); + methodDescriptors.add(listSecretVersionsMethodDescriptor); + methodDescriptors.add(getSecretVersionMethodDescriptor); + methodDescriptors.add(accessSecretVersionMethodDescriptor); + methodDescriptors.add(disableSecretVersionMethodDescriptor); + methodDescriptors.add(enableSecretVersionMethodDescriptor); + methodDescriptors.add(destroySecretVersionMethodDescriptor); + methodDescriptors.add(setIamPolicyMethodDescriptor); + methodDescriptors.add(getIamPolicyMethodDescriptor); + methodDescriptors.add(testIamPermissionsMethodDescriptor); + return methodDescriptors; + } + + @Override + public UnaryCallable listSecretsCallable() { + return listSecretsCallable; + } + + @Override + public UnaryCallable listSecretsPagedCallable() { + return listSecretsPagedCallable; + } + + @Override + public UnaryCallable createSecretCallable() { + return createSecretCallable; + } + + @Override + public UnaryCallable addSecretVersionCallable() { + return addSecretVersionCallable; + } + + @Override + public UnaryCallable getSecretCallable() { + return getSecretCallable; + } + + @Override + public UnaryCallable updateSecretCallable() { + return updateSecretCallable; + } + + @Override + public UnaryCallable deleteSecretCallable() { + return deleteSecretCallable; + } + + @Override + public UnaryCallable + listSecretVersionsCallable() { + return listSecretVersionsCallable; + } + + @Override + public UnaryCallable + listSecretVersionsPagedCallable() { + return listSecretVersionsPagedCallable; + } + + @Override + public UnaryCallable getSecretVersionCallable() { + return getSecretVersionCallable; + } + + @Override + public UnaryCallable + accessSecretVersionCallable() { + return accessSecretVersionCallable; + } + + @Override + public UnaryCallable disableSecretVersionCallable() { + return disableSecretVersionCallable; + } + + @Override + public UnaryCallable enableSecretVersionCallable() { + return enableSecretVersionCallable; + } + + @Override + public UnaryCallable destroySecretVersionCallable() { + return destroySecretVersionCallable; + } + + @Override + public UnaryCallable setIamPolicyCallable() { + return setIamPolicyCallable; + } + + @Override + public UnaryCallable getIamPolicyCallable() { + return getIamPolicyCallable; + } + + @Override + public UnaryCallable + testIamPermissionsCallable() { + return testIamPermissionsCallable; + } + + @Override + public final void close() { + try { + backgroundResources.close(); + } catch (RuntimeException e) { + throw e; + } catch (Exception e) { + throw new IllegalStateException("Failed to close resource", e); + } + } + + @Override + public void shutdown() { + backgroundResources.shutdown(); + } + + @Override + public boolean isShutdown() { + return backgroundResources.isShutdown(); + } + + @Override + public boolean isTerminated() { + return backgroundResources.isTerminated(); + } + + @Override + public void shutdownNow() { + backgroundResources.shutdownNow(); + } + + @Override + public boolean awaitTermination(long duration, TimeUnit unit) throws InterruptedException { + return backgroundResources.awaitTermination(duration, unit); + } +} diff --git a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/stub/SecretManagerServiceStubSettings.java b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/stub/SecretManagerServiceStubSettings.java index 40db8649..a0855cea 100644 --- a/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/stub/SecretManagerServiceStubSettings.java +++ b/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1/stub/SecretManagerServiceStubSettings.java @@ -28,6 +28,9 @@ import com.google.api.gax.grpc.GaxGrpcProperties; import com.google.api.gax.grpc.GrpcTransportChannel; import com.google.api.gax.grpc.InstantiatingGrpcChannelProvider; +import com.google.api.gax.httpjson.GaxHttpJsonProperties; +import com.google.api.gax.httpjson.HttpJsonTransportChannel; +import com.google.api.gax.httpjson.InstantiatingHttpJsonChannelProvider; import com.google.api.gax.retrying.RetrySettings; import com.google.api.gax.rpc.ApiCallContext; import com.google.api.gax.rpc.ApiClientHeaderProvider; @@ -342,6 +345,11 @@ public SecretManagerServiceStub createStub() throws IOException { .equals(GrpcTransportChannel.getGrpcTransportName())) { return GrpcSecretManagerServiceStub.create(this); } + if (getTransportChannelProvider() + .getTransportName() + .equals(HttpJsonTransportChannel.getHttpJsonTransportName())) { + return HttpJsonSecretManagerServiceStub.create(this); + } throw new UnsupportedOperationException( String.format( "Transport not supported: %s", getTransportChannelProvider().getTransportName())); @@ -374,18 +382,25 @@ public static GoogleCredentialsProvider.Builder defaultCredentialsProviderBuilde .setUseJwtAccessWithScope(true); } - /** Returns a builder for the default ChannelProvider for this service. */ + /** Returns a builder for the default gRPC ChannelProvider for this service. */ public static InstantiatingGrpcChannelProvider.Builder defaultGrpcTransportProviderBuilder() { return InstantiatingGrpcChannelProvider.newBuilder() .setMaxInboundMessageSize(Integer.MAX_VALUE); } + /** Returns a builder for the default REST ChannelProvider for this service. */ + @BetaApi + public static InstantiatingHttpJsonChannelProvider.Builder + defaultHttpJsonTransportProviderBuilder() { + return InstantiatingHttpJsonChannelProvider.newBuilder(); + } + public static TransportChannelProvider defaultTransportChannelProvider() { return defaultGrpcTransportProviderBuilder().build(); } @BetaApi("The surface for customizing headers is not stable yet and may change in the future.") - public static ApiClientHeaderProvider.Builder defaultApiClientHeaderProviderBuilder() { + public static ApiClientHeaderProvider.Builder defaultGrpcApiClientHeaderProviderBuilder() { return ApiClientHeaderProvider.newBuilder() .setGeneratedLibToken( "gapic", GaxProperties.getLibraryVersion(SecretManagerServiceStubSettings.class)) @@ -393,11 +408,30 @@ public static ApiClientHeaderProvider.Builder defaultApiClientHeaderProviderBuil GaxGrpcProperties.getGrpcTokenName(), GaxGrpcProperties.getGrpcVersion()); } - /** Returns a new builder for this class. */ + @BetaApi("The surface for customizing headers is not stable yet and may change in the future.") + public static ApiClientHeaderProvider.Builder defaultHttpJsonApiClientHeaderProviderBuilder() { + return ApiClientHeaderProvider.newBuilder() + .setGeneratedLibToken( + "gapic", GaxProperties.getLibraryVersion(SecretManagerServiceStubSettings.class)) + .setTransportToken( + GaxHttpJsonProperties.getHttpJsonTokenName(), + GaxHttpJsonProperties.getHttpJsonVersion()); + } + + public static ApiClientHeaderProvider.Builder defaultApiClientHeaderProviderBuilder() { + return SecretManagerServiceStubSettings.defaultGrpcApiClientHeaderProviderBuilder(); + } + + /** Returns a new gRPC builder for this class. */ public static Builder newBuilder() { return Builder.createDefault(); } + /** Returns a new REST builder for this class. */ + public static Builder newHttpJsonBuilder() { + return Builder.createHttpJsonDefault(); + } + /** Returns a new builder for this class. */ public static Builder newBuilder(ClientContext clientContext) { return new Builder(clientContext); @@ -595,6 +629,19 @@ private static Builder createDefault() { return initDefaults(builder); } + private static Builder createHttpJsonDefault() { + Builder builder = new Builder(((ClientContext) null)); + + builder.setTransportChannelProvider(defaultHttpJsonTransportProviderBuilder().build()); + builder.setCredentialsProvider(defaultCredentialsProviderBuilder().build()); + builder.setInternalHeaderProvider(defaultHttpJsonApiClientHeaderProviderBuilder().build()); + builder.setEndpoint(getDefaultEndpoint()); + builder.setMtlsEndpoint(getDefaultMtlsEndpoint()); + builder.setSwitchToMtlsEndpointAllowed(true); + + return initDefaults(builder); + } + private static Builder initDefaults(Builder builder) { builder .listSecretsSettings() diff --git a/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClientHttpJsonTest.java b/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClientHttpJsonTest.java new file mode 100644 index 00000000..4ed8e5b5 --- /dev/null +++ b/google-cloud-secretmanager/src/test/java/com/google/cloud/secretmanager/v1/SecretManagerServiceClientHttpJsonTest.java @@ -0,0 +1,1403 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1; + +import static com.google.cloud.secretmanager.v1.SecretManagerServiceClient.ListSecretVersionsPagedResponse; +import static com.google.cloud.secretmanager.v1.SecretManagerServiceClient.ListSecretsPagedResponse; + +import com.google.api.gax.core.NoCredentialsProvider; +import com.google.api.gax.httpjson.GaxHttpJsonProperties; +import com.google.api.gax.httpjson.testing.MockHttpService; +import com.google.api.gax.rpc.ApiClientHeaderProvider; +import com.google.api.gax.rpc.ApiException; +import com.google.api.gax.rpc.ApiExceptionFactory; +import com.google.api.gax.rpc.InvalidArgumentException; +import com.google.api.gax.rpc.StatusCode; +import com.google.api.gax.rpc.testing.FakeStatusCode; +import com.google.cloud.secretmanager.v1.stub.HttpJsonSecretManagerServiceStub; +import com.google.common.collect.Lists; +import com.google.iam.v1.AuditConfig; +import com.google.iam.v1.Binding; +import com.google.iam.v1.GetIamPolicyRequest; +import com.google.iam.v1.GetPolicyOptions; +import com.google.iam.v1.Policy; +import com.google.iam.v1.SetIamPolicyRequest; +import com.google.iam.v1.TestIamPermissionsRequest; +import com.google.iam.v1.TestIamPermissionsResponse; +import com.google.protobuf.ByteString; +import com.google.protobuf.Empty; +import com.google.protobuf.FieldMask; +import com.google.protobuf.Timestamp; +import java.io.IOException; +import java.util.ArrayList; +import java.util.Arrays; +import java.util.HashMap; +import java.util.List; +import javax.annotation.Generated; +import org.junit.After; +import org.junit.AfterClass; +import org.junit.Assert; +import org.junit.Before; +import org.junit.BeforeClass; +import org.junit.Test; + +@Generated("by gapic-generator-java") +public class SecretManagerServiceClientHttpJsonTest { + private static MockHttpService mockService; + private static SecretManagerServiceClient client; + + @BeforeClass + public static void startStaticServer() throws IOException { + mockService = + new MockHttpService( + HttpJsonSecretManagerServiceStub.getMethodDescriptors(), + SecretManagerServiceSettings.getDefaultEndpoint()); + SecretManagerServiceSettings settings = + SecretManagerServiceSettings.newHttpJsonBuilder() + .setTransportChannelProvider( + SecretManagerServiceSettings.defaultHttpJsonTransportProviderBuilder() + .setHttpTransport(mockService) + .build()) + .setCredentialsProvider(NoCredentialsProvider.create()) + .build(); + client = SecretManagerServiceClient.create(settings); + } + + @AfterClass + public static void stopServer() { + client.close(); + } + + @Before + public void setUp() {} + + @After + public void tearDown() throws Exception { + mockService.reset(); + } + + @Test + public void listSecretsTest() throws Exception { + Secret responsesElement = Secret.newBuilder().build(); + ListSecretsResponse expectedResponse = + ListSecretsResponse.newBuilder() + .setNextPageToken("") + .addAllSecrets(Arrays.asList(responsesElement)) + .build(); + mockService.addResponse(expectedResponse); + + ProjectName parent = ProjectName.of("[PROJECT]"); + + ListSecretsPagedResponse pagedListResponse = client.listSecrets(parent); + + List resources = Lists.newArrayList(pagedListResponse.iterateAll()); + + Assert.assertEquals(1, resources.size()); + Assert.assertEquals(expectedResponse.getSecretsList().get(0), resources.get(0)); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void listSecretsExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + ProjectName parent = ProjectName.of("[PROJECT]"); + client.listSecrets(parent); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void listSecretsTest2() throws Exception { + Secret responsesElement = Secret.newBuilder().build(); + ListSecretsResponse expectedResponse = + ListSecretsResponse.newBuilder() + .setNextPageToken("") + .addAllSecrets(Arrays.asList(responsesElement)) + .build(); + mockService.addResponse(expectedResponse); + + String parent = "projects/project-2353"; + + ListSecretsPagedResponse pagedListResponse = client.listSecrets(parent); + + List resources = Lists.newArrayList(pagedListResponse.iterateAll()); + + Assert.assertEquals(1, resources.size()); + Assert.assertEquals(expectedResponse.getSecretsList().get(0), resources.get(0)); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void listSecretsExceptionTest2() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + String parent = "projects/project-2353"; + client.listSecrets(parent); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void createSecretTest() throws Exception { + Secret expectedResponse = + Secret.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setReplication(Replication.newBuilder().build()) + .setCreateTime(Timestamp.newBuilder().build()) + .putAllLabels(new HashMap()) + .addAllTopics(new ArrayList()) + .setEtag("etag3123477") + .setRotation(Rotation.newBuilder().build()) + .putAllVersionAliases(new HashMap()) + .build(); + mockService.addResponse(expectedResponse); + + ProjectName parent = ProjectName.of("[PROJECT]"); + String secretId = "secretId945974251"; + Secret secret = Secret.newBuilder().build(); + + Secret actualResponse = client.createSecret(parent, secretId, secret); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void createSecretExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + ProjectName parent = ProjectName.of("[PROJECT]"); + String secretId = "secretId945974251"; + Secret secret = Secret.newBuilder().build(); + client.createSecret(parent, secretId, secret); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void createSecretTest2() throws Exception { + Secret expectedResponse = + Secret.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setReplication(Replication.newBuilder().build()) + .setCreateTime(Timestamp.newBuilder().build()) + .putAllLabels(new HashMap()) + .addAllTopics(new ArrayList()) + .setEtag("etag3123477") + .setRotation(Rotation.newBuilder().build()) + .putAllVersionAliases(new HashMap()) + .build(); + mockService.addResponse(expectedResponse); + + String parent = "projects/project-2353"; + String secretId = "secretId945974251"; + Secret secret = Secret.newBuilder().build(); + + Secret actualResponse = client.createSecret(parent, secretId, secret); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void createSecretExceptionTest2() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + String parent = "projects/project-2353"; + String secretId = "secretId945974251"; + Secret secret = Secret.newBuilder().build(); + client.createSecret(parent, secretId, secret); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void addSecretVersionTest() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .setReplicationStatus(ReplicationStatus.newBuilder().build()) + .setEtag("etag3123477") + .setClientSpecifiedPayloadChecksum(true) + .build(); + mockService.addResponse(expectedResponse); + + SecretName parent = SecretName.of("[PROJECT]", "[SECRET]"); + SecretPayload payload = SecretPayload.newBuilder().build(); + + SecretVersion actualResponse = client.addSecretVersion(parent, payload); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void addSecretVersionExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + SecretName parent = SecretName.of("[PROJECT]", "[SECRET]"); + SecretPayload payload = SecretPayload.newBuilder().build(); + client.addSecretVersion(parent, payload); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void addSecretVersionTest2() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .setReplicationStatus(ReplicationStatus.newBuilder().build()) + .setEtag("etag3123477") + .setClientSpecifiedPayloadChecksum(true) + .build(); + mockService.addResponse(expectedResponse); + + String parent = "projects/project-3502/secrets/secret-3502"; + SecretPayload payload = SecretPayload.newBuilder().build(); + + SecretVersion actualResponse = client.addSecretVersion(parent, payload); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void addSecretVersionExceptionTest2() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + String parent = "projects/project-3502/secrets/secret-3502"; + SecretPayload payload = SecretPayload.newBuilder().build(); + client.addSecretVersion(parent, payload); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void getSecretTest() throws Exception { + Secret expectedResponse = + Secret.