// Copyright 2024 Google LLC // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // Code generated by protoc-gen-go. DO NOT EDIT. // versions: // protoc-gen-go v1.33.0 // protoc v4.25.3 // source: google/cloud/secretmanager/v1beta2/resources.proto package secretmanagerpb import ( reflect "reflect" sync "sync" _ "google.golang.org/genproto/googleapis/api/annotations" protoreflect "google.golang.org/protobuf/reflect/protoreflect" protoimpl "google.golang.org/protobuf/runtime/protoimpl" durationpb "google.golang.org/protobuf/types/known/durationpb" timestamppb "google.golang.org/protobuf/types/known/timestamppb" ) const ( // Verify that this generated code is sufficiently up-to-date. _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) // Verify that runtime/protoimpl is sufficiently up-to-date. _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) ) // The state of a // [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion], // indicating if it can be accessed. type SecretVersion_State int32 const ( // Not specified. This value is unused and invalid. SecretVersion_STATE_UNSPECIFIED SecretVersion_State = 0 // The [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion] may // be accessed. SecretVersion_ENABLED SecretVersion_State = 1 // The [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion] may // not be accessed, but the secret data is still available and can be placed // back into the // [ENABLED][google.cloud.secretmanager.v1beta2.SecretVersion.State.ENABLED] // state. SecretVersion_DISABLED SecretVersion_State = 2 // The [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion] is // destroyed and the secret data is no longer stored. A version may not // leave this state once entered. SecretVersion_DESTROYED SecretVersion_State = 3 ) // Enum value maps for SecretVersion_State. var ( SecretVersion_State_name = map[int32]string{ 0: "STATE_UNSPECIFIED", 1: "ENABLED", 2: "DISABLED", 3: "DESTROYED", } SecretVersion_State_value = map[string]int32{ "STATE_UNSPECIFIED": 0, "ENABLED": 1, "DISABLED": 2, "DESTROYED": 3, } ) func (x SecretVersion_State) Enum() *SecretVersion_State { p := new(SecretVersion_State) *p = x return p } func (x SecretVersion_State) String() string { return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x)) } func (SecretVersion_State) Descriptor() protoreflect.EnumDescriptor { return file_google_cloud_secretmanager_v1beta2_resources_proto_enumTypes[0].Descriptor() } func (SecretVersion_State) Type() protoreflect.EnumType { return &file_google_cloud_secretmanager_v1beta2_resources_proto_enumTypes[0] } func (x SecretVersion_State) Number() protoreflect.EnumNumber { return protoreflect.EnumNumber(x) } // Deprecated: Use SecretVersion_State.Descriptor instead. func (SecretVersion_State) EnumDescriptor() ([]byte, []int) { return file_google_cloud_secretmanager_v1beta2_resources_proto_rawDescGZIP(), []int{1, 0} } // A [Secret][google.cloud.secretmanager.v1beta2.Secret] is a logical secret // whose value and versions can be accessed. // // A [Secret][google.cloud.secretmanager.v1beta2.Secret] is made up of zero or // more [SecretVersions][google.cloud.secretmanager.v1beta2.SecretVersion] that // represent the secret data. type Secret struct { state protoimpl.MessageState sizeCache protoimpl.SizeCache unknownFields protoimpl.UnknownFields // Output only. The resource name of the // [Secret][google.cloud.secretmanager.v1beta2.Secret] in the format // `projects/*/secrets/*`. Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` // Optional. Immutable. The replication policy of the secret data attached to // the [Secret][google.cloud.secretmanager.v1beta2.Secret]. // // The replication policy cannot be changed after the Secret has been created. Replication *Replication `protobuf:"bytes,2,opt,name=replication,proto3" json:"replication,omitempty"` // Output only. The time at which the // [Secret][google.cloud.secretmanager.v1beta2.Secret] was created. CreateTime *timestamppb.Timestamp `protobuf:"bytes,3,opt,name=create_time,json=createTime,proto3" json:"create_time,omitempty"` // The labels assigned to this Secret. // // Label keys must be between 1 and 63 characters long, have a UTF-8 encoding // of maximum 128 bytes, and must conform to the following PCRE regular // expression: `[\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}` // // Label values must be between 0 and 63 characters long, have a UTF-8 // encoding of maximum 128 bytes, and must conform to the following PCRE // regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}` // // No more than 64 labels can be assigned to a given resource. Labels map[string]string `protobuf:"bytes,4,rep,name=labels,proto3" json:"labels,omitempty" protobuf_key:"bytes,1,opt,name=key,proto3" protobuf_val:"bytes,2,opt,name=value,proto3"` // Optional. A list of up to 10 Pub/Sub topics to which messages are published // when control plane operations are called on the secret or its versions. Topics []*Topic `protobuf:"bytes,5,rep,name=topics,proto3" json:"topics,omitempty"` // Expiration policy attached to the // [Secret][google.cloud.secretmanager.v1beta2.Secret]. If specified the // [Secret][google.cloud.secretmanager.v1beta2.Secret] and all // [SecretVersions][google.cloud.secretmanager.v1beta2.SecretVersion] will be // automatically deleted at expiration. Expired secrets are irreversibly // deleted. // // Expiration is *not* the recommended way to set time-based permissions. [IAM // Conditions](https://cloud.google.com/secret-manager/docs/access-control#conditions) // is recommended for granting time-based permissions because the operation // can be reversed. // // Types that are assignable to Expiration: // // *Secret_ExpireTime // *Secret_Ttl Expiration isSecret_Expiration `protobuf_oneof:"expiration"` // Optional. Etag of the currently stored // [Secret][google.cloud.secretmanager.v1beta2.Secret]. Etag string `protobuf:"bytes,8,opt,name=etag,proto3" json:"etag,omitempty"` // Optional. Rotation policy attached to the // [Secret][google.cloud.secretmanager.v1beta2.Secret]. May be excluded if // there is no rotation policy. Rotation *Rotation `protobuf:"bytes,9,opt,name=rotation,proto3" json:"rotation,omitempty"` // Optional. Mapping from version alias to version name. // // A version alias is a string with a maximum length of 63 characters and can // contain uppercase and lowercase letters, numerals, and the hyphen (`-`) // and underscore ('_') characters. An alias string must start with a // letter and cannot be the string 'latest' or 'NEW'. // No more than 50 aliases can be assigned to a given secret. // // Version-Alias pairs will be viewable via GetSecret and modifiable via // UpdateSecret. Access by alias is only supported for // GetSecretVersion and AccessSecretVersion. VersionAliases map[string]int64 `protobuf:"bytes,11,rep,name=version_aliases,json=versionAliases,proto3" json:"version_aliases,omitempty" protobuf_key:"bytes,1,opt,name=key,proto3" protobuf_val:"varint,2,opt,name=value,proto3"` // Optional. Custom metadata about the secret. // // Annotations are distinct from various forms of labels. // Annotations exist to allow client tools to store their own state // information without requiring a database. // // Annotation keys must be between 1 and 63 characters long, have a UTF-8 // encoding of maximum 128 bytes, begin and end with an alphanumeric character // ([a-z0-9A-Z]), and may have dashes (-), underscores (_), dots (.), and // alphanumerics in between these symbols. // // The total size of annotation keys and values must be less than 16KiB. Annotations map[string]string `protobuf:"bytes,13,rep,name=annotations,proto3" json:"annotations,omitempty" protobuf_key:"bytes,1,opt,name=key,proto3" protobuf_val:"bytes,2,opt,name=value,proto3"` // Optional. Secret Version TTL after destruction request // // This is a part of the Delayed secret version destroy feature. // For secret with TTL>0, version destruction doesn't happen immediately // on calling destroy instead the version goes to a disabled state and // destruction happens after the TTL expires. VersionDestroyTtl *durationpb.Duration `protobuf:"bytes,14,opt,name=version_destroy_ttl,json=versionDestroyTtl,proto3" json:"version_destroy_ttl,omitempty"` // Optional. The customer-managed encryption configuration of the Regionalised // Secrets. If no configuration is provided, Google-managed default encryption // is used. // // Updates to the [Secret][google.cloud.secretmanager.v1beta2.Secret] // encryption