diff --git a/packages/google-cloud-secretmanager/protos/google/cloud/secretmanager/v1/resources.proto b/packages/google-cloud-secretmanager/protos/google/cloud/secretmanager/v1/resources.proto index 7adce715a2b..5cfe6d9bcba 100644 --- a/packages/google-cloud-secretmanager/protos/google/cloud/secretmanager/v1/resources.proto +++ b/packages/google-cloud-secretmanager/protos/google/cloud/secretmanager/v1/resources.proto @@ -21,7 +21,6 @@ import "google/api/resource.proto"; import "google/protobuf/duration.proto"; import "google/protobuf/timestamp.proto"; -option cc_enable_arenas = true; option csharp_namespace = "Google.Cloud.SecretManager.V1"; option go_package = "cloud.google.com/go/secretmanager/apiv1/secretmanagerpb;secretmanagerpb"; option java_multiple_files = true; @@ -151,8 +150,8 @@ message Secret { google.protobuf.Duration version_destroy_ttl = 14 [(google.api.field_behavior) = OPTIONAL]; - // Optional. The customer-managed encryption configuration of the Regionalised - // Secrets. If no configuration is provided, Google-managed default encryption + // Optional. The customer-managed encryption configuration of the regionalized + // secrets. If no configuration is provided, Google-managed default encryption // is used. // // Updates to the [Secret][google.cloud.secretmanager.v1.Secret] encryption @@ -244,16 +243,15 @@ message SecretVersion { // Optional. Output only. Scheduled destroy time for secret version. // This is a part of the Delayed secret version destroy feature. For a // Secret with a valid version destroy TTL, when a secert version is - // destroyed, the version is moved to disabled state and it is scheduled for - // destruction. The version is destroyed only after the - // `scheduled_destroy_time`. + // destroyed, version is moved to disabled state and it is scheduled for + // destruction Version is destroyed only after the scheduled_destroy_time. google.protobuf.Timestamp scheduled_destroy_time = 8 [(google.api.field_behavior) = OUTPUT_ONLY]; // Output only. The customer-managed encryption status of the // [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. Only // populated if customer-managed encryption is used and - // [Secret][google.cloud.secretmanager.v1.Secret] is a Regionalised Secret. + // [Secret][google.cloud.secretmanager.v1.Secret] is a regionalized secret. CustomerManagedEncryptionStatus customer_managed_encryption = 9 [(google.api.field_behavior) = OUTPUT_ONLY]; } @@ -279,7 +277,8 @@ message Replication { // A replication policy that replicates the // [Secret][google.cloud.secretmanager.v1.Secret] payload into the locations - // specified in [Secret.replication.user_managed.replicas][] + // specified in + // [Replication.UserManaged.replicas][google.cloud.secretmanager.v1.Replication.UserManaged.replicas] message UserManaged { // Represents a Replica for this // [Secret][google.cloud.secretmanager.v1.Secret]. @@ -422,12 +421,12 @@ message Topic { pattern: "projects/{project}/topics/{topic}" }; - // Required. The resource name of the Pub/Sub topic that will be published to, - // in the following format: `projects/*/topics/*`. For publication to succeed, - // the Secret Manager service agent must have the `pubsub.topic.publish` - // permission on the topic. The Pub/Sub Publisher role + // Identifier. The resource name of the Pub/Sub topic that will be published + // to, in the following format: `projects/*/topics/*`. For publication to + // succeed, the Secret Manager service agent must have the + // `pubsub.topic.publish` permission on the topic. The Pub/Sub Publisher role // (`roles/pubsub.publisher`) includes this permission. - string name = 1 [(google.api.field_behavior) = REQUIRED]; + string name = 1 [(google.api.field_behavior) = IDENTIFIER]; } // The rotation time and period for a diff --git