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setReplication(Replication.newBuilder().build()) + .setCreateTime(Timestamp.newBuilder().build()) + .putAllLabels(new HashMap()) + .addAllTopics(new ArrayList()) + .setEtag("etag3123477") + .setRotation(Rotation.newBuilder().build()) + .putAllVersionAliases(new HashMap()) + .build(); + mockService.addResponse(expectedResponse); + + SecretName name = SecretName.of("[PROJECT]", "[SECRET]"); + + Secret actualResponse = client.getSecret(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void getSecretExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + SecretName name = SecretName.of("[PROJECT]", "[SECRET]"); + client.getSecret(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void getSecretTest2() throws Exception { + Secret expectedResponse = + Secret.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setReplication(Replication.newBuilder().build()) + .setCreateTime(Timestamp.newBuilder().build()) + .putAllLabels(new HashMap()) + .addAllTopics(new ArrayList()) + .setEtag("etag3123477") + .setRotation(Rotation.newBuilder().build()) + .putAllVersionAliases(new HashMap()) + .build(); + mockService.addResponse(expectedResponse); + + String name = "projects/project-5249/secrets/secret-5249"; + + Secret actualResponse = client.getSecret(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void getSecretExceptionTest2() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + String name = "projects/project-5249/secrets/secret-5249"; + client.getSecret(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void updateSecretTest() throws Exception { + Secret expectedResponse = + Secret.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setReplication(Replication.newBuilder().build()) + .setCreateTime(Timestamp.newBuilder().build()) + .putAllLabels(new HashMap()) + .addAllTopics(new ArrayList()) + .setEtag("etag3123477") + .setRotation(Rotation.newBuilder().build()) + .putAllVersionAliases(new HashMap()) + .build(); + mockService.addResponse(expectedResponse); + + Secret secret = + Secret.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setReplication(Replication.newBuilder().build()) + .setCreateTime(Timestamp.newBuilder().build()) + .putAllLabels(new HashMap()) + .addAllTopics(new ArrayList()) + .setEtag("etag3123477") + .setRotation(Rotation.newBuilder().build()) + .putAllVersionAliases(new HashMap()) + .build(); + FieldMask updateMask = FieldMask.newBuilder().build(); + + Secret actualResponse = client.updateSecret(secret, updateMask); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void updateSecretExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + Secret secret = + Secret.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setReplication(Replication.newBuilder().build()) + .setCreateTime(Timestamp.newBuilder().build()) + .putAllLabels(new HashMap()) + .addAllTopics(new ArrayList()) + .setEtag("etag3123477") + .setRotation(Rotation.newBuilder().build()) + .putAllVersionAliases(new HashMap()) + .build(); + FieldMask updateMask = FieldMask.newBuilder().build(); + client.updateSecret(secret, updateMask); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void deleteSecretTest() throws Exception { + Empty expectedResponse = Empty.newBuilder().build(); + mockService.addResponse(expectedResponse); + + SecretName name = SecretName.of("[PROJECT]", "[SECRET]"); + + client.deleteSecret(name); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void deleteSecretExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + SecretName name = SecretName.of("[PROJECT]", "[SECRET]"); + client.deleteSecret(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void deleteSecretTest2() throws Exception { + Empty expectedResponse = Empty.newBuilder().build(); + mockService.addResponse(expectedResponse); + + String name = "projects/project-5249/secrets/secret-5249"; + + client.deleteSecret(name); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void deleteSecretExceptionTest2() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + String name = "projects/project-5249/secrets/secret-5249"; + client.deleteSecret(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void listSecretVersionsTest() throws Exception { + SecretVersion responsesElement = SecretVersion.newBuilder().build(); + ListSecretVersionsResponse expectedResponse = + ListSecretVersionsResponse.newBuilder() + .setNextPageToken("") + .addAllVersions(Arrays.asList(responsesElement)) + .build(); + mockService.addResponse(expectedResponse); + + SecretName parent = SecretName.of("[PROJECT]", "[SECRET]"); + + ListSecretVersionsPagedResponse pagedListResponse = client.listSecretVersions(parent); + + List resources = Lists.newArrayList(pagedListResponse.iterateAll()); + + Assert.assertEquals(1, resources.size()); + Assert.assertEquals(expectedResponse.getVersionsList().get(0), resources.get(0)); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void listSecretVersionsExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + SecretName parent = SecretName.of("[PROJECT]", "[SECRET]"); + client.listSecretVersions(parent); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void listSecretVersionsTest2() throws Exception { + SecretVersion responsesElement = SecretVersion.newBuilder().build(); + ListSecretVersionsResponse expectedResponse = + ListSecretVersionsResponse.newBuilder() + .setNextPageToken("") + .addAllVersions(Arrays.asList(responsesElement)) + .build(); + mockService.addResponse(expectedResponse); + + String parent = "projects/project-3502/secrets/secret-3502"; + + ListSecretVersionsPagedResponse pagedListResponse = client.listSecretVersions(parent); + + List resources = Lists.newArrayList(pagedListResponse.iterateAll()); + + Assert.assertEquals(1, resources.size()); + Assert.assertEquals(expectedResponse.getVersionsList().get(0), resources.get(0)); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void listSecretVersionsExceptionTest2() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + String parent = "projects/project-3502/secrets/secret-3502"; + client.listSecretVersions(parent); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void getSecretVersionTest() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .setReplicationStatus(ReplicationStatus.newBuilder().build()) + .setEtag("etag3123477") + .setClientSpecifiedPayloadChecksum(true) + .build(); + mockService.addResponse(expectedResponse); + + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + SecretVersion actualResponse = client.getSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void getSecretVersionExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + client.getSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void getSecretVersionTest2() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .setReplicationStatus(ReplicationStatus.newBuilder().build()) + .setEtag("etag3123477") + .setClientSpecifiedPayloadChecksum(true) + .build(); + mockService.addResponse(expectedResponse); + + String name = "projects/project-4186/secrets/secret-4186/versions/version-4186"; + + SecretVersion actualResponse = client.getSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void getSecretVersionExceptionTest2() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + String name = "projects/project-4186/secrets/secret-4186/versions/version-4186"; + client.getSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void accessSecretVersionTest() throws Exception { + AccessSecretVersionResponse expectedResponse = + AccessSecretVersionResponse.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setPayload(SecretPayload.newBuilder().build()) + .build(); + mockService.addResponse(expectedResponse); + + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + AccessSecretVersionResponse actualResponse = client.accessSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void accessSecretVersionExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + client.accessSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void accessSecretVersionTest2() throws Exception { + AccessSecretVersionResponse expectedResponse = + AccessSecretVersionResponse.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setPayload(SecretPayload.newBuilder().build()) + .build(); + mockService.addResponse(expectedResponse); + + String name = "projects/project-4186/secrets/secret-4186/versions/version-4186"; + + AccessSecretVersionResponse actualResponse = client.accessSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void accessSecretVersionExceptionTest2() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + String name = "projects/project-4186/secrets/secret-4186/versions/version-4186"; + client.accessSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void disableSecretVersionTest() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .setReplicationStatus(ReplicationStatus.newBuilder().build()) + .setEtag("etag3123477") + .setClientSpecifiedPayloadChecksum(true) + .build(); + mockService.addResponse(expectedResponse); + + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + SecretVersion actualResponse = client.disableSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void disableSecretVersionExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + client.disableSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void disableSecretVersionTest2() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .setReplicationStatus(ReplicationStatus.newBuilder().build()) + .setEtag("etag3123477") + .setClientSpecifiedPayloadChecksum(true) + .build(); + mockService.addResponse(expectedResponse); + + String name = "projects/project-4186/secrets/secret-4186/versions/version-4186"; + + SecretVersion actualResponse = client.disableSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void disableSecretVersionExceptionTest2() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + String name = "projects/project-4186/secrets/secret-4186/versions/version-4186"; + client.disableSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void enableSecretVersionTest() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .setReplicationStatus(ReplicationStatus.newBuilder().build()) + .setEtag("etag3123477") + .setClientSpecifiedPayloadChecksum(true) + .build(); + mockService.addResponse(expectedResponse); + + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + SecretVersion actualResponse = client.enableSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void enableSecretVersionExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + client.enableSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void enableSecretVersionTest2() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .setReplicationStatus(ReplicationStatus.newBuilder().build()) + .setEtag("etag3123477") + .setClientSpecifiedPayloadChecksum(true) + .build(); + mockService.addResponse(expectedResponse); + + String name = "projects/project-4186/secrets/secret-4186/versions/version-4186"; + + SecretVersion actualResponse = client.enableSecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void enableSecretVersionExceptionTest2() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + String name = "projects/project-4186/secrets/secret-4186/versions/version-4186"; + client.enableSecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void destroySecretVersionTest() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .setReplicationStatus(ReplicationStatus.newBuilder().build()) + .setEtag("etag3123477") + .setClientSpecifiedPayloadChecksum(true) + .build(); + mockService.addResponse(expectedResponse); + + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + + SecretVersion actualResponse = client.destroySecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void destroySecretVersionExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + client.destroySecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void destroySecretVersionTest2() throws Exception { + SecretVersion expectedResponse = + SecretVersion.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setCreateTime(Timestamp.newBuilder().build()) + .setDestroyTime(Timestamp.newBuilder().build()) + .setReplicationStatus(ReplicationStatus.newBuilder().build()) + .setEtag("etag3123477") + .setClientSpecifiedPayloadChecksum(true) + .build(); + mockService.addResponse(expectedResponse); + + String name = "projects/project-4186/secrets/secret-4186/versions/version-4186"; + + SecretVersion actualResponse = client.destroySecretVersion(name); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void destroySecretVersionExceptionTest2() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + String name = "projects/project-4186/secrets/secret-4186/versions/version-4186"; + client.destroySecretVersion(name); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void setIamPolicyTest() throws Exception { + Policy expectedResponse = + Policy.newBuilder() + .setVersion(351608024) + .addAllBindings(new ArrayList()) + .addAllAuditConfigs(new ArrayList()) + .setEtag(ByteString.EMPTY) + .build(); + mockService.addResponse(expectedResponse); + + SetIamPolicyRequest request = + SetIamPolicyRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setPolicy(Policy.newBuilder().build()) + .setUpdateMask(FieldMask.newBuilder().build()) + .build(); + + Policy actualResponse = client.setIamPolicy(request); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void setIamPolicyExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + SetIamPolicyRequest request = + SetIamPolicyRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setPolicy(Policy.newBuilder().build()) + .setUpdateMask(FieldMask.newBuilder().build()) + .build(); + client.setIamPolicy(request); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void getIamPolicyTest() throws Exception { + Policy expectedResponse = + Policy.newBuilder() + .setVersion(351608024) + .addAllBindings(new ArrayList()) + .addAllAuditConfigs(new ArrayList()) + .setEtag(ByteString.EMPTY) + .build(); + mockService.addResponse(expectedResponse); + + GetIamPolicyRequest request = + GetIamPolicyRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setOptions(GetPolicyOptions.newBuilder().build()) + .build(); + + Policy actualResponse = client.getIamPolicy(request); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void getIamPolicyExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + GetIamPolicyRequest request = + GetIamPolicyRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setOptions(GetPolicyOptions.newBuilder().build()) + .build(); + client.getIamPolicy(request); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } + + @Test + public void testIamPermissionsTest() throws Exception { + TestIamPermissionsResponse expectedResponse = + TestIamPermissionsResponse.newBuilder().addAllPermissions(new ArrayList()).build(); + mockService.addResponse(expectedResponse); + + TestIamPermissionsRequest request = + TestIamPermissionsRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .addAllPermissions(new ArrayList()) + .build(); + + TestIamPermissionsResponse actualResponse = client.testIamPermissions(request); + Assert.assertEquals(expectedResponse, actualResponse); + + List actualRequests = mockService.getRequestPaths(); + Assert.assertEquals(1, actualRequests.size()); + + String apiClientHeaderKey = + mockService + .getRequestHeaders() + .get(ApiClientHeaderProvider.getDefaultApiClientHeaderKey()) + .iterator() + .next(); + Assert.assertTrue( + GaxHttpJsonProperties.getDefaultApiClientHeaderPattern() + .matcher(apiClientHeaderKey) + .matches()); + } + + @Test + public void testIamPermissionsExceptionTest() throws Exception { + ApiException exception = + ApiExceptionFactory.createException( + new Exception(), FakeStatusCode.of(StatusCode.Code.INVALID_ARGUMENT), false); + mockService.addException(exception); + + try { + TestIamPermissionsRequest request = + TestIamPermissionsRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .addAllPermissions(new ArrayList()) + .build(); + client.testIamPermissions(request); + Assert.fail("No exception raised"); + } catch (InvalidArgumentException e) { + // Expected exception. + } + } +} diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/accesssecretversion/AsyncAccessSecretVersion.