configuration only apply to // [SecretVersions][google.cloud.secretmanager.v1beta2.SecretVersion] added // afterwards. They do not apply retroactively to existing // [SecretVersions][google.cloud.secretmanager.v1beta2.SecretVersion]. CustomerManagedEncryption *CustomerManagedEncryption `protobuf:"bytes,15,opt,name=customer_managed_encryption,json=customerManagedEncryption,proto3" json:"customer_managed_encryption,omitempty"` } func (x *Secret) Reset() { *x = Secret{} if protoimpl.UnsafeEnabled { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[0] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } } func (x *Secret) String() string { return protoimpl.X.MessageStringOf(x) } func (*Secret) ProtoMessage() {} func (x *Secret) ProtoReflect() protoreflect.Message { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[0] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { ms.StoreMessageInfo(mi) } return ms } return mi.MessageOf(x) } // Deprecated: Use Secret.ProtoReflect.Descriptor instead. func (*Secret) Descriptor() ([]byte, []int) { return file_google_cloud_secretmanager_v1beta2_resources_proto_rawDescGZIP(), []int{0} } func (x *Secret) GetName() string { if x != nil { return x.Name } return "" } func (x *Secret) GetReplication() *Replication { if x != nil { return x.Replication } return nil } func (x *Secret) GetCreateTime() *timestamppb.Timestamp { if x != nil { return x.CreateTime } return nil } func (x *Secret) GetLabels() map[string]string { if x != nil { return x.Labels } return nil } func (x *Secret) GetTopics() []*Topic { if x != nil { return x.Topics } return nil } func (m *Secret) GetExpiration() isSecret_Expiration { if m != nil { return m.Expiration } return nil } func (x *Secret) GetExpireTime() *timestamppb.Timestamp { if x, ok := x.GetExpiration().(*Secret_ExpireTime); ok { return x.ExpireTime } return nil } func (x *Secret) GetTtl() *durationpb.Duration { if x, ok := x.GetExpiration().(*Secret_Ttl); ok { return x.Ttl } return nil } func (x *Secret) GetEtag() string { if x != nil { return x.Etag } return "" } func (x *Secret) GetRotation() *Rotation { if x != nil { return x.Rotation } return nil } func (x *Secret) GetVersionAliases() map[string]int64 { if x != nil { return x.VersionAliases } return nil } func (x *Secret) GetAnnotations() map[string]string { if x != nil { return x.Annotations } return nil } func (x *Secret) GetVersionDestroyTtl() *durationpb.Duration { if x != nil { return x.VersionDestroyTtl } return nil } func (x *Secret) GetCustomerManagedEncryption() *CustomerManagedEncryption { if x != nil { return x.CustomerManagedEncryption } return nil } type isSecret_Expiration interface { isSecret_Expiration() } type Secret_ExpireTime struct { // Optional. Timestamp in UTC when the // [Secret][google.cloud.secretmanager.v1beta2.Secret] is scheduled to // expire. This is always provided on output, regardless of what was sent on // input. ExpireTime *timestamppb.Timestamp `protobuf:"bytes,6,opt,name=expire_time,json=expireTime,proto3,oneof"` } type Secret_Ttl struct { // Input only. The TTL for the // [Secret][google.cloud.secretmanager.v1beta2.Secret]. Ttl *durationpb.Duration `protobuf:"bytes,7,opt,name=ttl,proto3,oneof"` } func (*Secret_ExpireTime) isSecret_Expiration() {} func (*Secret_Ttl) isSecret_Expiration() {} // A secret version resource in the Secret Manager API. type SecretVersion struct { state protoimpl.MessageState sizeCache protoimpl.SizeCache unknownFields protoimpl.UnknownFields // Output only. The resource name of the // [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion] in the // format `projects/*/secrets/*/versions/*`. // // [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion] IDs in a // [Secret][google.cloud.secretmanager.v1beta2.Secret] start at 1 and are // incremented for each subsequent version of the secret. Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` // Output only. The time at which the // [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion] was // created. CreateTime *timestamppb.Timestamp `protobuf:"bytes,2,opt,name=create_time,json=createTime,proto3" json:"create_time,omitempty"` // Output only. The time this // [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion] was // destroyed. Only present if // [state][google.cloud.secretmanager.v1beta2.SecretVersion.state] is // [DESTROYED][google.cloud.secretmanager.v1beta2.SecretVersion.State.DESTROYED]. DestroyTime *timestamppb.Timestamp `protobuf:"bytes,3,opt,name=destroy_time,json=destroyTime,proto3" json:"destroy_time,omitempty"` // Output only. The current state of the // [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]. State SecretVersion_State `protobuf:"varint,4,opt,name=state,proto3,enum=google.cloud.secretmanager.v1beta2.SecretVersion_State" json:"state,omitempty"` // The replication status of the // [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]. ReplicationStatus *ReplicationStatus `protobuf:"bytes,5,opt,name=replication_status,json=replicationStatus,proto3" json:"replication_status,omitempty"` // Output only. Etag of the currently stored // [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]. Etag string `protobuf:"bytes,6,opt,name=etag,proto3" json:"etag,omitempty"` // Output only. True if payload checksum specified in // [SecretPayload][google.cloud.secretmanager.v1beta2.SecretPayload] object // has been received by // [SecretManagerService][google.cloud.secretmanager.v1beta2.SecretManagerService] // on // [SecretManagerService.AddSecretVersion][google.cloud.secretmanager.v1beta2.SecretManagerService.AddSecretVersion]. ClientSpecifiedPayloadChecksum bool `protobuf:"varint,7,opt,name=client_specified_payload_checksum,json=clientSpecifiedPayloadChecksum,proto3" json:"client_specified_payload_checksum,omitempty"` // Optional. Output only. Scheduled destroy time for secret version. // This is a part of the Delayed secret version destroy feature. For a // Secret with a valid version destroy TTL, when a secert version is // destroyed, version is moved to disabled state and it is scheduled for // destruction Version is destroyed only after the scheduled_destroy_time. ScheduledDestroyTime *timestamppb.Timestamp `protobuf:"bytes,8,opt,name=scheduled_destroy_time,json=scheduledDestroyTime,proto3" json:"scheduled_destroy_time,omitempty"` // Output only. The customer-managed encryption status of the // [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]. Only // populated if customer-managed encryption is used and // [Secret][google.cloud.secretmanager.v1beta2.Secret] is a Regionalised // Secret. CustomerManagedEncryption *CustomerManagedEncryptionStatus `protobuf:"bytes,9,opt,name=customer_managed_encryption,json=customerManagedEncryption,proto3" json:"customer_managed_encryption,omitempty"` } func (x *SecretVersion) Reset() { *x = SecretVersion{} if protoimpl.UnsafeEnabled { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[1] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } } func (x *SecretVersion) String() string { return protoimpl.X.MessageStringOf(x) } func (*SecretVersion) ProtoMessage() {} func (x *SecretVersion) ProtoReflect() protoreflect.Message { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[1] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { ms.StoreMessageInfo(mi) } return ms } return mi.MessageOf(x) } // Deprecated: Use SecretVersion.ProtoReflect.Descriptor instead. func (*SecretVersion) Descriptor() ([]byte, []int) { return file_google_cloud_secretmanager_v1beta2_resources_proto_rawDescGZIP(), []int{1} } func (x *SecretVersion) GetName() string { if x != nil { return x.Name } return "" } func (x *SecretVersion) GetCreateTime() *timestamppb.Timestamp { if x != nil { return x.CreateTime } return nil } func (x *SecretVersion) GetDestroyTime() *timestamppb.Timestamp { if x != nil { return x.DestroyTime } return nil } func (x *SecretVersion) GetState() SecretVersion_State { if x != nil { return x.State } return SecretVersion_STATE_UNSPECIFIED } func (x *SecretVersion) GetReplicationStatus() *ReplicationStatus { if x != nil { return x.ReplicationStatus } return nil } func (x *SecretVersion) GetEtag() string { if x != nil { return x.Etag } return "" } func (x *SecretVersion) GetClientSpecifiedPayloadChecksum() bool { if x != nil { return x.ClientSpecifiedPayloadChecksum } return false } func (x *SecretVersion) GetScheduledDestroyTime() *timestamppb.Timestamp { if x != nil { return x.ScheduledDestroyTime } return nil } func (x *SecretVersion) GetCustomerManagedEncryption() *CustomerManagedEncryptionStatus { if x != nil { return x.CustomerManagedEncryption } return nil } // A policy that defines the replication and encryption configuration of data. type Replication struct { state protoimpl.MessageState sizeCache protoimpl.SizeCache unknownFields protoimpl.UnknownFields // The replication policy for this secret. // // Types that are assignable to Replication: // // *Replication_Automatic_ // *Replication_UserManaged_ Replication isReplication_Replication `protobuf_oneof:"replication"` } func (x *Replication) Reset() { *x = Replication{} if protoimpl.UnsafeEnabled { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[2] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } } func (x *Replication) String() string { return protoimpl.X.MessageStringOf(x) } func (*Replication) ProtoMessage() {} func (x *Replication) ProtoReflect() protoreflect.Message { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[2] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { ms.StoreMessageInfo(mi) } return ms } return mi.MessageOf(x) } // Deprecated: Use Replication.ProtoReflect.Descriptor instead. func (*Replication) Descriptor() ([]byte, []int) { return file_google_cloud_secretmanager_v1beta2_resources_proto_rawDescGZIP(), []int{2} } func (m *Replication) GetReplication() isReplication_Replication { if m != nil { return m.Replication } return nil } func (x *Replication) GetAutomatic() *Replication_Automatic { if x, ok := x.GetReplication().(*Replication_Automatic_); ok { return x.Automatic } return nil } func (x *Replication) GetUserManaged() *Replication_UserManaged { if x, ok := x.GetReplication().(*Replication_UserManaged_); ok { return x.UserManaged } return nil } type isReplication_Replication interface { isReplication_Replication() } type Replication_Automatic_ struct { // The [Secret][google.cloud.secretmanager.v1beta2.Secret] will // automatically be replicated without any restrictions. Automatic *Replication_Automatic `protobuf:"bytes,1,opt,name=automatic,proto3,oneof"` } type Replication_UserManaged_ struct { // The [Secret][google.cloud.secretmanager.v1beta2.Secret] will only be // replicated into the locations specified. UserManaged *Replication_UserManaged `protobuf:"bytes,2,opt,name=user_managed,json=userManaged,proto3,oneof"` } func (*Replication_Automatic_) isReplication_Replication() {} func (*Replication_UserManaged_) isReplication_Replication() {} // Configuration for encrypting secret payloads using customer-managed // encryption keys (CMEK). type CustomerManagedEncryption struct { state protoimpl.MessageState sizeCache protoimpl.SizeCache unknownFields protoimpl.UnknownFields // Required. The resource name of the Cloud KMS CryptoKey used to encrypt // secret payloads. // // For secrets using the // [UserManaged][google.cloud.secretmanager.v1beta2.Replication.UserManaged] // replication policy type, Cloud KMS CryptoKeys must reside in the same // location as the [replica location][Secret.UserManaged.Replica.location]. // // For secrets using the // [Automatic][google.cloud.secretmanager.v1beta2.Replication.Automatic] // replication policy type, Cloud KMS CryptoKeys must reside in `global`. // // The expected format is `projects/*/locations/*/keyRings/*/cryptoKeys/*`. KmsKeyName string `protobuf:"bytes,1,opt,name=kms_key_name,json=kmsKeyName,proto3" json:"kms_key_name,omitempty"` } func (x *CustomerManagedEncryption) Reset() { *x = CustomerManagedEncryption{} if protoimpl.UnsafeEnabled { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[3] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } } func (x *CustomerManagedEncryption) String() string { return protoimpl.X.MessageStringOf(x) } func (*CustomerManagedEncryption) ProtoMessage() {} func (x *CustomerManagedEncryption) ProtoReflect() protoreflect.Message { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[3] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { ms.StoreMessageInfo(mi) } return ms } return mi.MessageOf(x) } // Deprecated: Use CustomerManagedEncryption.ProtoReflect.Descriptor instead. func (*CustomerManagedEncryption) Descriptor() ([]byte, []int) { return file_google_cloud_secretmanager_v1beta2_resources_proto_rawDescGZIP(), []int{3} } func (x *CustomerManagedEncryption) GetKmsKeyName() string { if x != nil { return x.KmsKeyName } return "" } // The replication status of a // [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]. type ReplicationStatus struct { state protoimpl.MessageState sizeCache protoimpl.SizeCache unknownFields protoimpl.UnknownFields // The replication status of the // [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]. // // Types that are assignable to ReplicationStatus: // // *ReplicationStatus_Automatic // *ReplicationStatus_UserManaged ReplicationStatus isReplicationStatus_ReplicationStatus `protobuf_oneof:"replication_status"` } func (x *ReplicationStatus) Reset() { *x = ReplicationStatus{} if protoimpl.UnsafeEnabled { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[4] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } } func (x *ReplicationStatus) String() string { return protoimpl.X.MessageStringOf(x) } func (*ReplicationStatus) ProtoMessage() {} func (x *ReplicationStatus) ProtoReflect() protoreflect.Message { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[4] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { ms.StoreMessageInfo(mi) } return ms } return mi.MessageOf(x) } // Deprecated: Use ReplicationStatus.ProtoReflect.Descriptor instead. func (*ReplicationStatus) Descriptor() ([]byte, []int) { return file_google_cloud_secretmanager_v1beta2_resources_proto_rawDescGZIP(), []int{4} } func (m *ReplicationStatus) GetReplicationStatus() isReplicationStatus_ReplicationStatus { if m != nil { return m.ReplicationStatus } return nil } func (x *ReplicationStatus) GetAutomatic() *ReplicationStatus_AutomaticStatus { if x, ok := x.GetReplicationStatus().(*ReplicationStatus_Automatic); ok { return x.Automatic } return nil } func (x *ReplicationStatus) GetUserManaged() *ReplicationStatus_UserManagedStatus { if x, ok := x.GetReplicationStatus().(*ReplicationStatus_UserManaged); ok { return x.UserManaged } return nil } type isReplicationStatus_ReplicationStatus interface { isReplicationStatus_ReplicationStatus() } type ReplicationStatus_Automatic struct { // Describes the replication status of a // [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion] with // automatic replication. // // Only populated if the parent // [Secret][google.cloud.secretmanager.v1beta2.Secret] has an automatic // replication policy. Automatic *ReplicationStatus_AutomaticStatus `protobuf:"bytes,1,opt,name=automatic,proto3,oneof"` } type ReplicationStatus_UserManaged struct { // Describes the replication status of a // [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion] with // user-managed replication. // // Only populated if the parent // [Secret][google.cloud.secretmanager.v1beta2.Secret] has a user-managed // replication policy. UserManaged *ReplicationStatus_UserManagedStatus `protobuf:"bytes,2,opt,name=user_managed,json=userManaged,proto3,oneof"` } func (*ReplicationStatus_Automatic) isReplicationStatus_ReplicationStatus() {} func (*ReplicationStatus_UserManaged) isReplicationStatus_ReplicationStatus() {} // Describes the status of customer-managed encryption. type CustomerManagedEncryptionStatus struct { state protoimpl.MessageState sizeCache protoimpl.SizeCache unknownFields protoimpl.UnknownFields // Required. The resource name of the Cloud KMS CryptoKeyVersion used to // encrypt the secret payload, in the following format: // `projects/*/locations/*/keyRings/*/cryptoKeys/*/versions/*`. KmsKeyVersionName string `protobuf:"bytes,1,opt,name=kms_key_version_name,json=kmsKeyVersionName,proto3" json:"kms_key_version_name,omitempty"` } func (x *CustomerManagedEncryptionStatus) Reset() { *x = CustomerManagedEncryptionStatus{} if protoimpl.UnsafeEnabled { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[5] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } } func (x *CustomerManagedEncryptionStatus) String() string { return protoimpl.X.MessageStringOf(x) } func (*CustomerManagedEncryptionStatus) ProtoMessage() {} func (x *CustomerManagedEncryptionStatus) ProtoReflect() protoreflect.Message { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[5] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { ms.StoreMessageInfo(mi) } return ms } return mi.MessageOf(x) } // Deprecated: Use CustomerManagedEncryptionStatus.ProtoReflect.Descriptor instead. func (*CustomerManagedEncryptionStatus) Descriptor() ([]byte, []int) { return file_google_cloud_secretmanager_v1beta2_resources_proto_rawDescGZIP(), []int{5} } func (x *CustomerManagedEncryptionStatus) GetKmsKeyVersionName() string { if x != nil { return x.KmsKeyVersionName } return "" } // A Pub/Sub topic which Secret Manager will publish to when control plane // events occur on this secret. type Topic struct { state protoimpl.MessageState sizeCache protoimpl.SizeCache unknownFields protoimpl.UnknownFields // Required. The resource name of the Pub/Sub topic that will be published to, // in the following format: `projects/*/topics/*`. For publication to succeed, // the Secret Manager service agent must have the `pubsub.topic.publish` // permission on the topic. The Pub/Sub Publisher role // (`roles/pubsub.publisher`) includes this permission. Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` } func (x *Topic) Reset() { *x = Topic{} if protoimpl.UnsafeEnabled { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[6] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } } func (x *Topic) String() string { return protoimpl.X.MessageStringOf(x) } func (*Topic) ProtoMessage() {} func (x *Topic) ProtoReflect() protoreflect.Message { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[6] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { ms.StoreMessageInfo(mi) } return ms } return mi.MessageOf(x) } // Deprecated: Use Topic.ProtoReflect.Descriptor instead. func (*Topic) Descriptor() ([]byte, []int) { return file_google_cloud_secretmanager_v1beta2_resources_proto_rawDescGZIP(), []int{6} } func (x *Topic) GetName() string { if x != nil { return x.Name } return "" } // The rotation time and period for a // [Secret][google.cloud.secretmanager.v1beta2.Secret]. At next_rotation_time, // Secret Manager will send a Pub/Sub notification to the topics configured on // the Secret. [Secret.topics][google.cloud.secretmanager.v1beta2.Secret.topics] // must be set to configure rotation. type Rotation struct { state protoimpl.MessageState sizeCache protoimpl.SizeCache unknownFields protoimpl.UnknownFields // Optional. Timestamp in UTC at which the // [Secret][google.cloud.secretmanager.v1beta2.Secret] is scheduled to rotate. // Cannot be set to less than 300s (5 min) in the future and at most // 3153600000s (100 years). // // [next_rotation_time][google.cloud.secretmanager.v1beta2.Rotation.next_rotation_time] // MUST be set if // [rotation_period][google.cloud.secretmanager.v1beta2.Rotation.rotation_period] // is set. NextRotationTime *timestamppb.Timestamp `protobuf:"bytes,1,opt,name=next_rotation_time,json=nextRotationTime,proto3" json:"next_rotation_time,omitempty"` // Input only. The Duration between rotation notifications. Must be in seconds // and at least 3600s (1h) and at most 3153600000s (100 years). // // If // [rotation_period][google.cloud.secretmanager.v1beta2.Rotation.rotation_period] // is set, // [next_rotation_time][google.cloud.secretmanager.v1beta2.Rotation.next_rotation_time] // must be set. // [next_rotation_time][google.cloud.secretmanager.v1beta2.Rotation.next_rotation_time] // will be advanced by this period when the service automatically sends // rotation notifications. RotationPeriod *durationpb.Duration `protobuf:"bytes,2,opt,name=rotation_period,json=rotationPeriod,proto3" json:"rotation_period,omitempty"` } func (x *Rotation) Reset() { *x = Rotation{} if protoimpl.UnsafeEnabled { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[7] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } } func (x *Rotation) String() string { return protoimpl.X.MessageStringOf(x) } func (*Rotation) ProtoMessage() {} func (x *Rotation) ProtoReflect() protoreflect.Message { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[7] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { ms.StoreMessageInfo(mi) } return ms } return mi.MessageOf(x) } // Deprecated: Use Rotation.ProtoReflect.Descriptor instead. func (*Rotation) Descriptor() ([]byte, []int) { return file_google_cloud_secretmanager_v1beta2_resources_proto_rawDescGZIP(), []int{7} } func (x *Rotation) GetNextRotationTime() *timestamppb.Timestamp { if x != nil { return x.NextRotationTime } return nil } func (x *Rotation) GetRotationPeriod() *durationpb.Duration { if x != nil { return x.RotationPeriod } return nil } // A secret payload resource in the Secret Manager API. This contains the // sensitive secret payload that is associated with a // [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]. type SecretPayload struct { state protoimpl.MessageState sizeCache protoimpl.SizeCache unknownFields protoimpl.UnknownFields // The secret data. Must be no larger than 64KiB. Data []byte `protobuf:"bytes,1,opt,name=data,proto3" json:"data,omitempty"` // Optional. If specified, // [SecretManagerService][google.cloud.secretmanager.v1beta2.SecretManagerService] // will verify the integrity of the received // [data][google.cloud.secretmanager.v1beta2.SecretPayload.data] on // [SecretManagerService.AddSecretVersion][google.cloud.secretmanager.v1beta2.SecretManagerService.AddSecretVersion] // calls using the crc32c checksum and store it to include in future // [SecretManagerService.AccessSecretVersion][google.cloud.secretmanager.v1beta2.SecretManagerService.AccessSecretVersion] // responses. If a checksum is not provided in the // [SecretManagerService.AddSecretVersion][google.cloud.secretmanager.v1beta2.SecretManagerService.AddSecretVersion] // request, the // [SecretManagerService][google.cloud.secretmanager.v1beta2.SecretManagerService] // will generate and store one for you. // // The CRC32C value is encoded as a Int64 for compatibility, and can be // safely downconverted to uint32 in languages that support this type. // https://cloud.google.com/apis/design/design_patterns#integer_types DataCrc32C *int64 `protobuf:"varint,2,opt,name=data_crc32c,json=dataCrc32c,proto3,oneof" json:"data_crc32c,omitempty"` } func (x *SecretPayload) Reset() { *x = SecretPayload{} if protoimpl.UnsafeEnabled { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[8] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } } func (x *SecretPayload) String() string { return protoimpl.X.MessageStringOf(x) } func (*SecretPayload) ProtoMessage() {} func (x *SecretPayload) ProtoReflect() protoreflect.Message { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[8] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { ms.StoreMessageInfo(mi) } return ms } return mi.MessageOf(x) } // Deprecated: Use SecretPayload.ProtoReflect.Descriptor instead. func (*SecretPayload) Descriptor() ([]byte, []int) { return file_google_cloud_secretmanager_v1beta2_resources_proto_rawDescGZIP(), []int{8} } func (x *SecretPayload) GetData() []byte { if x != nil { return x.Data } return nil } func (x *SecretPayload) GetDataCrc32C() int64 { if x != nil && x.DataCrc32C != nil { return *x.DataCrc32C } return 0 } // A replication policy that replicates the // [Secret][google.cloud.secretmanager.v1beta2.Secret] payload without any // restrictions. type Replication_Automatic struct { state protoimpl.MessageState sizeCache protoimpl.SizeCache unknownFields protoimpl.UnknownFields // Optional. The customer-managed encryption configuration of the // [Secret][google.cloud.secretmanager.v1beta2.Secret]. If no configuration // is provided, Google-managed default encryption is used. // // Updates to the [Secret][google.cloud.secretmanager.v1beta2.Secret] // encryption configuration only apply to // [SecretVersions][google.cloud.secretmanager.v1beta2.SecretVersion] added // afterwards. They do not apply retroactively to existing // [SecretVersions][google.cloud.secretmanager.v1beta2.SecretVersion]. CustomerManagedEncryption *CustomerManagedEncryption `protobuf:"bytes,1,opt,name=customer_managed_encryption,json=customerManagedEncryption,proto3" json:"customer_managed_encryption,omitempty"` } func (x *Replication_Automatic) Reset() { *x = Replication_Automatic{} if protoimpl.UnsafeEnabled { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[12] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } } func (x *Replication_Automatic) String() string { return protoimpl.X.MessageStringOf(x) } func (*Replication_Automatic) ProtoMessage() {} func (x *Replication_Automatic) ProtoReflect() protoreflect.Message { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[12] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { ms.StoreMessageInfo(mi) } return ms } return mi.MessageOf(x) } // Deprecated: Use Replication_Automatic.ProtoReflect.Descriptor instead. func (*Replication_Automatic) Descriptor() ([]byte, []int) { return file_google_cloud_secretmanager_v1beta2_resources_proto_rawDescGZIP(), []int{2, 0} } func (x *Replication_Automatic) GetCustomerManagedEncryption() *CustomerManagedEncryption { if x != nil { return x.CustomerManagedEncryption } return nil } // A replication policy that replicates the // [Secret][google.cloud.secretmanager.v1beta2.Secret] payload into the // locations specified in [Secret.replication.user_managed.replicas][] type Replication_UserManaged struct { state protoimpl.MessageState sizeCache protoimpl.SizeCache unknownFields protoimpl.UnknownFields // Required. The list of Replicas for this // [Secret][google.cloud.secretmanager.v1beta2.Secret]. // // Cannot be empty. Replicas []*Replication_UserManaged_Replica `protobuf:"bytes,1,rep,name=replicas,proto3" json:"replicas,omitempty"` } func (x *Replication_UserManaged) Reset() { *x = Replication_UserManaged{} if protoimpl.UnsafeEnabled { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[13] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } } func (x *Replication_UserManaged) String() string { return protoimpl.X.MessageStringOf(x) } func (*Replication_UserManaged) ProtoMessage() {} func (x *Replication_UserManaged) ProtoReflect() protoreflect.Message { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[13] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { ms.StoreMessageInfo(mi) } return ms } return mi.MessageOf(x) } // Deprecated: Use Replication_UserManaged.ProtoReflect.Descriptor instead. func (*Replication_UserManaged) Descriptor() ([]byte, []int) { return file_google_cloud_secretmanager_v1beta2_resources_proto_rawDescGZIP(), []int{2, 1} } func (x *Replication_UserManaged) GetReplicas() []*Replication_UserManaged_Replica { if x != nil { return x.Replicas } return nil } // Represents a Replica for this // [Secret][google.cloud.secretmanager.v1beta2.Secret]. type Replication_UserManaged_Replica struct { state protoimpl.MessageState sizeCache protoimpl.SizeCache unknownFields protoimpl.UnknownFields // The canonical IDs of the location to replicate data. // For example: `"us-east1"`. Location string `protobuf:"bytes,1,opt,name=location,proto3" json:"location,omitempty"` // Optional. The customer-managed encryption configuration of the // [User-Managed Replica][Replication.UserManaged.Replica]. If no // configuration is provided, Google-managed default encryption is used. // // Updates to the [Secret][google.cloud.secretmanager.v1beta2.Secret] // encryption configuration only apply to // [SecretVersions][google.cloud.secretmanager.v1beta2.SecretVersion] // added afterwards. They do not apply retroactively to existing // [SecretVersions][google.cloud.secretmanager.v1beta2.SecretVersion]. CustomerManagedEncryption *CustomerManagedEncryption `protobuf:"bytes,2,opt,name=customer_managed_encryption,json=customerManagedEncryption,proto3" json:"customer_managed_encryption,omitempty"` } func (x *Replication_UserManaged_Replica) Reset() { *x = Replication_UserManaged_Replica{} if protoimpl.UnsafeEnabled { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[14] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } } func (x *Replication_UserManaged_Replica) String() string { return protoimpl.X.MessageStringOf(x) } func (*Replication_UserManaged_Replica) ProtoMessage() {} func (x *Replication_UserManaged_Replica) ProtoReflect() protoreflect.Message { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[14] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { ms.StoreMessageInfo(mi) } return ms } return mi.MessageOf(x) } // Deprecated: Use Replication_UserManaged_Replica.ProtoReflect.Descriptor instead. func (*Replication_UserManaged_Replica) Descriptor() ([]byte, []int) { return file_google_cloud_secretmanager_v1beta2_resources_proto_rawDescGZIP(), []int{2, 1, 0} } func (x *Replication_UserManaged_Replica) GetLocation() string { if x != nil { return x.Location } return "" } func (x *Replication_UserManaged_Replica) GetCustomerManagedEncryption() *CustomerManagedEncryption { if x != nil { return x.CustomerManagedEncryption } return nil } // The replication status of a // [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion] using // automatic replication. // // Only populated if the parent // [Secret][google.cloud.secretmanager.v1beta2.Secret] has an automatic // replication policy. type ReplicationStatus_AutomaticStatus struct { state protoimpl.MessageState sizeCache protoimpl.SizeCache unknownFields protoimpl.UnknownFields // Output only. The customer-managed encryption status of the // [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]. Only // populated if customer-managed encryption is used. CustomerManagedEncryption *CustomerManagedEncryptionStatus `protobuf:"bytes,1,opt,name=customer_managed_encryption,json=customerManagedEncryption,proto3" json:"customer_managed_encryption,omitempty"` } func (x *ReplicationStatus_AutomaticStatus) Reset() { *x = ReplicationStatus_AutomaticStatus{} if protoimpl.UnsafeEnabled { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[15] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } } func (x *ReplicationStatus_AutomaticStatus) String() string { return protoimpl.X.MessageStringOf(x) } func (*ReplicationStatus_AutomaticStatus) ProtoMessage() {} func (x *ReplicationStatus_AutomaticStatus) ProtoReflect() protoreflect.Message { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[15] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { ms.StoreMessageInfo(mi) } return ms } return mi.MessageOf(x) } // Deprecated: Use ReplicationStatus_AutomaticStatus.ProtoReflect.Descriptor instead. func (*ReplicationStatus_AutomaticStatus) Descriptor() ([]byte, []int) { return file_google_cloud_secretmanager_v1beta2_resources_proto_rawDescGZIP(), []int{4, 0} } func (x *ReplicationStatus_AutomaticStatus) GetCustomerManagedEncryption() *CustomerManagedEncryptionStatus { if x != nil { return x.CustomerManagedEncryption } return nil } // The replication status of a // [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion] using // user-managed replication. // // Only populated if the parent // [Secret][google.cloud.secretmanager.v1beta2.Secret] has a user-managed // replication policy. type ReplicationStatus_UserManagedStatus struct { state protoimpl.MessageState sizeCache protoimpl.SizeCache unknownFields protoimpl.UnknownFields // Output only. The list of replica statuses for the // [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]. Replicas []*ReplicationStatus_UserManagedStatus_ReplicaStatus `protobuf:"bytes,1,rep,name=replicas,proto3" json:"replicas,omitempty"` } func (x *ReplicationStatus_UserManagedStatus) Reset() { *x = ReplicationStatus_UserManagedStatus{} if protoimpl.UnsafeEnabled { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[16] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } } func (x *ReplicationStatus_UserManagedStatus) String() string { return protoimpl.X.MessageStringOf(x) } func (*ReplicationStatus_UserManagedStatus) ProtoMessage() {} func (x *ReplicationStatus_UserManagedStatus) ProtoReflect() protoreflect.Message { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[16] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { ms.StoreMessageInfo(mi) } return ms } return mi.MessageOf(x) } // Deprecated: Use ReplicationStatus_UserManagedStatus.ProtoReflect.Descriptor instead. func (*ReplicationStatus_UserManagedStatus) Descriptor() ([]byte, []int) { return file_google_cloud_secretmanager_v1beta2_resources_proto_rawDescGZIP(), []int{4, 1} } func (x *ReplicationStatus_UserManagedStatus) GetReplicas() []*ReplicationStatus_UserManagedStatus_ReplicaStatus { if x != nil { return x.Replicas } return nil } // Describes the status of a user-managed replica for the // [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]. type ReplicationStatus_UserManagedStatus_ReplicaStatus struct { state protoimpl.MessageState sizeCache protoimpl.SizeCache unknownFields protoimpl.UnknownFields // Output only. The canonical ID of the replica location. // For example: `"us-east1"`. Location string `protobuf:"bytes,1,opt,name=location,proto3" json:"location,omitempty"` // Output only. The customer-managed encryption status of the // [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]. Only // populated if customer-managed encryption is used. CustomerManagedEncryption *CustomerManagedEncryptionStatus `protobuf:"bytes,2,opt,name=customer_managed_encryption,json=customerManagedEncryption,proto3" json:"customer_managed_encryption,omitempty"` } func (x *ReplicationStatus_UserManagedStatus_ReplicaStatus) Reset() { *x = ReplicationStatus_UserManagedStatus_ReplicaStatus{} if protoimpl.UnsafeEnabled { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[17] ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) ms.StoreMessageInfo(mi) } } func (x *ReplicationStatus_UserManagedStatus_ReplicaStatus) String() string { return protoimpl.X.MessageStringOf(x) } func (*ReplicationStatus_UserManagedStatus_ReplicaStatus) ProtoMessage() {} func (x *ReplicationStatus_UserManagedStatus_ReplicaStatus) ProtoReflect() protoreflect.Message { mi := &file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[17] if protoimpl.UnsafeEnabled && x != nil { ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) if ms.LoadMessageInfo() == nil { ms.StoreMessageInfo(mi) } return ms } return mi.MessageOf(x) } // Deprecated: Use ReplicationStatus_UserManagedStatus_ReplicaStatus.ProtoReflect.Descriptor instead. func (*ReplicationStatus_UserManagedStatus_ReplicaStatus) Descriptor() ([]byte, []int) { return file_google_cloud_secretmanager_v1beta2_resources_proto_rawDescGZIP(), []int{4, 1, 0} } func (x *ReplicationStatus_UserManagedStatus_ReplicaStatus) GetLocation() string { if x != nil { return x.Location } return "" } func (x *ReplicationStatus_UserManagedStatus_ReplicaStatus) GetCustomerManagedEncryption() *CustomerManagedEncryptionStatus { if x != nil { return x.CustomerManagedEncryption } return nil } var File_google_cloud_secretmanager_v1beta2_resources_proto protoreflect.FileDescriptor var file_google_cloud_secretmanager_v1beta2_resources_proto_rawDesc = []byte{ 0x0a, 0x32, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2f, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2f, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2f, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x2f, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x12, 0x22, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x1a, 0x1f, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x5f, 0x62, 0x65, 0x68, 0x61, 0x76, 0x69, 0x6f, 0x72, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x19, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x1e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2f, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2f, 0x64, 0x75, 0x72, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x1f, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2f, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2f, 0x74, 0x69, 0x6d, 0x65, 0x73, 0x74, 0x61, 0x6d, 0x70, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x22, 0xc5, 0x0a, 0x0a, 0x06, 0x53, 0x65, 0x63, 0x72, 0x65, 0x74, 0x12, 0x17, 0x0a, 0x04, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x42, 0x03, 0xe0, 0x41, 0x03, 0x52, 0x04, 0x6e, 0x61, 0x6d, 0x65, 0x12, 0x59, 0x0a, 0x0b, 0x72, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x2f, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x2e, 0x52, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x42, 0x06, 0xe0, 0x41, 0x05, 0xe0, 0x41, 0x01, 0x52, 0x0b, 0x72, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x12, 0x40, 0x0a, 0x0b, 0x63, 0x72, 0x65, 0x61, 0x74, 0x65, 0x5f, 0x74, 0x69, 0x6d, 0x65, 0x18, 0x03, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x54, 0x69, 0x6d, 0x65, 0x73, 0x74, 0x61, 0x6d, 0x70, 0x42, 0x03, 0xe0, 0x41, 0x03, 0x52, 0x0a, 0x63, 0x72, 0x65, 0x61, 0x74, 0x65, 0x54, 0x69, 0x6d, 0x65, 0x12, 0x4e, 0x0a, 0x06, 0x6c, 0x61, 0x62, 0x65, 0x6c, 0x73, 0x18, 0x04, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x36, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x2e, 0x53, 0x65, 0x63, 0x72, 0x65, 0x74, 0x2e, 0x4c, 0x61, 0x62, 0x65, 0x6c, 0x73, 0x45, 0x6e, 0x74, 0x72, 0x79, 0x52, 0x06, 0x6c, 0x61, 0x62, 0x65, 0x6c, 0x73, 0x12, 0x46, 0x0a, 0x06, 0x74, 0x6f, 0x70, 0x69, 0x63, 0x73, 0x18, 0x05, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x29, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x2e, 0x54, 0x6f, 0x70, 0x69, 0x63, 0x42, 0x03, 0xe0, 0x41, 0x01, 0x52, 0x06, 0x74, 0x6f, 0x70, 0x69, 0x63, 0x73, 0x12, 0x42, 0x0a, 0x0b, 0x65, 0x78, 0x70, 0x69, 0x72, 0x65, 0x5f, 0x74, 0x69, 0x6d, 0x65, 0x18, 0x06, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x54, 0x69, 0x6d, 0x65, 0x73, 0x74, 0x61, 0x6d, 0x70, 0x42, 0x03, 0xe0, 0x41, 0x01, 0x48, 0x00, 0x52, 0x0a, 0x65, 0x78, 0x70, 0x69, 0x72, 0x65, 0x54, 0x69, 0x6d, 0x65, 0x12, 0x32, 0x0a, 0x03, 0x74, 0x74, 0x6c, 0x18, 0x07, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x19, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x44, 0x75, 0x72, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x42, 0x03, 0xe0, 0x41, 0x04, 0x48, 0x00, 0x52, 0x03, 0x74, 0x74, 0x6c, 0x12, 0x17, 0x0a, 0x04, 0x65, 0x74, 0x61, 0x67, 0x18, 0x08, 0x20, 0x01, 0x28, 0x09, 0x42, 0x03, 0xe0, 0x41, 0x01, 0x52, 0x04, 0x65, 0x74, 0x61, 0x67, 0x12, 0x4d, 0x0a, 0x08, 0x72, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x18, 0x09, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x2c, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x2e, 0x52, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x42, 0x03, 0xe0, 0x41, 0x01, 0x52, 0x08, 0x72, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x12, 0x6c, 0x0a, 0x0f, 0x76, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x5f, 0x61, 0x6c, 0x69, 0x61, 0x73, 0x65, 0x73, 0x18, 0x0b, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x3e, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x2e, 0x53, 0x65, 0x63, 0x72, 0x65, 0x74, 0x2e, 0x56, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x41, 0x6c, 0x69, 0x61, 0x73, 0x65, 0x73, 0x45, 0x6e, 0x74, 0x72, 0x79, 0x42, 0x03, 0xe0, 0x41, 0x01, 0x52, 0x0e, 0x76, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x41, 0x6c, 0x69, 0x61, 0x73, 0x65, 0x73, 0x12, 0x62, 0x0a, 0x0b, 0x61, 0x6e, 0x6e, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x18, 0x0d, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x3b, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x2e, 0x53, 0x65, 0x63, 0x72, 0x65, 0x74, 0x2e, 0x41, 0x6e, 0x6e, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x45, 0x6e, 0x74, 0x72, 0x79, 0x42, 0x03, 0xe0, 0x41, 0x01, 0x52, 0x0b, 0x61, 0x6e, 0x6e, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x12, 0x4e, 0x0a, 0x13, 0x76, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x5f, 0x64, 0x65, 0x73, 0x74, 0x72, 0x6f, 0x79, 0x5f, 0x74, 0x74, 0x6c, 0x18, 0x0e, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x19, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x44, 0x75, 0x72, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x42, 0x03, 0xe0, 0x41, 0x01, 0x52, 0x11, 0x76, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x44, 0x65, 0x73, 0x74, 0x72, 0x6f, 0x79, 0x54, 0x74, 0x6c, 0x12, 0x82, 0x01, 0x0a, 0x1b, 0x63, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x65, 0x72, 0x5f, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x5f, 0x65, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x18, 0x0f, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x3d, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x2e, 0x43, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x65, 0x72, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x42, 0x03, 0xe0, 0x41, 0x01, 0x52, 0x19, 0x63, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x65, 0x72, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x1a, 0x39, 0x0a, 0x0b, 0x4c, 0x61, 0x62, 0x65, 0x6c, 0x73, 0x45, 0x6e, 0x74, 0x72, 0x79, 0x12, 0x10, 0x0a, 0x03, 0x6b, 0x65, 0x79, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x03, 0x6b, 0x65, 0x79, 0x12, 0x14, 0x0a, 0x05, 0x76, 0x61, 0x6c, 0x75, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x05, 0x76, 0x61, 0x6c, 0x75, 0x65, 0x3a, 0x02, 0x38, 0x01, 0x1a, 0x41, 0x0a, 0x13, 0x56, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x41, 0x6c, 0x69, 0x61, 0x73, 0x65, 0x73, 0x45, 0x6e, 0x74, 0x72, 0x79, 0x12, 0x10, 0x0a, 0x03, 0x6b, 0x65, 0x79, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x03, 0x6b, 0x65, 0x79, 0x12, 0x14, 0x0a, 0x05, 0x76, 0x61, 0x6c, 0x75, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x03, 0x52, 0x05, 0x76, 0x61, 0x6c, 0x75, 0x65, 0x3a, 0x02, 0x38, 0x01, 0x1a, 0x3e, 0x0a, 0x10, 0x41, 