a/packages/google-cloud-secretmanager/protos/google/cloud/secretmanager/v1/service.proto b/packages/google-cloud-secretmanager/protos/google/cloud/secretmanager/v1/service.proto index ad23183b079..15e1bc3af96 100644 --- a/packages/google-cloud-secretmanager/protos/google/cloud/secretmanager/v1/service.proto +++ b/packages/google-cloud-secretmanager/protos/google/cloud/secretmanager/v1/service.proto @@ -26,7 +26,6 @@ import "google/iam/v1/policy.proto"; import "google/protobuf/empty.proto"; import "google/protobuf/field_mask.proto"; -option cc_enable_arenas = true; option csharp_namespace = "Google.Cloud.SecretManager.V1"; option go_package = "cloud.google.com/go/secretmanager/apiv1/secretmanagerpb;secretmanagerpb"; option java_multiple_files = true; diff --git a/packages/google-cloud-secretmanager/protos/google/cloud/secretmanager/v1beta2/resources.proto b/packages/google-cloud-secretmanager/protos/google/cloud/secretmanager/v1beta2/resources.proto index 304a141d2c2..1d355bc4714 100644 --- a/packages/google-cloud-secretmanager/protos/google/cloud/secretmanager/v1beta2/resources.proto +++ b/packages/google-cloud-secretmanager/protos/google/cloud/secretmanager/v1beta2/resources.proto @@ -21,7 +21,6 @@ import "google/api/resource.proto"; import "google/protobuf/duration.proto"; import "google/protobuf/timestamp.proto"; -option cc_enable_arenas = true; option csharp_namespace = "Google.Cloud.SecretManager.V1Beta2"; option go_package = "cloud.google.com/go/secretmanager/apiv1beta2/secretmanagerpb;secretmanagerpb"; option java_multiple_files = true; @@ -281,7 +280,8 @@ message Replication { // A replication policy that replicates the // [Secret][google.cloud.secretmanager.v1beta2.Secret] payload into the - // locations specified in [Secret.replication.user_managed.replicas][] + // locations specified in + // [Replication.UserManaged.replicas][google.cloud.secretmanager.v1beta2.Replication.UserManaged.replicas] message UserManaged { // Represents a Replica for this // [Secret][google.cloud.secretmanager.v1beta2.Secret]. diff --git a/packages/google-cloud-secretmanager/protos/google/cloud/secretmanager/v1beta2/service.proto b/packages/google-cloud-secretmanager/protos/google/cloud/secretmanager/v1beta2/service.proto index db9db3f4607..01c32a7f69c 100644 --- a/packages/google-cloud-secretmanager/protos/google/cloud/secretmanager/v1beta2/service.proto +++ b/packages/google-cloud-secretmanager/protos/google/cloud/secretmanager/v1beta2/service.proto @@ -26,7 +26,6 @@ import "google/iam/v1/policy.proto"; import "google/protobuf/empty.proto"; import "google/protobuf/field_mask.proto"; -option cc_enable_arenas = true; option csharp_namespace = "Google.Cloud.SecretManager.V1Beta2"; option go_package = "cloud.google.com/go/secretmanager/apiv1beta2/secretmanagerpb;secretmanagerpb"; option java_multiple_files = true; diff --git a/packages/google-cloud-secretmanager/protos/protos.json b/packages/google-cloud-secretmanager/protos/protos.json index bbd86a0959e..84b69cf0ca4 100644 --- a/packages/google-cloud-secretmanager/protos/protos.json +++ b/packages/google-cloud-secretmanager/protos/protos.json @@ -11,7 +11,6 @@ "nested": { "v1": { "options": { - "cc_enable_arenas": true, "csharp_namespace": "Google.Cloud.SecretManager.V1", "go_package": "cloud.google.com/go/secretmanager/apiv1/secretmanagerpb;secretmanagerpb", "java_multiple_files": true, @@ -371,7 +370,7 @@ "type": "string", "id": 1, "options": { - "(google.api.field_behavior)": "REQUIRED" + "(google.api.field_behavior)": "IDENTIFIER" } } } @@ -1069,7 +1068,6 @@ }, "v1beta2": { "options": { - "cc_enable_arenas": true, "csharp_namespace": "Google.Cloud.SecretManager.V1Beta2", "go_package": "cloud.google.com/go/secretmanager/apiv1beta2/secretmanagerpb;secretmanagerpb", "java_multiple_files": true,