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/accesssecretversion/AsyncAccessSecretVersion.java new file mode 100644 index 00000000..289aac3c --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/accesssecretversion/AsyncAccessSecretVersion.java @@ -0,0 +1,48 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_accesssecretversion_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1.AccessSecretVersionRequest; +import com.google.cloud.secretmanager.v1.AccessSecretVersionResponse; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretVersionName; + +public class AsyncAccessSecretVersion { + + public static void main(String[] args) throws Exception { + asyncAccessSecretVersion(); + } + + public static void asyncAccessSecretVersion() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + AccessSecretVersionRequest request = + AccessSecretVersionRequest.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .build(); + ApiFuture future = + secretManagerServiceClient.accessSecretVersionCallable().futureCall(request); + // Do something. + AccessSecretVersionResponse response = future.get(); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_accesssecretversion_async] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/accesssecretversion/SyncAccessSecretVersion.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/accesssecretversion/SyncAccessSecretVersion.java new file mode 100644 index 00000000..a3958303 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/accesssecretversion/SyncAccessSecretVersion.java @@ -0,0 +1,45 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_accesssecretversion_sync] +import com.google.cloud.secretmanager.v1.AccessSecretVersionRequest; +import com.google.cloud.secretmanager.v1.AccessSecretVersionResponse; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretVersionName; + +public class SyncAccessSecretVersion { + + public static void main(String[] args) throws Exception { + syncAccessSecretVersion(); + } + + public static void syncAccessSecretVersion() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + AccessSecretVersionRequest request = + AccessSecretVersionRequest.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .build(); + AccessSecretVersionResponse response = + secretManagerServiceClient.accessSecretVersion(request); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_accesssecretversion_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/accesssecretversion/SyncAccessSecretVersionSecretversionname.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/accesssecretversion/SyncAccessSecretVersionSecretversionname.java new file mode 100644 index 00000000..1ce94d5f --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/accesssecretversion/SyncAccessSecretVersionSecretversionname.java @@ -0,0 +1,42 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START +// secretmanager_v1_generated_secretmanagerserviceclient_accesssecretversion_secretversionname_sync] +import com.google.cloud.secretmanager.v1.AccessSecretVersionResponse; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretVersionName; + +public class SyncAccessSecretVersionSecretversionname { + + public static void main(String[] args) throws Exception { + syncAccessSecretVersionSecretversionname(); + } + + public static void syncAccessSecretVersionSecretversionname() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + AccessSecretVersionResponse response = secretManagerServiceClient.accessSecretVersion(name); + } + } +} +// [END +// secretmanager_v1_generated_secretmanagerserviceclient_accesssecretversion_secretversionname_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/accesssecretversion/SyncAccessSecretVersionString.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/accesssecretversion/SyncAccessSecretVersionString.java new file mode 100644 index 00000000..bfe2c2c1 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/accesssecretversion/SyncAccessSecretVersionString.java @@ -0,0 +1,40 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_accesssecretversion_string_sync] +import com.google.cloud.secretmanager.v1.AccessSecretVersionResponse; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretVersionName; + +public class SyncAccessSecretVersionString { + + public static void main(String[] args) throws Exception { + syncAccessSecretVersionString(); + } + + public static void syncAccessSecretVersionString() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + String name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString(); + AccessSecretVersionResponse response = secretManagerServiceClient.accessSecretVersion(name); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_accesssecretversion_string_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/addsecretversion/AsyncAddSecretVersion.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/addsecretversion/AsyncAddSecretVersion.java new file mode 100644 index 00000000..d599c43e --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/addsecretversion/AsyncAddSecretVersion.java @@ -0,0 +1,50 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_addsecretversion_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1.AddSecretVersionRequest; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretName; +import com.google.cloud.secretmanager.v1.SecretPayload; +import com.google.cloud.secretmanager.v1.SecretVersion; + +public class AsyncAddSecretVersion { + + public static void main(String[] args) throws Exception { + asyncAddSecretVersion(); + } + + public static void asyncAddSecretVersion() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + AddSecretVersionRequest request = + AddSecretVersionRequest.newBuilder() + .setParent(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setPayload(SecretPayload.newBuilder().build()) + .build(); + ApiFuture future = + secretManagerServiceClient.addSecretVersionCallable().futureCall(request); + // Do something. + SecretVersion response = future.get(); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_addsecretversion_async] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/addsecretversion/SyncAddSecretVersion.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/addsecretversion/SyncAddSecretVersion.java new file mode 100644 index 00000000..90490f7e --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/addsecretversion/SyncAddSecretVersion.java @@ -0,0 +1,46 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_addsecretversion_sync] +import com.google.cloud.secretmanager.v1.AddSecretVersionRequest; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretName; +import com.google.cloud.secretmanager.v1.SecretPayload; +import com.google.cloud.secretmanager.v1.SecretVersion; + +public class SyncAddSecretVersion { + + public static void main(String[] args) throws Exception { + syncAddSecretVersion(); + } + + public static void syncAddSecretVersion() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + AddSecretVersionRequest request = + AddSecretVersionRequest.newBuilder() + .setParent(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setPayload(SecretPayload.newBuilder().build()) + .build(); + SecretVersion response = secretManagerServiceClient.addSecretVersion(request); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_addsecretversion_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/addsecretversion/SyncAddSecretVersionSecretnameSecretpayload.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/addsecretversion/SyncAddSecretVersionSecretnameSecretpayload.java new file mode 100644 index 00000000..a6f7ff03 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/addsecretversion/SyncAddSecretVersionSecretnameSecretpayload.java @@ -0,0 +1,44 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START +// secretmanager_v1_generated_secretmanagerserviceclient_addsecretversion_secretnamesecretpayload_sync] +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretName; +import com.google.cloud.secretmanager.v1.SecretPayload; +import com.google.cloud.secretmanager.v1.SecretVersion; + +public class SyncAddSecretVersionSecretnameSecretpayload { + + public static void main(String[] args) throws Exception { + syncAddSecretVersionSecretnameSecretpayload(); + } + + public static void syncAddSecretVersionSecretnameSecretpayload() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + SecretName parent = SecretName.of("[PROJECT]", "[SECRET]"); + SecretPayload payload = SecretPayload.newBuilder().build(); + SecretVersion response = secretManagerServiceClient.addSecretVersion(parent, payload); + } + } +} +// [END +// secretmanager_v1_generated_secretmanagerserviceclient_addsecretversion_secretnamesecretpayload_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/addsecretversion/SyncAddSecretVersionStringSecretpayload.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/addsecretversion/SyncAddSecretVersionStringSecretpayload.java new file mode 100644 index 00000000..2ad83b31 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/addsecretversion/SyncAddSecretVersionStringSecretpayload.java @@ -0,0 +1,44 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START +// secretmanager_v1_generated_secretmanagerserviceclient_addsecretversion_stringsecretpayload_sync] +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretName; +import com.google.cloud.secretmanager.v1.SecretPayload; +import com.google.cloud.secretmanager.v1.SecretVersion; + +public class SyncAddSecretVersionStringSecretpayload { + + public static void main(String[] args) throws Exception { + syncAddSecretVersionStringSecretpayload(); + } + + public static void syncAddSecretVersionStringSecretpayload() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + String parent = SecretName.of("[PROJECT]", "[SECRET]").toString(); + SecretPayload payload = SecretPayload.newBuilder().build(); + SecretVersion response = secretManagerServiceClient.addSecretVersion(parent, payload); + } + } +} +// [END +// secretmanager_v1_generated_secretmanagerserviceclient_addsecretversion_stringsecretpayload_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/create/SyncCreateSetCredentialsProvider.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/create/SyncCreateSetCredentialsProvider.java new file mode 100644 index 00000000..c4c7e8ed --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/create/SyncCreateSetCredentialsProvider.java @@ -0,0 +1,42 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_create_setcredentialsprovider_sync] +import com.google.api.gax.core.FixedCredentialsProvider; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretManagerServiceSettings; +import com.google.cloud.secretmanager.v1.myCredentials; + +public class SyncCreateSetCredentialsProvider { + + public static void main(String[] args) throws Exception { + syncCreateSetCredentialsProvider(); + } + + public static void syncCreateSetCredentialsProvider() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + SecretManagerServiceSettings secretManagerServiceSettings = + SecretManagerServiceSettings.newBuilder() + .setCredentialsProvider(FixedCredentialsProvider.create(myCredentials)) + .build(); + SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create(secretManagerServiceSettings); + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_create_setcredentialsprovider_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/create/SyncCreateSetCredentialsProvider1.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/create/SyncCreateSetCredentialsProvider1.java new file mode 100644 index 00000000..8aea5af9 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/create/SyncCreateSetCredentialsProvider1.java @@ -0,0 +1,41 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_create_setcredentialsprovider1_sync] +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretManagerServiceSettings; + +public class SyncCreateSetCredentialsProvider1 { + + public static void main(String[] args) throws Exception { + syncCreateSetCredentialsProvider1(); + } + + public static void syncCreateSetCredentialsProvider1() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + SecretManagerServiceSettings secretManagerServiceSettings = + SecretManagerServiceSettings.newBuilder() + .setTransportChannelProvider( + SecretManagerServiceSettings.defaultHttpJsonTransportProviderBuilder().build()) + .build(); + SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create(secretManagerServiceSettings); + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_create_setcredentialsprovider1_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/create/SyncCreateSetEndpoint.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/create/SyncCreateSetEndpoint.java new file mode 100644 index 00000000..930efd79 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/create/SyncCreateSetEndpoint.java @@ -0,0 +1,39 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_create_setendpoint_sync] +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretManagerServiceSettings; +import com.google.cloud.secretmanager.v1.myEndpoint; + +public class SyncCreateSetEndpoint { + + public static void main(String[] args) throws Exception { + syncCreateSetEndpoint(); + } + + public static void syncCreateSetEndpoint() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + SecretManagerServiceSettings secretManagerServiceSettings = + SecretManagerServiceSettings.newBuilder().setEndpoint(myEndpoint).build(); + SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create(secretManagerServiceSettings); + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_create_setendpoint_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/createsecret/AsyncCreateSecret.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/createsecret/AsyncCreateSecret.java new file mode 100644 index 00000000..f4e9d879 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/createsecret/AsyncCreateSecret.java @@ -0,0 +1,50 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_createsecret_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1.CreateSecretRequest; +import com.google.cloud.secretmanager.v1.ProjectName; +import com.google.cloud.secretmanager.v1.Secret; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; + +public class AsyncCreateSecret { + + public static void main(String[] args) throws Exception { + asyncCreateSecret(); + } + + public static void asyncCreateSecret() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + CreateSecretRequest request = + CreateSecretRequest.newBuilder() + .setParent(ProjectName.of("[PROJECT]").toString()) + .setSecretId("secretId945974251") + .setSecret(Secret.newBuilder().build()) + .build(); + ApiFuture future = + secretManagerServiceClient.createSecretCallable().futureCall(request); + // Do something. + Secret response = future.get(); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_createsecret_async] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/createsecret/SyncCreateSecret.