0x6e, 0x6e, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x45, 0x6e, 0x74, 0x72, 0x79, 0x12, 0x10, 0x0a, 0x03, 0x6b, 0x65, 0x79, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x03, 0x6b, 0x65, 0x79, 0x12, 0x14, 0x0a, 0x05, 0x76, 0x61, 0x6c, 0x75, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x05, 0x76, 0x61, 0x6c, 0x75, 0x65, 0x3a, 0x02, 0x38, 0x01, 0x3a, 0x99, 0x01, 0xea, 0x41, 0x95, 0x01, 0x0a, 0x23, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x61, 0x70, 0x69, 0x73, 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x53, 0x65, 0x63, 0x72, 0x65, 0x74, 0x12, 0x23, 0x70, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x73, 0x2f, 0x7b, 0x70, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x7d, 0x2f, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x73, 0x2f, 0x7b, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x7d, 0x12, 0x38, 0x70, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x73, 0x2f, 0x7b, 0x70, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x7d, 0x2f, 0x6c, 0x6f, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x2f, 0x7b, 0x6c, 0x6f, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x7d, 0x2f, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x73, 0x2f, 0x7b, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x7d, 0x2a, 0x07, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x73, 0x32, 0x06, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x42, 0x0c, 0x0a, 0x0a, 0x65, 0x78, 0x70, 0x69, 0x72, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x22, 0xe2, 0x07, 0x0a, 0x0d, 0x53, 0x65, 0x63, 0x72, 0x65, 0x74, 0x56, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x12, 0x17, 0x0a, 0x04, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x42, 0x03, 0xe0, 0x41, 0x03, 0x52, 0x04, 0x6e, 0x61, 0x6d, 0x65, 0x12, 0x40, 0x0a, 0x0b, 0x63, 0x72, 0x65, 0x61, 0x74, 0x65, 0x5f, 0x74, 0x69, 0x6d, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x54, 0x69, 0x6d, 0x65, 0x73, 0x74, 0x61, 0x6d, 0x70, 0x42, 0x03, 0xe0, 0x41, 0x03, 0x52, 0x0a, 0x63, 0x72, 0x65, 0x61, 0x74, 0x65, 0x54, 0x69, 0x6d, 0x65, 0x12, 0x42, 0x0a, 0x0c, 0x64, 0x65, 0x73, 0x74, 0x72, 0x6f, 0x79, 0x5f, 0x74, 0x69, 0x6d, 0x65, 0x18, 0x03, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x54, 0x69, 0x6d, 0x65, 0x73, 0x74, 0x61, 0x6d, 0x70, 0x42, 0x03, 0xe0, 0x41, 0x03, 0x52, 0x0b, 0x64, 0x65, 0x73, 0x74, 0x72, 0x6f, 0x79, 0x54, 0x69, 0x6d, 0x65, 0x12, 0x52, 0x0a, 0x05, 0x73, 0x74, 0x61, 0x74, 0x65, 0x18, 0x04, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x37, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x2e, 0x53, 0x65, 0x63, 0x72, 0x65, 0x74, 0x56, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x2e, 0x53, 0x74, 0x61, 0x74, 0x65, 0x42, 0x03, 0xe0, 0x41, 0x03, 0x52, 0x05, 0x73, 0x74, 0x61, 0x74, 0x65, 0x12, 0x64, 0x0a, 0x12, 0x72, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x5f, 0x73, 0x74, 0x61, 0x74, 0x75, 0x73, 0x18, 0x05, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x35, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x2e, 0x52, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x53, 0x74, 0x61, 0x74, 0x75, 0x73, 0x52, 0x11, 0x72, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x53, 0x74, 0x61, 0x74, 0x75, 0x73, 0x12, 0x17, 0x0a, 0x04, 0x65, 0x74, 0x61, 0x67, 0x18, 0x06, 0x20, 0x01, 0x28, 0x09, 0x42, 0x03, 0xe0, 0x41, 0x03, 0x52, 0x04, 0x65, 0x74, 0x61, 0x67, 0x12, 0x4e, 0x0a, 0x21, 0x63, 0x6c, 0x69, 0x65, 0x6e, 0x74, 0x5f, 0x73, 0x70, 0x65, 0x63, 0x69, 0x66, 0x69, 0x65, 0x64, 0x5f, 0x70, 0x61, 0x79, 0x6c, 0x6f, 0x61, 0x64, 0x5f, 0x63, 0x68, 0x65, 0x63, 0x6b, 0x73, 0x75, 0x6d, 0x18, 0x07, 0x20, 0x01, 0x28, 0x08, 0x42, 0x03, 0xe0, 0x41, 0x03, 0x52, 0x1e, 0x63, 0x6c, 0x69, 0x65, 0x6e, 0x74, 0x53, 0x70, 0x65, 0x63, 0x69, 0x66, 0x69, 0x65, 0x64, 0x50, 0x61, 0x79, 0x6c, 0x6f, 0x61, 0x64, 0x43, 0x68, 0x65, 0x63, 0x6b, 0x73, 0x75, 0x6d, 0x12, 0x55, 0x0a, 0x16, 0x73, 0x63, 0x68, 0x65, 0x64, 0x75, 0x6c, 0x65, 0x64, 0x5f, 0x64, 0x65, 0x73, 0x74, 0x72, 0x6f, 0x79, 0x5f, 0x74, 0x69, 0x6d, 0x65, 0x18, 0x08, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x54, 0x69, 0x6d, 0x65, 0x73, 0x74, 0x61, 0x6d, 0x70, 0x42, 0x03, 0xe0, 0x41, 0x03, 0x52, 0x14, 0x73, 0x63, 0x68, 0x65, 0x64, 0x75, 0x6c, 0x65, 0x64, 0x44, 0x65, 0x73, 0x74, 0x72, 0x6f, 0x79, 0x54, 0x69, 0x6d, 0x65, 0x12, 0x88, 0x01, 0x0a, 0x1b, 0x63, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x65, 0x72, 0x5f, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x5f, 0x65, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x18, 0x09, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x43, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x2e, 0x43, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x65, 0x72, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x53, 0x74, 0x61, 0x74, 0x75, 0x73, 0x42, 0x03, 0xe0, 0x41, 0x03, 0x52, 0x19, 0x63, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x65, 0x72, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x22, 0x48, 0x0a, 0x05, 0x53, 0x74, 0x61, 0x74, 0x65, 0x12, 0x15, 0x0a, 0x11, 0x53, 0x54, 0x41, 0x54, 0x45, 0x5f, 0x55, 0x4e, 0x53, 0x50, 0x45, 0x43, 0x49, 0x46, 0x49, 0x45, 0x44, 0x10, 0x00, 0x12, 0x0b, 0x0a, 0x07, 0x45, 0x4e, 0x41, 0x42, 0x4c, 0x45, 0x44, 0x10, 0x01, 0x12, 0x0c, 0x0a, 0x08, 0x44, 0x49, 0x53, 0x41, 0x42, 0x4c, 0x45, 0x44, 0x10, 0x02, 0x12, 0x0d, 0x0a, 0x09, 0x44, 0x45, 0x53, 0x54, 0x52, 0x4f, 0x59, 0x45, 0x44, 0x10, 0x03, 0x3a, 0xe2, 0x01, 0xea, 0x41, 0xde, 0x01, 0x0a, 0x2a, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x61, 0x70, 0x69, 0x73, 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x53, 0x65, 0x63, 0x72, 0x65, 0x74, 0x56, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x12, 0x3d, 0x70, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x73, 0x2f, 0x7b, 0x70, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x7d, 0x2f, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x73, 0x2f, 0x7b, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x7d, 0x2f, 0x76, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x2f, 0x7b, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x5f, 0x76, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x7d, 0x12, 0x52, 0x70, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x73, 0x2f, 0x7b, 0x70, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x7d, 0x2f, 0x6c, 0x6f, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x2f, 0x7b, 0x6c, 0x6f, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x7d, 0x2f, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x73, 0x2f, 0x7b, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x7d, 0x2f, 0x76, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x2f, 0x7b, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x5f, 0x76, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x7d, 0x2a, 0x0e, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x56, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x32, 0x0d, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x56, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x22, 0x8f, 0x05, 0x0a, 0x0b, 0x52, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x12, 0x59, 0x0a, 0x09, 0x61, 0x75, 0x74, 0x6f, 0x6d, 0x61, 0x74, 0x69, 0x63, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x39, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x2e, 0x52, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x2e, 0x41, 0x75, 0x74, 0x6f, 0x6d, 0x61, 0x74, 0x69, 0x63, 0x48, 0x00, 0x52, 0x09, 0x61, 0x75, 0x74, 0x6f, 0x6d, 0x61, 0x74, 0x69, 0x63, 0x12, 0x60, 0x0a, 0x0c, 0x75, 0x73, 0x65, 0x72, 0x5f, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x3b, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x2e, 0x52, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x2e, 0x55, 0x73, 0x65, 0x72, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x48, 0x00, 0x52, 0x0b, 0x75, 0x73, 0x65, 0x72, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x1a, 0x90, 0x01, 0x0a, 0x09, 0x41, 0x75, 0x74, 0x6f, 0x6d, 0x61, 0x74, 0x69, 0x63, 0x12, 0x82, 0x01, 0x0a, 0x1b, 0x63, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x65, 0x72, 0x5f, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x5f, 0x65, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x3d, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x2e, 0x43, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x65, 0x72, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x42, 0x03, 0xe0, 0x41, 0x01, 0x52, 0x19, 0x63, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x65, 