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/createsecret/SyncCreateSecret.java new file mode 100644 index 00000000..7538ac33 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/createsecret/SyncCreateSecret.java @@ -0,0 +1,46 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_createsecret_sync] +import com.google.cloud.secretmanager.v1.CreateSecretRequest; +import com.google.cloud.secretmanager.v1.ProjectName; +import com.google.cloud.secretmanager.v1.Secret; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; + +public class SyncCreateSecret { + + public static void main(String[] args) throws Exception { + syncCreateSecret(); + } + + public static void syncCreateSecret() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + CreateSecretRequest request = + CreateSecretRequest.newBuilder() + .setParent(ProjectName.of("[PROJECT]").toString()) + .setSecretId("secretId945974251") + .setSecret(Secret.newBuilder().build()) + .build(); + Secret response = secretManagerServiceClient.createSecret(request); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_createsecret_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/createsecret/SyncCreateSecretProjectnameStringSecret.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/createsecret/SyncCreateSecretProjectnameStringSecret.java new file mode 100644 index 00000000..5dd195ed --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/createsecret/SyncCreateSecretProjectnameStringSecret.java @@ -0,0 +1,44 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START +// secretmanager_v1_generated_secretmanagerserviceclient_createsecret_projectnamestringsecret_sync] +import com.google.cloud.secretmanager.v1.ProjectName; +import com.google.cloud.secretmanager.v1.Secret; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; + +public class SyncCreateSecretProjectnameStringSecret { + + public static void main(String[] args) throws Exception { + syncCreateSecretProjectnameStringSecret(); + } + + public static void syncCreateSecretProjectnameStringSecret() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + ProjectName parent = ProjectName.of("[PROJECT]"); + String secretId = "secretId945974251"; + Secret secret = Secret.newBuilder().build(); + Secret response = secretManagerServiceClient.createSecret(parent, secretId, secret); + } + } +} +// [END +// secretmanager_v1_generated_secretmanagerserviceclient_createsecret_projectnamestringsecret_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/createsecret/SyncCreateSecretStringStringSecret.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/createsecret/SyncCreateSecretStringStringSecret.java new file mode 100644 index 00000000..979aff24 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/createsecret/SyncCreateSecretStringStringSecret.java @@ -0,0 +1,43 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START +// secretmanager_v1_generated_secretmanagerserviceclient_createsecret_stringstringsecret_sync] +import com.google.cloud.secretmanager.v1.ProjectName; +import com.google.cloud.secretmanager.v1.Secret; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; + +public class SyncCreateSecretStringStringSecret { + + public static void main(String[] args) throws Exception { + syncCreateSecretStringStringSecret(); + } + + public static void syncCreateSecretStringStringSecret() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + String parent = ProjectName.of("[PROJECT]").toString(); + String secretId = "secretId945974251"; + Secret secret = Secret.newBuilder().build(); + Secret response = secretManagerServiceClient.createSecret(parent, secretId, secret); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_createsecret_stringstringsecret_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/deletesecret/AsyncDeleteSecret.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/deletesecret/AsyncDeleteSecret.java new file mode 100644 index 00000000..3fd469cf --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/deletesecret/AsyncDeleteSecret.java @@ -0,0 +1,49 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_deletesecret_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1.DeleteSecretRequest; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretName; +import com.google.protobuf.Empty; + +public class AsyncDeleteSecret { + + public static void main(String[] args) throws Exception { + asyncDeleteSecret(); + } + + public static void asyncDeleteSecret() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + DeleteSecretRequest request = + DeleteSecretRequest.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setEtag("etag3123477") + .build(); + ApiFuture future = + secretManagerServiceClient.deleteSecretCallable().futureCall(request); + // Do something. + future.get(); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_deletesecret_async] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/deletesecret/SyncDeleteSecret.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/deletesecret/SyncDeleteSecret.java new file mode 100644 index 00000000..6bd952dc --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/deletesecret/SyncDeleteSecret.java @@ -0,0 +1,44 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_deletesecret_sync] +import com.google.cloud.secretmanager.v1.DeleteSecretRequest; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretName; + +public class SyncDeleteSecret { + + public static void main(String[] args) throws Exception { + syncDeleteSecret(); + } + + public static void syncDeleteSecret() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + DeleteSecretRequest request = + DeleteSecretRequest.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setEtag("etag3123477") + .build(); + secretManagerServiceClient.deleteSecret(request); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_deletesecret_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/deletesecret/SyncDeleteSecretSecretname.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/deletesecret/SyncDeleteSecretSecretname.java new file mode 100644 index 00000000..32b5f197 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/deletesecret/SyncDeleteSecretSecretname.java @@ -0,0 +1,39 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_deletesecret_secretname_sync] +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretName; + +public class SyncDeleteSecretSecretname { + + public static void main(String[] args) throws Exception { + syncDeleteSecretSecretname(); + } + + public static void syncDeleteSecretSecretname() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + SecretName name = SecretName.of("[PROJECT]", "[SECRET]"); + secretManagerServiceClient.deleteSecret(name); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_deletesecret_secretname_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/deletesecret/SyncDeleteSecretString.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/deletesecret/SyncDeleteSecretString.java new file mode 100644 index 00000000..c40027cf --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/deletesecret/SyncDeleteSecretString.java @@ -0,0 +1,39 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_deletesecret_string_sync] +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretName; + +public class SyncDeleteSecretString { + + public static void main(String[] args) throws Exception { + syncDeleteSecretString(); + } + + public static void syncDeleteSecretString() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + String name = SecretName.of("[PROJECT]", "[SECRET]").toString(); + secretManagerServiceClient.deleteSecret(name); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_deletesecret_string_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/destroysecretversion/AsyncDestroySecretVersion.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/destroysecretversion/AsyncDestroySecretVersion.java new file mode 100644 index 00000000..1d53ab02 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/destroysecretversion/AsyncDestroySecretVersion.java @@ -0,0 +1,49 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_destroysecretversion_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1.DestroySecretVersionRequest; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretVersion; +import com.google.cloud.secretmanager.v1.SecretVersionName; + +public class AsyncDestroySecretVersion { + + public static void main(String[] args) throws Exception { + asyncDestroySecretVersion(); + } + + public static void asyncDestroySecretVersion() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + DestroySecretVersionRequest request = + DestroySecretVersionRequest.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setEtag("etag3123477") + .build(); + ApiFuture future = + secretManagerServiceClient.destroySecretVersionCallable().futureCall(request); + // Do something. + SecretVersion response = future.get(); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_destroysecretversion_async] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/destroysecretversion/SyncDestroySecretVersion.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/destroysecretversion/SyncDestroySecretVersion.java new file mode 100644 index 00000000..02112f53 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/destroysecretversion/SyncDestroySecretVersion.java @@ -0,0 +1,45 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_destroysecretversion_sync] +import com.google.cloud.secretmanager.v1.DestroySecretVersionRequest; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretVersion; +import com.google.cloud.secretmanager.v1.SecretVersionName; + +public class SyncDestroySecretVersion { + + public static void main(String[] args) throws Exception { + syncDestroySecretVersion(); + } + + public static void syncDestroySecretVersion() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + DestroySecretVersionRequest request = + DestroySecretVersionRequest.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setEtag("etag3123477") + .build(); + SecretVersion response = secretManagerServiceClient.destroySecretVersion(request); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_destroysecretversion_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/destroysecretversion/SyncDestroySecretVersionSecretversionname.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/destroysecretversion/SyncDestroySecretVersionSecretversionname.java new file mode 100644 index 00000000..79804ac2 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/destroysecretversion/SyncDestroySecretVersionSecretversionname.java @@ -0,0 +1,42 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START +// secretmanager_v1_generated_secretmanagerserviceclient_destroysecretversion_secretversionname_sync] +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretVersion; +import com.google.cloud.secretmanager.v1.SecretVersionName; + +public class SyncDestroySecretVersionSecretversionname { + + public static void main(String[] args) throws Exception { + syncDestroySecretVersionSecretversionname(); + } + + public static void syncDestroySecretVersionSecretversionname() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + SecretVersion response = secretManagerServiceClient.destroySecretVersion(name); + } + } +} +// [END +// secretmanager_v1_generated_secretmanagerserviceclient_destroysecretversion_secretversionname_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/destroysecretversion/SyncDestroySecretVersionString.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/destroysecretversion/SyncDestroySecretVersionString.java new file mode 100644 index 00000000..ed3f7376 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/destroysecretversion/SyncDestroySecretVersionString.java @@ -0,0 +1,40 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_destroysecretversion_string_sync] +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretVersion; +import com.google.cloud.secretmanager.v1.SecretVersionName; + +public class SyncDestroySecretVersionString { + + public static void main(String[] args) throws Exception { + syncDestroySecretVersionString(); + } + + public static void syncDestroySecretVersionString() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + String name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString(); + SecretVersion response = secretManagerServiceClient.destroySecretVersion(name); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_destroysecretversion_string_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/disablesecretversion/AsyncDisableSecretVersion.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/disablesecretversion/AsyncDisableSecretVersion.java new file mode 100644 index 00000000..ffc7e7bf --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/disablesecretversion/AsyncDisableSecretVersion.java @@ -0,0 +1,49 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_disablesecretversion_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1.DisableSecretVersionRequest; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretVersion; +import com.google.cloud.secretmanager.v1.SecretVersionName; + +public class AsyncDisableSecretVersion { + + public static void main(String[] args) throws Exception { + asyncDisableSecretVersion(); + } + + public static void asyncDisableSecretVersion() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + DisableSecretVersionRequest request = + DisableSecretVersionRequest.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setEtag("etag3123477") + .build(); + ApiFuture future = + secretManagerServiceClient.disableSecretVersionCallable().futureCall(request); + // Do something. + SecretVersion response = future.get(); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_disablesecretversion_async] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/disablesecretversion/SyncDisableSecretVersion.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/disablesecretversion/SyncDisableSecretVersion.java new file mode 100644 index 00000000..1e5b3807 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/disablesecretversion/SyncDisableSecretVersion.java @@ -0,0 +1,45 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_disablesecretversion_sync] +import com.google.cloud.secretmanager.v1.DisableSecretVersionRequest; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretVersion; +import com.google.cloud.secretmanager.v1.SecretVersionName; + +public class SyncDisableSecretVersion { + + public static void main(String[] args) throws Exception { + syncDisableSecretVersion(); + } + + public static void syncDisableSecretVersion() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + DisableSecretVersionRequest request = + DisableSecretVersionRequest.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setEtag("etag3123477") + .build(); + SecretVersion response = secretManagerServiceClient.disableSecretVersion(request); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_disablesecretversion_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/disablesecretversion/SyncDisableSecretVersionSecretversionname.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/disablesecretversion/SyncDisableSecretVersionSecretversionname.java new file mode 100644 index 00000000..76b0376d --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/disablesecretversion/SyncDisableSecretVersionSecretversionname.java @@ -0,0 +1,42 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START +// secretmanager_v1_generated_secretmanagerserviceclient_disablesecretversion_secretversionname_sync] +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretVersion; +import com.google.cloud.secretmanager.v1.SecretVersionName; + +public class SyncDisableSecretVersionSecretversionname { + + public static void main(String[] args) throws Exception { + syncDisableSecretVersionSecretversionname(); + } + + public static void syncDisableSecretVersionSecretversionname() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + SecretVersion response = secretManagerServiceClient.disableSecretVersion(name); + } + } +} +// [END +// secretmanager_v1_generated_secretmanagerserviceclient_disablesecretversion_secretversionname_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/disablesecretversion/SyncDisableSecretVersionString.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/disablesecretversion/SyncDisableSecretVersionString.java new file mode 100644 index 00000000..c44efcf5 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/disablesecretversion/SyncDisableSecretVersionString.java @@ -0,0 +1,40 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_disablesecretversion_string_sync] +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretVersion; +import com.google.cloud.secretmanager.v1.SecretVersionName; + +public class SyncDisableSecretVersionString { + + public static void main(String[] args) throws Exception { + syncDisableSecretVersionString(); + } + + public static void syncDisableSecretVersionString() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + String name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString(); + SecretVersion response = secretManagerServiceClient.disableSecretVersion(name); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_disablesecretversion_string_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/enablesecretversion/AsyncEnableSecretVersion.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/enablesecretversion/AsyncEnableSecretVersion.java new file mode 100644 index 00000000..b02a9f9a --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/enablesecretversion/AsyncEnableSecretVersion.java @@ -0,0 +1,49 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_enablesecretversion_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1.EnableSecretVersionRequest; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretVersion; +import com.google.cloud.secretmanager.v1.SecretVersionName; + +public class AsyncEnableSecretVersion { + + public static void main(String[] args) throws Exception { + asyncEnableSecretVersion(); + } + + public static void asyncEnableSecretVersion() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + EnableSecretVersionRequest request = + EnableSecretVersionRequest.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setEtag("etag3123477") + .build(); + ApiFuture future = + secretManagerServiceClient.enableSecretVersionCallable().futureCall(request); + // Do something. + SecretVersion response = future.get(); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_enablesecretversion_async] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/enablesecretversion/SyncEnableSecretVersion.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/enablesecretversion/SyncEnableSecretVersion.java new file mode 100644 index 00000000..cc6acfca --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/enablesecretversion/SyncEnableSecretVersion.java @@ -0,0 +1,45 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_enablesecretversion_sync] +import com.google.cloud.secretmanager.v1.EnableSecretVersionRequest; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretVersion; +import com.google.cloud.secretmanager.v1.SecretVersionName; + +public class SyncEnableSecretVersion { + + public static void main(String[] args) throws Exception { + syncEnableSecretVersion(); + } + + public static void syncEnableSecretVersion() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + EnableSecretVersionRequest request = + EnableSecretVersionRequest.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .setEtag("etag3123477") + .build(); + SecretVersion response = secretManagerServiceClient.enableSecretVersion(request); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_enablesecretversion_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/enablesecretversion/SyncEnableSecretVersionSecretversionname.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/enablesecretversion/SyncEnableSecretVersionSecretversionname.java new file mode 100644 index 00000000..82956813 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/enablesecretversion/SyncEnableSecretVersionSecretversionname.java @@ -0,0 +1,42 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START +// secretmanager_v1_generated_secretmanagerserviceclient_enablesecretversion_secretversionname_sync] +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretVersion; +import com.google.cloud.secretmanager.v1.SecretVersionName; + +public class SyncEnableSecretVersionSecretversionname { + + public static void main(String[] args) throws Exception { + syncEnableSecretVersionSecretversionname(); + } + + public static void syncEnableSecretVersionSecretversionname() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + SecretVersion response = secretManagerServiceClient.enableSecretVersion(name); + } + } +} +// [END +// secretmanager_v1_generated_secretmanagerserviceclient_enablesecretversion_secretversionname_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/enablesecretversion/SyncEnableSecretVersionString.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/enablesecretversion/SyncEnableSecretVersionString.java new file mode 100644 index 00000000..8016728b --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/enablesecretversion/SyncEnableSecretVersionString.java @@ -0,0 +1,40 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_enablesecretversion_string_sync] +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretVersion; +import com.google.cloud.secretmanager.v1.SecretVersionName; + +public class SyncEnableSecretVersionString { + + public static void main(String[] args) throws Exception { + syncEnableSecretVersionString(); + } + + public static void syncEnableSecretVersionString() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + String name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString(); + SecretVersion response = secretManagerServiceClient.enableSecretVersion(name); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_enablesecretversion_string_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getiampolicy/AsyncGetIamPolicy.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getiampolicy/AsyncGetIamPolicy.java new file mode 100644 index 00000000..2a4dd3bc --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getiampolicy/AsyncGetIamPolicy.java @@ -0,0 +1,50 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_getiampolicy_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretName; +import com.google.iam.v1.GetIamPolicyRequest; +import com.google.iam.v1.GetPolicyOptions; +import com.google.iam.v1.Policy; + +public class AsyncGetIamPolicy { + + public static void main(String[] args) throws Exception { + asyncGetIamPolicy(); + } + + public static void asyncGetIamPolicy() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + GetIamPolicyRequest request = + GetIamPolicyRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setOptions(GetPolicyOptions.newBuilder().build()) + .build(); + ApiFuture future = + secretManagerServiceClient.getIamPolicyCallable().futureCall(request); + // Do something. + Policy response = future.get(); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_getiampolicy_async] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getiampolicy/SyncGetIamPolicy.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getiampolicy/SyncGetIamPolicy.java new file mode 100644 index 00000000..7d6489dd --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getiampolicy/SyncGetIamPolicy.java @@ -0,0 +1,46 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_getiampolicy_sync] +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretName; +import com.google.iam.v1.GetIamPolicyRequest; +import com.google.iam.v1.GetPolicyOptions; +import com.google.iam.v1.Policy; + +public class SyncGetIamPolicy { + + public static void main(String[] args) throws Exception { + syncGetIamPolicy(); + } + + public static void syncGetIamPolicy() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + GetIamPolicyRequest request = + GetIamPolicyRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setOptions(GetPolicyOptions.newBuilder().build()) + .build(); + Policy response = secretManagerServiceClient.getIamPolicy(request); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_getiampolicy_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecret/AsyncGetSecret.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecret/AsyncGetSecret.java new file mode 100644 index 00000000..0741dc18 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecret/AsyncGetSecret.java @@ -0,0 +1,47 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_getsecret_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1.GetSecretRequest; +import com.google.cloud.secretmanager.v1.Secret; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretName; + +public class AsyncGetSecret { + + public static void main(String[] args) throws Exception { + asyncGetSecret(); + } + + public static void asyncGetSecret() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + GetSecretRequest request = + GetSecretRequest.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .build(); + ApiFuture future = secretManagerServiceClient.getSecretCallable().futureCall(request); + // Do something. + Secret response = future.get(); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_getsecret_async] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecret/SyncGetSecret.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecret/SyncGetSecret.java new file mode 100644 index 00000000..5f94c5ab --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecret/SyncGetSecret.java @@ -0,0 +1,44 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_getsecret_sync] +import com.google.cloud.secretmanager.v1.GetSecretRequest; +import com.google.cloud.secretmanager.v1.Secret; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretName; + +public class SyncGetSecret { + + public static void main(String[] args) throws Exception { + syncGetSecret(); + } + + public static void syncGetSecret() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + GetSecretRequest request = + GetSecretRequest.newBuilder() + .setName(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .build(); + Secret response = secretManagerServiceClient.getSecret(request); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_getsecret_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecret/SyncGetSecretSecretname.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecret/SyncGetSecretSecretname.java new file mode 100644 index 00000000..724aa148 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecret/SyncGetSecretSecretname.java @@ -0,0 +1,40 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_getsecret_secretname_sync] +import com.google.cloud.secretmanager.v1.Secret; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretName; + +public class SyncGetSecretSecretname { + + public static void main(String[] args) throws Exception { + syncGetSecretSecretname(); + } + + public static void syncGetSecretSecretname() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + SecretName name = SecretName.of("[PROJECT]", "[SECRET]"); + Secret response = secretManagerServiceClient.getSecret(name); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_getsecret_secretname_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecret/SyncGetSecretString.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecret/SyncGetSecretString.java new file mode 100644 index 00000000..05c3506f --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecret/SyncGetSecretString.java @@ -0,0 +1,40 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_getsecret_string_sync] +import com.google.cloud.secretmanager.v1.Secret; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretName; + +public class SyncGetSecretString { + + public static void main(String[] args) throws Exception { + syncGetSecretString(); + } + + public static void syncGetSecretString() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + String name = SecretName.of("[PROJECT]", "[SECRET]").toString(); + Secret response = secretManagerServiceClient.getSecret(name); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_getsecret_string_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecretversion/AsyncGetSecretVersion.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecretversion/AsyncGetSecretVersion.java new file mode 100644 index 00000000..70723261 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecretversion/AsyncGetSecretVersion.java @@ -0,0 +1,48 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_getsecretversion_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1.GetSecretVersionRequest; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretVersion; +import com.google.cloud.secretmanager.v1.SecretVersionName; + +public class AsyncGetSecretVersion { + + public static void main(String[] args) throws Exception { + asyncGetSecretVersion(); + } + + public static void asyncGetSecretVersion() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + GetSecretVersionRequest request = + GetSecretVersionRequest.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .build(); + ApiFuture future = + secretManagerServiceClient.getSecretVersionCallable().futureCall(request); + // Do something. + SecretVersion response = future.get(); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_getsecretversion_async] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecretversion/SyncGetSecretVersion.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecretversion/SyncGetSecretVersion.java new file mode 100644 index 00000000..3af6008c --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecretversion/SyncGetSecretVersion.java @@ -0,0 +1,44 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_getsecretversion_sync] +import com.google.cloud.secretmanager.v1.GetSecretVersionRequest; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretVersion; +import com.google.cloud.secretmanager.v1.SecretVersionName; + +public class SyncGetSecretVersion { + + public static void main(String[] args) throws Exception { + syncGetSecretVersion(); + } + + public static void syncGetSecretVersion() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + GetSecretVersionRequest request = + GetSecretVersionRequest.newBuilder() + .setName(SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString()) + .build(); + SecretVersion response = secretManagerServiceClient.getSecretVersion(request); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_getsecretversion_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecretversion/SyncGetSecretVersionSecretversionname.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecretversion/SyncGetSecretVersionSecretversionname.java new file mode 100644 index 00000000..dbaf0716 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecretversion/SyncGetSecretVersionSecretversionname.java @@ -0,0 +1,42 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START +// secretmanager_v1_generated_secretmanagerserviceclient_getsecretversion_secretversionname_sync] +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretVersion; +import com.google.cloud.secretmanager.v1.SecretVersionName; + +public class SyncGetSecretVersionSecretversionname { + + public static void main(String[] args) throws Exception { + syncGetSecretVersionSecretversionname(); + } + + public static void syncGetSecretVersionSecretversionname() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + SecretVersionName name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]"); + SecretVersion response = secretManagerServiceClient.getSecretVersion(name); + } + } +} +// [END +// secretmanager_v1_generated_secretmanagerserviceclient_getsecretversion_secretversionname_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecretversion/SyncGetSecretVersionString.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecretversion/SyncGetSecretVersionString.java new file mode 100644 index 00000000..adb157f3 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/getsecretversion/SyncGetSecretVersionString.java @@ -0,0 +1,40 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_getsecretversion_string_sync] +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretVersion; +import com.google.cloud.secretmanager.v1.SecretVersionName; + +public class SyncGetSecretVersionString { + + public static void main(String[] args) throws Exception { + syncGetSecretVersionString(); + } + + public static void syncGetSecretVersionString() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + String name = SecretVersionName.of("[PROJECT]", "[SECRET]", "[SECRET_VERSION]").toString(); + SecretVersion response = secretManagerServiceClient.getSecretVersion(name); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_getsecretversion_string_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecrets/AsyncListSecrets.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecrets/AsyncListSecrets.java new file mode 100644 index 00000000..f65f6814 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecrets/AsyncListSecrets.java @@ -0,0 +1,53 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_listsecrets_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1.ListSecretsRequest; +import com.google.cloud.secretmanager.v1.ProjectName; +import com.google.cloud.secretmanager.v1.Secret; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; + +public class AsyncListSecrets { + + public static void main(String[] args) throws Exception { + asyncListSecrets(); + } + + public static void asyncListSecrets() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + ListSecretsRequest request = + ListSecretsRequest.newBuilder() + .setParent(ProjectName.of("[PROJECT]").toString()) + .setPageSize(883849137) + .setPageToken("pageToken873572522") + .setFilter("filter-1274492040") + .build(); + ApiFuture future = + secretManagerServiceClient.listSecretsPagedCallable().futureCall(request); + // Do something. + for (Secret element : future.get().iterateAll()) { + // doThingsWith(element); + } + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_listsecrets_async] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecrets/AsyncListSecretsPaged.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecrets/AsyncListSecretsPaged.java new file mode 100644 index 00000000..4b41446d --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecrets/AsyncListSecretsPaged.java @@ -0,0 +1,61 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_listsecrets_paged_async] +import com.google.cloud.secretmanager.v1.ListSecretsRequest; +import com.google.cloud.secretmanager.v1.ListSecretsResponse; +import com.google.cloud.secretmanager.v1.ProjectName; +import com.google.cloud.secretmanager.v1.Secret; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.common.base.Strings; + +public class AsyncListSecretsPaged { + + public static void main(String[] args) throws Exception { + asyncListSecretsPaged(); + } + + public static void asyncListSecretsPaged() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + ListSecretsRequest request = + ListSecretsRequest.newBuilder() + .setParent(ProjectName.of("[PROJECT]").toString()) + .setPageSize(883849137) + .setPageToken("pageToken873572522") + .setFilter("filter-1274492040") + .build(); + while (true) { + ListSecretsResponse response = + secretManagerServiceClient.listSecretsCallable().call(request); + for (Secret element : response.getSecretsList()) { + // doThingsWith(element); + } + String nextPageToken = response.getNextPageToken(); + if (!Strings.isNullOrEmpty(nextPageToken)) { + request = request.toBuilder().setPageToken(nextPageToken).build(); + } else { + break; + } + } + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_listsecrets_paged_async] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecrets/SyncListSecrets.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecrets/SyncListSecrets.java new file mode 100644 index 00000000..0bd6d379 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecrets/SyncListSecrets.java @@ -0,0 +1,49 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_listsecrets_sync] +import com.google.cloud.secretmanager.v1.ListSecretsRequest; +import com.google.cloud.secretmanager.v1.ProjectName; +import com.google.cloud.secretmanager.v1.Secret; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; + +public class SyncListSecrets { + + public static void main(String[] args) throws Exception { + syncListSecrets(); + } + + public static void syncListSecrets() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + ListSecretsRequest request = + ListSecretsRequest.newBuilder() + .setParent(ProjectName.of("[PROJECT]").toString()) + .setPageSize(883849137) + .setPageToken("pageToken873572522") + .setFilter("filter-1274492040") + .build(); + for (Secret element : secretManagerServiceClient.listSecrets(request).iterateAll()) { + // doThingsWith(element); + } + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_listsecrets_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecrets/SyncListSecretsProjectname.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecrets/SyncListSecretsProjectname.java new file mode 100644 index 00000000..c60ac40f --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecrets/SyncListSecretsProjectname.java @@ -0,0 +1,42 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_listsecrets_projectname_sync] +import com.google.cloud.secretmanager.v1.ProjectName; +import com.google.cloud.secretmanager.v1.Secret; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; + +public class SyncListSecretsProjectname { + + public static void main(String[] args) throws Exception { + syncListSecretsProjectname(); + } + + public static void syncListSecretsProjectname() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + ProjectName parent = ProjectName.of("[PROJECT]"); + for (Secret element : secretManagerServiceClient.listSecrets(parent).iterateAll()) { + // doThingsWith(element); + } + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_listsecrets_projectname_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecrets/SyncListSecretsString.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecrets/SyncListSecretsString.java new file mode 100644 index 00000000..d491818d --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecrets/SyncListSecretsString.java @@ -0,0 +1,42 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_listsecrets_string_sync] +import com.google.cloud.secretmanager.v1.ProjectName; +import com.google.cloud.secretmanager.v1.Secret; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; + +public class SyncListSecretsString { + + public static void main(String[] args) throws Exception { + syncListSecretsString(); + } + + public static void syncListSecretsString() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + String parent = ProjectName.of("[PROJECT]").toString(); + for (Secret element : secretManagerServiceClient.listSecrets(parent).iterateAll()) { + // doThingsWith(element); + } + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_listsecrets_string_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecretversions/AsyncListSecretVersions.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecretversions/AsyncListSecretVersions.java new file mode 100644 index 00000000..46474433 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecretversions/AsyncListSecretVersions.java @@ -0,0 +1,53 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_listsecretversions_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1.ListSecretVersionsRequest; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretName; +import com.google.cloud.secretmanager.v1.SecretVersion; + +public class AsyncListSecretVersions { + + public static void main(String[] args) throws Exception { + asyncListSecretVersions(); + } + + public static void asyncListSecretVersions() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + ListSecretVersionsRequest request = + ListSecretVersionsRequest.newBuilder() + .setParent(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setPageSize(883849137) + .setPageToken("pageToken873572522") + .setFilter("filter-1274492040") + .build(); + ApiFuture future = + secretManagerServiceClient.listSecretVersionsPagedCallable().futureCall(request); + // Do something. + for (SecretVersion element : future.get().iterateAll()) { + // doThingsWith(element); + } + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_listsecretversions_async] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecretversions/AsyncListSecretVersionsPaged.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecretversions/AsyncListSecretVersionsPaged.java new file mode 100644 index 00000000..b54fabac --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecretversions/AsyncListSecretVersionsPaged.java @@ -0,0 +1,61 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_listsecretversions_paged_async] +import com.google.cloud.secretmanager.v1.ListSecretVersionsRequest; +import com.google.cloud.secretmanager.v1.ListSecretVersionsResponse; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretName; +import com.google.cloud.secretmanager.v1.SecretVersion; +import com.google.common.base.Strings; + +public class AsyncListSecretVersionsPaged { + + public static void main(String[] args) throws Exception { + asyncListSecretVersionsPaged(); + } + + public static void asyncListSecretVersionsPaged() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + ListSecretVersionsRequest request = + ListSecretVersionsRequest.newBuilder() + .setParent(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setPageSize(883849137) + .setPageToken("pageToken873572522") + .setFilter("filter-1274492040") + .build(); + while (true) { + ListSecretVersionsResponse response = + secretManagerServiceClient.listSecretVersionsCallable().call(request); + for (SecretVersion element : response.getVersionsList()) { + // doThingsWith(element); + } + String nextPageToken = response.getNextPageToken(); + if (!Strings.isNullOrEmpty(nextPageToken)) { + request = request.toBuilder().setPageToken(nextPageToken).build(); + } else { + break; + } + } + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_listsecretversions_paged_async] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecretversions/SyncListSecretVersions.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecretversions/SyncListSecretVersions.java new file mode 100644 index 00000000..60e9dea7 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecretversions/SyncListSecretVersions.java @@ -0,0 +1,50 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_listsecretversions_sync] +import com.google.cloud.secretmanager.v1.ListSecretVersionsRequest; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretName; +import com.google.cloud.secretmanager.v1.SecretVersion; + +public class SyncListSecretVersions { + + public static void main(String[] args) throws Exception { + syncListSecretVersions(); + } + + public static void syncListSecretVersions() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + ListSecretVersionsRequest request = + ListSecretVersionsRequest.newBuilder() + .setParent(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setPageSize(883849137) + .setPageToken("pageToken873572522") + .setFilter("filter-1274492040") + .build(); + for (SecretVersion element : + secretManagerServiceClient.listSecretVersions(request).iterateAll()) { + // doThingsWith(element); + } + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_listsecretversions_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecretversions/SyncListSecretVersionsSecretname.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecretversions/SyncListSecretVersionsSecretname.java new file mode 100644 index 00000000..29f9b036 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecretversions/SyncListSecretVersionsSecretname.java @@ -0,0 +1,43 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_listsecretversions_secretname_sync] +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretName; +import com.google.cloud.secretmanager.v1.SecretVersion; + +public class SyncListSecretVersionsSecretname { + + public static void main(String[] args) throws Exception { + syncListSecretVersionsSecretname(); + } + + public static void syncListSecretVersionsSecretname() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + SecretName parent = SecretName.of("[PROJECT]", "[SECRET]"); + for (SecretVersion element : + secretManagerServiceClient.listSecretVersions(parent).iterateAll()) { + // doThingsWith(element); + } + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_listsecretversions_secretname_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecretversions/SyncListSecretVersionsString.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecretversions/SyncListSecretVersionsString.java new file mode 100644 index 00000000..86f8e8ea --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/listsecretversions/SyncListSecretVersionsString.java @@ -0,0 +1,43 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_listsecretversions_string_sync] +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretName; +import com.google.cloud.secretmanager.v1.SecretVersion; + +public class SyncListSecretVersionsString { + + public static void main(String[] args) throws Exception { + syncListSecretVersionsString(); + } + + public static void syncListSecretVersionsString() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + String parent = SecretName.of("[PROJECT]", "[SECRET]").toString(); + for (SecretVersion element : + secretManagerServiceClient.listSecretVersions(parent).iterateAll()) { + // doThingsWith(element); + } + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_listsecretversions_string_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/setiampolicy/AsyncSetIamPolicy.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/setiampolicy/AsyncSetIamPolicy.java new file mode 100644 index 00000000..a9e5d82d --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/setiampolicy/AsyncSetIamPolicy.java @@ -0,0 +1,51 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_setiampolicy_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretName; +import com.google.iam.v1.Policy; +import com.google.iam.v1.SetIamPolicyRequest; +import com.google.protobuf.FieldMask; + +public class AsyncSetIamPolicy { + + public static void main(String[] args) throws Exception { + asyncSetIamPolicy(); + } + + public static void asyncSetIamPolicy() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + SetIamPolicyRequest request = + SetIamPolicyRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setPolicy(Policy.newBuilder().build()) + .setUpdateMask(FieldMask.newBuilder().build()) + .build(); + ApiFuture future = + secretManagerServiceClient.setIamPolicyCallable().futureCall(request); + // Do something. + Policy response = future.get(); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_setiampolicy_async] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/setiampolicy/SyncSetIamPolicy.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/setiampolicy/SyncSetIamPolicy.java new file mode 100644 index 00000000..ea6ff3f1 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/setiampolicy/SyncSetIamPolicy.java @@ -0,0 +1,47 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_setiampolicy_sync] +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretName; +import com.google.iam.v1.Policy; +import com.google.iam.v1.SetIamPolicyRequest; +import com.google.protobuf.FieldMask; + +public class SyncSetIamPolicy { + + public static void main(String[] args) throws Exception { + syncSetIamPolicy(); + } + + public static void syncSetIamPolicy() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + SetIamPolicyRequest request = + SetIamPolicyRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .setPolicy(Policy.newBuilder().build()) + .setUpdateMask(FieldMask.newBuilder().build()) + .build(); + Policy response = secretManagerServiceClient.setIamPolicy(request); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_setiampolicy_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/testiampermissions/AsyncTestIamPermissions.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/testiampermissions/AsyncTestIamPermissions.java new file mode 100644 index 00000000..ec826530 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/testiampermissions/AsyncTestIamPermissions.java @@ -0,0 +1,50 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_testiampermissions_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretName; +import com.google.iam.v1.TestIamPermissionsRequest; +import com.google.iam.v1.TestIamPermissionsResponse; +import java.util.ArrayList; + +public class AsyncTestIamPermissions { + + public static void main(String[] args) throws Exception { + asyncTestIamPermissions(); + } + + public static void asyncTestIamPermissions() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + TestIamPermissionsRequest request = + TestIamPermissionsRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .addAllPermissions(new ArrayList()) + .build(); + ApiFuture future = + secretManagerServiceClient.testIamPermissionsCallable().futureCall(request); + // Do something. + TestIamPermissionsResponse response = future.get(); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_testiampermissions_async] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/testiampermissions/SyncTestIamPermissions.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/testiampermissions/SyncTestIamPermissions.java new file mode 100644 index 00000000..eebef3a2 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/testiampermissions/SyncTestIamPermissions.java @@ -0,0 +1,46 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_testiampermissions_sync] +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.SecretName; +import com.google.iam.v1.TestIamPermissionsRequest; +import com.google.iam.v1.TestIamPermissionsResponse; +import java.util.ArrayList; + +public class SyncTestIamPermissions { + + public static void main(String[] args) throws Exception { + syncTestIamPermissions(); + } + + public static void syncTestIamPermissions() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + TestIamPermissionsRequest request = + TestIamPermissionsRequest.newBuilder() + .setResource(SecretName.of("[PROJECT]", "[SECRET]").toString()) + .addAllPermissions(new ArrayList()) + .build(); + TestIamPermissionsResponse response = secretManagerServiceClient.testIamPermissions(request); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_testiampermissions_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/updatesecret/AsyncUpdateSecret.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/updatesecret/AsyncUpdateSecret.java new file mode 100644 index 00000000..b28e8421 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/updatesecret/AsyncUpdateSecret.java @@ -0,0 +1,49 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_updatesecret_async] +import com.google.api.core.ApiFuture; +import com.google.cloud.secretmanager.v1.Secret; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.UpdateSecretRequest; +import com.google.protobuf.FieldMask; + +public class AsyncUpdateSecret { + + public static void main(String[] args) throws Exception { + asyncUpdateSecret(); + } + + public static void asyncUpdateSecret() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + UpdateSecretRequest request = + UpdateSecretRequest.newBuilder() + .setSecret(Secret.newBuilder().build()) + .setUpdateMask(FieldMask.newBuilder().build()) + .build(); + ApiFuture future = + secretManagerServiceClient.updateSecretCallable().futureCall(request); + // Do something. + Secret response = future.get(); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_updatesecret_async] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/updatesecret/SyncUpdateSecret.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/updatesecret/SyncUpdateSecret.java new file mode 100644 index 00000000..3b88952a --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/updatesecret/SyncUpdateSecret.java @@ -0,0 +1,45 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_updatesecret_sync] +import com.google.cloud.secretmanager.v1.Secret; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.cloud.secretmanager.v1.UpdateSecretRequest; +import com.google.protobuf.FieldMask; + +public class SyncUpdateSecret { + + public static void main(String[] args) throws Exception { + syncUpdateSecret(); + } + + public static void syncUpdateSecret() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + UpdateSecretRequest request = + UpdateSecretRequest.newBuilder() + .setSecret(Secret.newBuilder().build()) + .setUpdateMask(FieldMask.newBuilder().build()) + .build(); + Secret response = secretManagerServiceClient.updateSecret(request); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_updatesecret_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/updatesecret/SyncUpdateSecretSecretFieldmask.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/updatesecret/SyncUpdateSecretSecretFieldmask.java new file mode 100644 index 00000000..fa11b4aa --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerserviceclient/updatesecret/SyncUpdateSecretSecretFieldmask.java @@ -0,0 +1,41 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerserviceclient_updatesecret_secretfieldmask_sync] +import com.google.cloud.secretmanager.v1.Secret; +import com.google.cloud.secretmanager.v1.SecretManagerServiceClient; +import com.google.protobuf.FieldMask; + +public class SyncUpdateSecretSecretFieldmask { + + public static void main(String[] args) throws Exception { + syncUpdateSecretSecretFieldmask(); + } + + public static void syncUpdateSecretSecretFieldmask() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + try (SecretManagerServiceClient secretManagerServiceClient = + SecretManagerServiceClient.create()) { + Secret secret = Secret.newBuilder().build(); + FieldMask updateMask = FieldMask.newBuilder().build(); + Secret response = secretManagerServiceClient.updateSecret(secret, updateMask); + } + } +} +// [END secretmanager_v1_generated_secretmanagerserviceclient_updatesecret_secretfieldmask_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerservicesettings/createsecret/SyncCreateSecret.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerservicesettings/createsecret/SyncCreateSecret.java new file mode 100644 index 00000000..1a254305 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/secretmanagerservicesettings/createsecret/SyncCreateSecret.java @@ -0,0 +1,47 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.samples; + +// [START secretmanager_v1_generated_secretmanagerservicesettings_createsecret_sync] +import com.google.cloud.secretmanager.v1.SecretManagerServiceSettings; +import java.time.Duration; + +public class SyncCreateSecret { + + public static void main(String[] args) throws Exception { + syncCreateSecret(); + } + + public static void syncCreateSecret() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + SecretManagerServiceSettings.Builder secretManagerServiceSettingsBuilder = + SecretManagerServiceSettings.newBuilder(); + secretManagerServiceSettingsBuilder + .createSecretSettings() + .setRetrySettings( + secretManagerServiceSettingsBuilder + .createSecretSettings() + .getRetrySettings() + .toBuilder() + .setTotalTimeout(Duration.ofSeconds(30)) + .build()); + SecretManagerServiceSettings secretManagerServiceSettings = + secretManagerServiceSettingsBuilder.build(); + } +} +// [END secretmanager_v1_generated_secretmanagerservicesettings_createsecret_sync] diff --git a/samples/snippets/generated/com/google/cloud/secretmanager/v1/stub/secretmanagerservicestubsettings/createsecret/SyncCreateSecret.java b/samples/snippets/generated/com/google/cloud/secretmanager/v1/stub/secretmanagerservicestubsettings/createsecret/SyncCreateSecret.java new file mode 100644 index 00000000..799ca105 --- /dev/null +++ b/samples/snippets/generated/com/google/cloud/secretmanager/v1/stub/secretmanagerservicestubsettings/createsecret/SyncCreateSecret.java @@ -0,0 +1,47 @@ +/* + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * https://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.google.cloud.secretmanager.v1.stub.samples; + +// [START secretmanager_v1_generated_secretmanagerservicestubsettings_createsecret_sync] +import com.google.cloud.secretmanager.v1.stub.SecretManagerServiceStubSettings; +import java.time.Duration; + +public class SyncCreateSecret { + + public static void main(String[] args) throws Exception { + syncCreateSecret(); + } + + public static void syncCreateSecret() throws Exception { + // This snippet has been automatically generated for illustrative purposes only. + // It may require modifications to work in your environment. + SecretManagerServiceStubSettings.Builder secretManagerServiceSettingsBuilder = + SecretManagerServiceStubSettings.newBuilder(); + secretManagerServiceSettingsBuilder + .createSecretSettings() + .setRetrySettings( + secretManagerServiceSettingsBuilder + .createSecretSettings() + .getRetrySettings() + .toBuilder() + .setTotalTimeout(Duration.ofSeconds(30)) + .build()); + SecretManagerServiceStubSettings secretManagerServiceSettings = + secretManagerServiceSettingsBuilder.build(); + } +} +// [END secretmanager_v1_generated_secretmanagerservicestubsettings_createsecret_sync] From d7d4ea9d26ca5b1fe44d052b8f7c1f5527a1dabc Mon Sep 17 00:00:00 2001 From: WhiteSource Renovate Date: Mon, 27 Jun 2022 21:04:29 +0200 Subject: [PATCH 14/19] deps: update dependency com.google.protobuf:protobuf-java-util to v3.21.2 (#791) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit [![Mend Renovate](https://app.renovatebot.com/images/banner.svg)](https://renovatebot.com) This PR contains the following updates: | Package | Change | Age | Adoption | Passing | Confidence | |---|---|---|---|---|---| | [com.google.protobuf:protobuf-java-util](https://developers.google.com/protocol-buffers/) ([source](https://togithub.com/protocolbuffers/protobuf)) | `3.21.1` -> `3.21.2` | [![age](https://badges.renovateapi.com/packages/maven/com.google.protobuf:protobuf-java-util/3.21.2/age-slim)](https://docs.renovatebot.com/merge-confidence/) | [![adoption](https://badges.renovateapi.com/packages/maven/com.google.protobuf:protobuf-java-util/3.21.2/adoption-slim)](https://docs.renovatebot.com/merge-confidence/) | [![passing](https://badges.renovateapi.com/packages/maven/com.google.protobuf:protobuf-java-util/3.21.2/compatibility-slim/3.21.1)](https://docs.renovatebot.com/merge-confidence/) | [![confidence](https://badges.renovateapi.com/packages/maven/com.google.protobuf:protobuf-java-util/3.21.2/confidence-slim/3.21.1)](https://docs.renovatebot.com/merge-confidence/) | --- ### Release Notes

protocolbuffers/protobuf ### [`v3.21.2`](https://togithub.com/protocolbuffers/protobuf/compare/v3.21.1...v3.21.2) [Compare Source](https://togithub.com/protocolbuffers/protobuf/compare/v3.21.1...v3.21.2)
--- ### Configuration 📅 **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined). 🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied. ♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox. 🔕 **Ignore**: Close this PR and you won't be reminded about this update again. --- - [ ] If you want to rebase/retry this PR, click this checkbox. --- This PR has been generated by [Mend Renovate](https://www.mend.io/free-developer-tools/renovate/). View repository job log [here](https://app.renovatebot.com/dashboard#github/googleapis/java-secretmanager). --- samples/install-without-bom/pom.xml | 2 +- samples/snapshot/pom.xml | 2 +- samples/snippets/pom.xml | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/samples/install-without-bom/pom.xml b/samples/install-without-bom/pom.xml index 24d2188a..e0414e4b 100644 --- a/samples/install-without-bom/pom.xml +++ b/samples/install-without-bom/pom.xml @@ -36,7 +36,7 @@ com.google.protobuf protobuf-java-util - 3.21.1 + 3.21.2 junit diff --git a/samples/snapshot/pom.xml b/samples/snapshot/pom.xml index ac0e5d89..69812516 100644 --- a/samples/snapshot/pom.xml +++ b/samples/snapshot/pom.xml @@ -34,7 +34,7 @@ com.google.protobuf protobuf-java-util - 3.21.1 + 3.21.2 diff --git a/samples/snippets/pom.xml b/samples/snippets/pom.xml index 820feec9..3a451174 100644 --- a/samples/snippets/pom.xml +++ b/samples/snippets/pom.xml @@ -46,7 +46,7 @@ com.google.protobuf protobuf-java-util - 3.21.1 + 3.21.2 junit From a5de2a3a4384c0cd70bcd8d7f2cfa8ee4142a238 Mon Sep 17 00:00:00 2001 From: "gcf-owl-bot[bot]" <78513119+gcf-owl-bot[bot]@users.noreply.github.com> Date: Mon, 27 Jun 2022 19:26:36 +0000 Subject: [PATCH 15/19] chore: update dependencies for regapic (#1467) (#792) * chore: update dependencies for regapic * add more dependencies and trigger comment * update goldens * fix indentation * remove duplicate gax-httpjson dependency * remove duplicated dependencies Source-Link: https://github.com/googleapis/synthtool/commit/fa54eb2a78c6ee48613fd33152e2130e949dcbd9 Post-Processor: gcr.io/cloud-devrel-public-resources/owlbot-java:latest@sha256:1ec28a46062b19135b11178ceee60231e5f5a92dab454e23ae0aab72cd875906 --- .github/.OwlBot.lock.yaml | 4 ++-- .kokoro/common.sh | 4 +++- 2 files changed, 5 insertions(+), 3 deletions(-) diff --git a/.github/.OwlBot.lock.yaml b/.github/.OwlBot.lock.yaml index a79f0627..f0625e4d 100644 --- a/.github/.OwlBot.lock.yaml +++ b/.github/.OwlBot.lock.yaml @@ -13,5 +13,5 @@ # limitations under the License. docker: image: gcr.io/cloud-devrel-public-resources/owlbot-java:latest - digest: sha256:2567a120ce90fadb6201999b87d649d9f67459de28815ad239bce9ebfaa18a74 -# created: 2022-05-19T15:12:45.278246753Z + digest: sha256:1ec28a46062b19135b11178ceee60231e5f5a92dab454e23ae0aab72cd875906 +# created: 2022-06-27T15:01:06.405564326Z diff --git a/.kokoro/common.sh b/.kokoro/common.sh index ace89f45..f8f957af 100644 --- a/.kokoro/common.sh +++ b/.kokoro/common.sh @@ -55,4 +55,6 @@ function retry_with_backoff { ## Helper functionss function now() { date +"%Y-%m-%d %H:%M:%S" | tr -d '\n'; } function msg() { println "$*" >&2; } -function println() { printf '%s\n' "$(now) $*"; } \ No newline at end of file +function println() { printf '%s\n' "$(now) $*"; } + +## Helper comment to trigger updated repo dependency release \ No newline at end of file From 169b195a31d8ace3dc4ada0e66c752f900e6e335 Mon Sep 17 00:00:00 2001 From: "gcf-owl-bot[bot]" <78513119+gcf-owl-bot[bot]@users.noreply.github.com> Date: Thu, 30 Jun 2022 02:14:12 +0000 Subject: [PATCH 16/19] chore: Disable CLIRR checks on releas (#1474) (#795) Source-Link: https://github.com/googleapis/synthtool/commit/7a220e27993a25ab3cda26510d5619d97b6952a9 Post-Processor: gcr.io/cloud-devrel-public-resources/owlbot-java:latest@sha256:6d4e3a15c62cfdcb823d60e16da7521e7c6fc00eba07c8ff12e4de9924a57d28 --- .github/.OwlBot.lock.yaml | 4 ++-- .kokoro/release/stage.sh | 3 ++- 2 files changed, 4 insertions(+), 3 deletions(-) diff --git a/.github/.OwlBot.lock.yaml b/.github/.OwlBot.lock.yaml index f0625e4d..a454a61e 100644 --- a/.github/.OwlBot.lock.yaml +++ b/.github/.OwlBot.lock.yaml @@ -13,5 +13,5 @@ # limitations under the License. docker: image: gcr.io/cloud-devrel-public-resources/owlbot-java:latest - digest: sha256:1ec28a46062b19135b11178ceee60231e5f5a92dab454e23ae0aab72cd875906 -# created: 2022-06-27T15:01:06.405564326Z + digest: sha256:6d4e3a15c62cfdcb823d60e16da7521e7c6fc00eba07c8ff12e4de9924a57d28 +# created: 2022-06-29T23:17:33.110417661Z diff --git a/.kokoro/release/stage.sh b/.kokoro/release/stage.sh index 77dc4e8f..1dba8de1 100755 --- a/.kokoro/release/stage.sh +++ b/.kokoro/release/stage.sh @@ -32,6 +32,7 @@ retry_with_backoff 3 10 \ mvn clean deploy -B \ --settings ${MAVEN_SETTINGS_FILE} \ -DskipTests=true \ + -Dclirr.skip=true \ -DperformRelease=true \ -Dgpg.executable=gpg \ -Dgpg.passphrase=${GPG_PASSPHRASE} \ @@ -42,4 +43,4 @@ then mvn nexus-staging:release -B \ -DperformRelease=true \ --settings=settings.xml -fi \ No newline at end of file +fi From 87720ee3e8fba421028fa638474268cdf4dd4b46 Mon Sep 17 00:00:00 2001 From: "release-please[bot]" <55107282+release-please[bot]@users.noreply.github.com> Date: Fri, 1 Jul 2022 03:52:40 +0000 Subject: [PATCH 17/19] chore(main): release 2.2.1-SNAPSHOT (#776) :robot: I have created a release *beep* *boop* --- ### Updating meta-information for bleeding-edge SNAPSHOT release. --- This PR was generated with [Release Please](https://github.com/googleapis/release-please). See [documentation](https://github.com/googleapis/release-please#release-please). --- google-cloud-secretmanager-bom/pom.xml | 12 ++++++------ google-cloud-secretmanager/pom.xml | 4 ++-- grpc-google-cloud-secretmanager-v1/pom.xml | 4 ++-- grpc-google-cloud-secretmanager-v1beta1/pom.xml | 4 ++-- pom.xml | 12 ++++++------ proto-google-cloud-secretmanager-v1/pom.xml | 4 ++-- proto-google-cloud-secretmanager-v1beta1/pom.xml | 4 ++-- versions.txt | 10 +++++----- 8 files changed, 27 insertions(+), 27 deletions(-) diff --git a/google-cloud-secretmanager-bom/pom.xml b/google-cloud-secretmanager-bom/pom.xml index 47ce5fd9..20c3ea90 100644 --- a/google-cloud-secretmanager-bom/pom.xml +++ b/google-cloud-secretmanager-bom/pom.xml @@ -3,7 +3,7 @@ 4.0.0 com.google.cloud google-cloud-secretmanager-bom - 2.2.0 + 2.2.1-SNAPSHOT pom com.google.cloud @@ -52,27 +52,27 @@ com.google.cloud google-cloud-secretmanager - 2.2.0 + 2.2.1-SNAPSHOT com.google.api.grpc grpc-google-cloud-secretmanager-v1 - 2.2.0 + 2.2.1-SNAPSHOT com.google.api.grpc grpc-google-cloud-secretmanager-v1beta1 - 2.2.0 + 2.2.1-SNAPSHOT com.google.api.grpc proto-google-cloud-secretmanager-v1 - 2.2.0 + 2.2.1-SNAPSHOT com.google.api.grpc proto-google-cloud-secretmanager-v1beta1 - 2.2.0 + 2.2.1-SNAPSHOT diff --git a/google-cloud-secretmanager/pom.xml b/google-cloud-secretmanager/pom.xml index d9de6b87..ab4d47a3 100644 --- a/google-cloud-secretmanager/pom.xml +++ b/google-cloud-secretmanager/pom.xml @@ -3,7 +3,7 @@ 4.0.0 com.google.cloud google-cloud-secretmanager - 2.2.0 + 2.2.1-SNAPSHOT jar Google Cloud Secret Manager https://github.com/googleapis/java-secretmanager @@ -11,7 +11,7 @@ com.google.cloud google-cloud-secretmanager-parent - 2.2.0 + 2.2.1-SNAPSHOT google-cloud-secretmanager diff --git a/grpc-google-cloud-secretmanager-v1/pom.xml b/grpc-google-cloud-secretmanager-v1/pom.xml index 843c7bd1..3a6169c0 100644 --- a/grpc-google-cloud-secretmanager-v1/pom.xml +++ b/grpc-google-cloud-secretmanager-v1/pom.xml @@ -4,13 +4,13 @@ 4.0.0 com.google.api.grpc grpc-google-cloud-secretmanager-v1 - 2.2.0 + 2.2.1-SNAPSHOT grpc-google-cloud-secretmanager-v1 GRPC library for grpc-google-cloud-secretmanager-v1 com.google.cloud google-cloud-secretmanager-parent - 2.2.0 + 2.2.1-SNAPSHOT diff --git a/grpc-google-cloud-secretmanager-v1beta1/pom.xml b/grpc-google-cloud-secretmanager-v1beta1/pom.xml index ec83cb59..d19fb5e0 100644 --- a/grpc-google-cloud-secretmanager-v1beta1/pom.xml +++ b/grpc-google-cloud-secretmanager-v1beta1/pom.xml @@ -4,13 +4,13 @@ 4.0.0 com.google.api.grpc grpc-google-cloud-secretmanager-v1beta1 - 2.2.0 + 2.2.1-SNAPSHOT grpc-google-cloud-secretmanager-v1beta1 GRPC library for grpc-google-cloud-secretmanager-v1beta1 com.google.cloud google-cloud-secretmanager-parent - 2.2.0 + 2.2.1-SNAPSHOT diff --git a/pom.xml b/pom.xml index 55fd50bb..2ebef1c3 100644 --- a/pom.xml +++ b/pom.xml @@ -4,7 +4,7 @@ com.google.cloud google-cloud-secretmanager-parent pom - 2.2.0 + 2.2.1-SNAPSHOT Google Cloud secretmanager Parent https://github.com/googleapis/java-secretmanager @@ -61,27 +61,27 @@ com.google.api.grpc proto-google-cloud-secretmanager-v1 - 2.2.0 + 2.2.1-SNAPSHOT com.google.api.grpc proto-google-cloud-secretmanager-v1beta1 - 2.2.0 + 2.2.1-SNAPSHOT com.google.api.grpc grpc-google-cloud-secretmanager-v1 - 2.2.0 + 2.2.1-SNAPSHOT com.google.api.grpc grpc-google-cloud-secretmanager-v1beta1 - 2.2.0 + 2.2.1-SNAPSHOT com.google.cloud google-cloud-secretmanager - 2.2.0 + 2.2.1-SNAPSHOT diff --git a/proto-google-cloud-secretmanager-v1/pom.xml b/proto-google-cloud-secretmanager-v1/pom.xml index b70bf1e4..567b2ed0 100644 --- a/proto-google-cloud-secretmanager-v1/pom.xml +++ b/proto-google-cloud-secretmanager-v1/pom.xml @@ -4,13 +4,13 @@ 4.0.0 com.google.api.grpc proto-google-cloud-secretmanager-v1 - 2.2.0 + 2.2.1-SNAPSHOT proto-google-cloud-secretmanager-v1 PROTO library for proto-google-cloud-secretmanager-v1 com.google.cloud google-cloud-secretmanager-parent - 2.2.0 + 2.2.1-SNAPSHOT diff --git a/proto-google-cloud-secretmanager-v1beta1/pom.xml b/proto-google-cloud-secretmanager-v1beta1/pom.xml index 1e4e731a..d7ef7795 100644 --- a/proto-google-cloud-secretmanager-v1beta1/pom.xml +++ b/proto-google-cloud-secretmanager-v1beta1/pom.xml @@ -4,13 +4,13 @@ 4.0.0 com.google.api.grpc proto-google-cloud-secretmanager-v1beta1 - 2.2.0 + 2.2.1-SNAPSHOT proto-google-cloud-secretmanager-v1beta1 PROTO library for proto-google-cloud-secretmanager-v1beta1 com.google.cloud google-cloud-secretmanager-parent - 2.2.0 + 2.2.1-SNAPSHOT diff --git a/versions.txt b/versions.txt index db84d70b..6731b0b7 100644 --- a/versions.txt +++ b/versions.txt @@ -1,8 +1,8 @@ # Format: # module:released-version:current-version -google-cloud-secretmanager:2.2.0:2.2.0 -grpc-google-cloud-secretmanager-v1:2.2.0:2.2.0 -grpc-google-cloud-secretmanager-v1beta1:2.2.0:2.2.0 -proto-google-cloud-secretmanager-v1:2.2.0:2.2.0 -proto-google-cloud-secretmanager-v1beta1:2.2.0:2.2.0 +google-cloud-secretmanager:2.2.0:2.2.1-SNAPSHOT +grpc-google-cloud-secretmanager-v1:2.2.0:2.2.1-SNAPSHOT +grpc-google-cloud-secretmanager-v1beta1:2.2.0:2.2.1-SNAPSHOT +proto-google-cloud-secretmanager-v1:2.2.0:2.2.1-SNAPSHOT +proto-google-cloud-secretmanager-v1beta1:2.2.0:2.2.1-SNAPSHOT From 2a35b397f26497b1e684f0d98cb5c539d88e45ee Mon Sep 17 00:00:00 2001 From: Tomo Suzuki Date: Fri, 1 Jul 2022 10:32:13 -0400 Subject: [PATCH 18/19] ci: removing clirr from required checks (#794) Making CLIRR not required. The version bumps are now controlled by the Release Please and OwlBot. The CL authors create appropriate change description to control major version bumps. --- .github/sync-repo-settings.yaml | 3 --- 1 file changed, 3 deletions(-) diff --git a/.github/sync-repo-settings.yaml b/.github/sync-repo-settings.yaml index b97f6f33..7423ac44 100644 --- a/.github/sync-repo-settings.yaml +++ b/.github/sync-repo-settings.yaml @@ -11,7 +11,6 @@ branchProtectionRules: - dependencies (8) - dependencies (11) - lint - - clirr - units (8) - units (11) - 'Kokoro - Test: Integration' @@ -26,7 +25,6 @@ branchProtectionRules: - dependencies (8) - dependencies (11) - lint - - clirr - units (7) - units (8) - units (11) @@ -42,7 +40,6 @@ branchProtectionRules: - dependencies (8) - dependencies (11) - lint - - clirr - units (8) - units (11) - 'Kokoro - Test: Integration' From 26d6600a3b3ce23b256d97eb952d2e790efe839d Mon Sep 17 00:00:00 2001 From: "release-please[bot]" <55107282+release-please[bot]@users.noreply.github.com> Date: Fri, 1 Jul 2022 16:26:23 +0000 Subject: [PATCH 19/19] chore(main): release 2.3.0 (#796) :robot: I have created a release *beep* *boop* --- ## [2.3.0](https://github.com/googleapis/java-secretmanager/compare/v2.2.0...v2.3.0) (2022-07-01) ### Features * Enable REST transport for most of Java and Go clients ([#790](https://github.com/googleapis/java-secretmanager/issues/790)) ([d51c8fa](https://github.com/googleapis/java-secretmanager/commit/d51c8fa85243d4b71b805a67141168898542a851)) ### Documentation * **sample:** clean up README for native image sample ([#785](https://github.com/googleapis/java-secretmanager/issues/785)) ([67260d7](https://github.com/googleapis/java-secretmanager/commit/67260d74d7c5f05dc08957267ae809eb3ea66281)) ### Dependencies * update dependency com.google.cloud:google-cloud-shared-dependencies to v2.13.0 ([#789](https://github.com/googleapis/java-secretmanager/issues/789)) ([71aae1d](https://github.com/googleapis/java-secretmanager/commit/71aae1d94136082ed323a6591e5cfe6a0d02875c)) * update dependency com.google.protobuf:protobuf-java-util to v3.21.0 ([#779](https://github.com/googleapis/java-secretmanager/issues/779)) ([d38f1db](https://github.com/googleapis/java-secretmanager/commit/d38f1dbd5fea21d3edc06045e5c892313a0524b4)) * update dependency com.google.protobuf:protobuf-java-util to v3.21.1 ([#780](https://github.com/googleapis/java-secretmanager/issues/780)) ([6c613da](https://github.com/googleapis/java-secretmanager/commit/6c613daee4f406e501ad92742fc7dae0d4172298)) * update dependency com.google.protobuf:protobuf-java-util to v3.21.2 ([#791](https://github.com/googleapis/java-secretmanager/issues/791)) ([d7d4ea9](https://github.com/googleapis/java-secretmanager/commit/d7d4ea9d26ca5b1fe44d052b8f7c1f5527a1dabc)) * update dependency org.graalvm.buildtools:junit-platform-native to v0.9.12 ([#787](https://github.com/googleapis/java-secretmanager/issues/787)) ([a2e0e97](https://github.com/googleapis/java-secretmanager/commit/a2e0e977ae70f38c8cf1e61d4245a34ebd0d1af5)) * update dependency org.graalvm.buildtools:native-maven-plugin to v0.9.12 ([#788](https://github.com/googleapis/java-secretmanager/issues/788)) ([8662fe6](https://github.com/googleapis/java-secretmanager/commit/8662fe687369eab23a185eba0bf9a48110d5856b)) --- This PR was generated with [Release Please](https://github.com/googleapis/release-please). See [documentation](https://github.com/googleapis/release-please#release-please). --- CHANGELOG.md | 22 +++++++++++++++++++ google-cloud-secretmanager-bom/pom.xml | 12 +++++----- google-cloud-secretmanager/pom.xml | 4 ++-- grpc-google-cloud-secretmanager-v1/pom.xml | 4 ++-- .../pom.xml | 4 ++-- pom.xml | 12 +++++----- proto-google-cloud-secretmanager-v1/pom.xml | 4 ++-- .../pom.xml | 4 ++-- versions.txt | 10 ++++----- 9 files changed, 49 insertions(+), 27 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 2b1d84cd..f7610374 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,5 +1,27 @@ # Changelog +## [2.3.0](https://github.com/googleapis/java-secretmanager/compare/v2.2.0...v2.3.0) (2022-07-01) + + +### Features + +* Enable REST transport for most of Java and Go clients ([#790](https://github.com/googleapis/java-secretmanager/issues/790)) ([d51c8fa](https://github.com/googleapis/java-secretmanager/commit/d51c8fa85243d4b71b805a67141168898542a851)) + + +### Documentation + +* **sample:** clean up README for native image sample ([#785](https://github.com/googleapis/java-secretmanager/issues/785)) ([67260d7](https://github.com/googleapis/java-secretmanager/commit/67260d74d7c5f05dc08957267ae809eb3ea66281)) + + +### Dependencies + +* update dependency com.google.cloud:google-cloud-shared-dependencies to v2.13.0 ([#789](https://github.com/googleapis/java-secretmanager/issues/789)) ([71aae1d](https://github.com/googleapis/java-secretmanager/commit/71aae1d94136082ed323a6591e5cfe6a0d02875c)) +* update dependency com.google.protobuf:protobuf-java-util to v3.21.0 ([#779](https://github.com/googleapis/java-secretmanager/issues/779)) ([d38f1db](https://github.com/googleapis/java-secretmanager/commit/d38f1dbd5fea21d3edc06045e5c892313a0524b4)) +* update dependency com.google.protobuf:protobuf-java-util to v3.21.1 ([#780](https://github.com/googleapis/java-secretmanager/issues/780)) ([6c613da](https://github.com/googleapis/java-secretmanager/commit/6c613daee4f406e501ad92742fc7dae0d4172298)) +* update dependency com.google.protobuf:protobuf-java-util to v3.21.2 ([#791](https://github.com/googleapis/java-secretmanager/issues/791)) ([d7d4ea9](https://github.com/googleapis/java-secretmanager/commit/d7d4ea9d26ca5b1fe44d052b8f7c1f5527a1dabc)) +* update dependency org.graalvm.buildtools:junit-platform-native to v0.9.12 ([#787](https://github.com/googleapis/java-secretmanager/issues/787)) ([a2e0e97](https://github.com/googleapis/java-secretmanager/commit/a2e0e977ae70f38c8cf1e61d4245a34ebd0d1af5)) +* update dependency org.graalvm.buildtools:native-maven-plugin to v0.9.12 ([#788](https://github.com/googleapis/java-secretmanager/issues/788)) ([8662fe6](https://github.com/googleapis/java-secretmanager/commit/8662fe687369eab23a185eba0bf9a48110d5856b)) + ## [2.2.0](https://github.com/googleapis/java-secretmanager/compare/v2.1.7...v2.2.0) (2022-05-19) diff --git a/google-cloud-secretmanager-bom/pom.xml b/google-cloud-secretmanager-bom/pom.xml index 20c3ea90..ba1357a5 100644 --- a/google-cloud-secretmanager-bom/pom.xml +++ b/google-cloud-secretmanager-bom/pom.xml @@ -3,7 +3,7 @@ 4.0.0 com.google.cloud google-cloud-secretmanager-bom - 2.2.1-SNAPSHOT + 2.3.0 pom com.google.cloud @@ -52,27 +52,27 @@ com.google.cloud google-cloud-secretmanager - 2.2.1-SNAPSHOT + 2.3.0 com.google.api.grpc grpc-google-cloud-secretmanager-v1 - 2.2.1-SNAPSHOT + 2.3.0 com.google.api.grpc grpc-google-cloud-secretmanager-v1beta1 - 2.2.1-SNAPSHOT + 2.3.0 com.google.api.grpc proto-google-cloud-secretmanager-v1 - 2.2.1-SNAPSHOT + 2.3.0 com.google.api.grpc proto-google-cloud-secretmanager-v1beta1 - 2.2.1-SNAPSHOT + 2.3.0 diff --git a/google-cloud-secretmanager/pom.xml b/google-cloud-secretmanager/pom.xml index ab4d47a3..7894c62d 100644 --- a/google-cloud-secretmanager/pom.xml +++ b/google-cloud-secretmanager/pom.xml @@ -3,7 +3,7 @@ 4.0.0 com.google.cloud google-cloud-secretmanager - 2.2.1-SNAPSHOT + 2.3.0 jar Google Cloud Secret Manager https://github.com/googleapis/java-secretmanager @@ -11,7 +11,7 @@ com.google.cloud google-cloud-secretmanager-parent - 2.2.1-SNAPSHOT + 2.3.0 google-cloud-secretmanager diff --git a/grpc-google-cloud-secretmanager-v1/pom.xml b/grpc-google-cloud-secretmanager-v1/pom.xml index 3a6169c0..933d55b7 100644 --- a/grpc-google-cloud-secretmanager-v1/pom.xml +++ b/grpc-google-cloud-secretmanager-v1/pom.xml @@ -4,13 +4,13 @@ 4.0.0 com.google.api.grpc grpc-google-cloud-secretmanager-v1 - 2.2.1-SNAPSHOT + 2.3.0 grpc-google-cloud-secretmanager-v1 GRPC library for grpc-google-cloud-secretmanager-v1 com.google.cloud google-cloud-secretmanager-parent - 2.2.1-SNAPSHOT + 2.3.0 diff --git a/grpc-google-cloud-secretmanager-v1beta1/pom.xml b/grpc-google-cloud-secretmanager-v1beta1/pom.xml index d19fb5e0..9976c154 100644 --- a/grpc-google-cloud-secretmanager-v1beta1/pom.xml +++ b/grpc-google-cloud-secretmanager-v1beta1/pom.xml @@ -4,13 +4,13 @@ 4.0.0 com.google.api.grpc grpc-google-cloud-secretmanager-v1beta1 - 2.2.1-SNAPSHOT + 2.3.0 grpc-google-cloud-secretmanager-v1beta1 GRPC library for grpc-google-cloud-secretmanager-v1beta1 com.google.cloud google-cloud-secretmanager-parent - 2.2.1-SNAPSHOT + 2.3.0 diff --git a/pom.xml b/pom.xml index 2ebef1c3..6c398dca 100644 --- a/pom.xml +++ b/pom.xml @@ -4,7 +4,7 @@ com.google.cloud google-cloud-secretmanager-parent pom - 2.2.1-SNAPSHOT + 2.3.0 Google Cloud secretmanager Parent https://github.com/googleapis/java-secretmanager @@ -61,27 +61,27 @@ com.google.api.grpc proto-google-cloud-secretmanager-v1 - 2.2.1-SNAPSHOT + 2.3.0 com.google.api.grpc proto-google-cloud-secretmanager-v1beta1 - 2.2.1-SNAPSHOT + 2.3.0 com.google.api.grpc grpc-google-cloud-secretmanager-v1 - 2.2.1-SNAPSHOT + 2.3.0 com.google.api.grpc grpc-google-cloud-secretmanager-v1beta1 - 2.2.1-SNAPSHOT + 2.3.0 com.google.cloud google-cloud-secretmanager - 2.2.1-SNAPSHOT + 2.3.0 diff --git a/proto-google-cloud-secretmanager-v1/pom.xml b/proto-google-cloud-secretmanager-v1/pom.xml index 567b2ed0..bebd0ed2 100644 --- a/proto-google-cloud-secretmanager-v1/pom.xml +++ b/proto-google-cloud-secretmanager-v1/pom.xml @@ -4,13 +4,13 @@ 4.0.0 com.google.api.grpc proto-google-cloud-secretmanager-v1 - 2.2.1-SNAPSHOT + 2.3.0 proto-google-cloud-secretmanager-v1 PROTO library for proto-google-cloud-secretmanager-v1 com.google.cloud google-cloud-secretmanager-parent - 2.2.1-SNAPSHOT + 2.3.0 diff --git a/proto-google-cloud-secretmanager-v1beta1/pom.xml b/proto-google-cloud-secretmanager-v1beta1/pom.xml index d7ef7795..4ffae727 100644 --- a/proto-google-cloud-secretmanager-v1beta1/pom.xml +++ b/proto-google-cloud-secretmanager-v1beta1/pom.xml @@ -4,13 +4,13 @@ 4.0.0 com.google.api.grpc proto-google-cloud-secretmanager-v1beta1 - 2.2.1-SNAPSHOT + 2.3.0 proto-google-cloud-secretmanager-v1beta1 PROTO library for proto-google-cloud-secretmanager-v1beta1 com.google.cloud google-cloud-secretmanager-parent - 2.2.1-SNAPSHOT + 2.3.0 diff --git a/versions.txt b/versions.txt index 6731b0b7..ced0ffd9 100644 --- a/versions.txt +++ b/versions.txt @@ -1,8 +1,8 @@ # Format: # module:released-version:current-version -google-cloud-secretmanager:2.2.0:2.2.1-SNAPSHOT -grpc-google-cloud-secretmanager-v1:2.2.0:2.2.1-SNAPSHOT -grpc-google-cloud-secretmanager-v1beta1:2.2.0:2.2.1-SNAPSHOT -proto-google-cloud-secretmanager-v1:2.2.0:2.2.1-SNAPSHOT -proto-google-cloud-secretmanager-v1beta1:2.2.0:2.2.1-SNAPSHOT +google-cloud-secretmanager:2.3.0:2.3.0 +grpc-google-cloud-secretmanager-v1:2.3.0:2.3.0 +grpc-google-cloud-secretmanager-v1beta1:2.3.0:2.3.0 +proto-google-cloud-secretmanager-v1:2.3.0:2.3.0 +proto-google-cloud-secretmanager-v1beta1:2.3.0:2.3.0