0x72, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x1a, 0xa0, 0x02, 0x0a, 0x0b, 0x55, 0x73, 0x65, 0x72, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x12, 0x64, 0x0a, 0x08, 0x72, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x73, 0x18, 0x01, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x43, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x2e, 0x52, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x2e, 0x55, 0x73, 0x65, 0x72, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x2e, 0x52, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x42, 0x03, 0xe0, 0x41, 0x02, 0x52, 0x08, 0x72, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x73, 0x1a, 0xaa, 0x01, 0x0a, 0x07, 0x52, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x12, 0x1a, 0x0a, 0x08, 0x6c, 0x6f, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x08, 0x6c, 0x6f, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x12, 0x82, 0x01, 0x0a, 0x1b, 0x63, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x65, 0x72, 0x5f, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x5f, 0x65, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x3d, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x2e, 0x43, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x65, 0x72, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x42, 0x03, 0xe0, 0x41, 0x01, 0x52, 0x19, 0x63, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x65, 0x72, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x42, 0x0d, 0x0a, 0x0b, 0x72, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x22, 0x42, 0x0a, 0x19, 0x43, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x65, 0x72, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x12, 0x25, 0x0a, 0x0c, 0x6b, 0x6d, 0x73, 0x5f, 0x6b, 0x65, 0x79, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x42, 0x03, 0xe0, 0x41, 0x02, 0x52, 0x0a, 0x6b, 0x6d, 0x73, 0x4b, 0x65, 0x79, 0x4e, 0x61, 0x6d, 0x65, 0x22, 0xe9, 0x05, 0x0a, 0x11, 0x52, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x53, 0x74, 0x61, 0x74, 0x75, 0x73, 0x12, 0x65, 0x0a, 0x09, 0x61, 0x75, 0x74, 0x6f, 0x6d, 0x61, 0x74, 0x69, 0x63, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x45, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x2e, 0x52, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x53, 0x74, 0x61, 0x74, 0x75, 0x73, 0x2e, 0x41, 0x75, 0x74, 0x6f, 0x6d, 0x61, 0x74, 0x69, 0x63, 0x53, 0x74, 0x61, 0x74, 0x75, 0x73, 0x48, 0x00, 0x52, 0x09, 0x61, 0x75, 0x74, 0x6f, 0x6d, 0x61, 0x74, 0x69, 0x63, 0x12, 0x6c, 0x0a, 0x0c, 0x75, 0x73, 0x65, 0x72, 0x5f, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x47, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x2e, 0x52, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x53, 0x74, 0x61, 0x74, 0x75, 0x73, 0x2e, 0x55, 0x73, 0x65, 0x72, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x53, 0x74, 0x61, 0x74, 0x75, 0x73, 0x48, 0x00, 0x52, 0x0b, 0x75, 0x73, 0x65, 0x72, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x1a, 0x9c, 0x01, 0x0a, 0x0f, 0x41, 0x75, 0x74, 0x6f, 0x6d, 0x61, 0x74, 0x69, 0x63, 0x53, 0x74, 0x61, 0x74, 0x75, 0x73, 0x12, 0x88, 0x01, 0x0a, 0x1b, 0x63, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x65, 0x72, 0x5f, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x5f, 0x65, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x43, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x2e, 0x43, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x65, 0x72, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x53, 0x74, 0x61, 0x74, 0x75, 0x73, 0x42, 0x03, 0xe0, 0x41, 0x03, 0x52, 0x19, 0x63, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x65, 0x72, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x1a, 0xc9, 0x02, 0x0a, 0x11, 0x55, 0x73, 0x65, 0x72, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x53, 0x74, 0x61, 0x74, 0x75, 0x73, 0x12, 0x76, 0x0a, 0x08, 0x72, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x73, 0x18, 0x01, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x55, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x2e, 0x52, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x53, 0x74, 0x61, 0x74, 0x75, 0x73, 0x2e, 0x55, 0x73, 0x65, 0x72, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x53, 0x74, 0x61, 0x74, 0x75, 0x73, 0x2e, 0x52, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x53, 0x74, 0x61, 0x74, 0x75, 0x73, 0x42, 0x03, 0xe0, 0x41, 0x03, 0x52, 0x08, 0x72, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x73, 0x1a, 0xbb, 0x01, 0x0a, 0x0d, 0x52, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x53, 0x74, 0x61, 0x74, 0x75, 0x73, 0x12, 0x1f, 0x0a, 0x08, 0x6c, 0x6f, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x42, 0x03, 0xe0, 0x41, 0x03, 0x52, 0x08, 0x6c, 0x6f, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x12, 0x88, 0x01, 0x0a, 0x1b, 0x63, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x65, 0x72, 0x5f, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x5f, 0x65, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x43, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x2e, 0x43, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x65, 0x72, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x53, 0x74, 0x61, 0x74, 0x75, 0x73, 0x42, 0x03, 0xe0, 0x41, 0x03, 0x52, 0x19, 0x63, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x65, 0x72, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x42, 0x14, 0x0a, 0x12, 0x72, 0x65, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x5f, 0x73, 0x74, 0x61, 0x74, 0x75, 0x73, 0x22, 0x57, 0x0a, 0x1f, 0x43, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x65, 0x72, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x64, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x53, 0x74, 0x61, 0x74, 0x75, 0x73, 0x12, 0x34, 0x0a, 0x14, 0x6b, 0x6d, 0x73, 0x5f, 0x6b, 0x65, 0x79, 0x5f, 0x76, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x42, 0x03, 0xe0, 0x41, 0x02, 0x52, 0x11, 0x6b, 0x6d, 0x73, 0x4b, 0x65, 0x79, 0x56, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x4e, 0x61, 0x6d, 0x65, 0x22, 0x65, 0x0a, 0x05, 0x54, 0x6f, 0x70, 0x69, 0x63, 0x12, 0x17, 0x0a, 0x04, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x42, 0x03, 0xe0, 0x41, 0x02, 0x52, 0x04, 0x6e, 0x61, 0x6d, 0x65, 0x3a, 0x43, 0xea, 0x41, 0x40, 0x0a, 0x1b, 0x70, 0x75, 0x62, 0x73, 0x75, 0x62, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x61, 0x70, 0x69, 0x73, 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x54, 0x6f, 0x70, 0x69, 0x63, 0x12, 0x21, 0x70, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x73, 0x2f, 0x7b, 0x70, 0x72, 0x6f, 0x6a, 0x65, 0x63, 0x74, 0x7d, 0x2f, 0x74, 0x6f, 0x70, 0x69, 0x63, 0x73, 0x2f, 0x7b, 0x74, 0x6f, 0x70, 0x69, 0x63, 0x7d, 0x22, 0xa2, 0x01, 0x0a, 0x08, 0x52, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x12, 0x4d, 0x0a, 0x12, 0x6e, 0x65, 0x78, 0x74, 0x5f, 0x72, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x5f, 0x74, 0x69, 0x6d, 0x65, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x54, 0x69, 0x6d, 0x65, 0x73, 0x74, 0x61, 0x6d, 0x70, 0x42, 0x03, 0xe0, 0x41, 0x01, 0x52, 0x10, 0x6e, 0x65, 0x78, 0x74, 0x52, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x54, 0x69, 0x6d, 0x65, 0x12, 0x47, 0x0a, 0x0f, 0x72, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x5f, 0x70, 0x65, 0x72, 0x69, 0x6f, 0x64, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x19, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x44, 0x75, 0x72, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x42, 0x03, 0xe0, 0x41, 0x04, 0x52, 0x0e, 0x72, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x50, 0x65, 0x72, 0x69, 0x6f, 0x64, 0x22, 0x5e, 0x0a, 0x0d, 0x53, 0x65, 0x63, 0x72, 0x65, 0x74, 0x50, 0x61, 0x79, 0x6c, 0x6f, 0x61, 0x64, 0x12, 0x12, 0x0a, 0x04, 0x64, 0x61, 0x74, 0x61, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x04, 0x64, 0x61, 0x74, 0x61, 0x12, 0x29, 0x0a, 0x0b, 0x64, 0x61, 0x74, 0x61, 0x5f, 0x63, 0x72, 0x63, 0x33, 0x32, 0x63, 0x18, 0x02, 0x20, 0x01, 0x28, 0x03, 0x42, 0x03, 0xe0, 0x41, 0x01, 0x48, 0x00, 0x52, 0x0a, 0x64, 0x61, 0x74, 0x61, 0x43, 0x72, 0x63, 0x33, 0x32, 0x63, 0x88, 0x01, 0x01, 0x42, 0x0e, 0x0a, 0x0c, 0x5f, 0x64, 0x61, 0x74, 0x61, 0x5f, 0x63, 0x72, 0x63, 0x33, 0x32, 0x63, 0x42, 0x83, 0x02, 0x0a, 0x26, 0x63, 0x6f, 0x6d, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x42, 0x0e, 0x52, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x50, 0x72, 0x6f, 0x74, 0x6f, 0x50, 0x01, 0x5a, 0x4c, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x67, 0x6f, 0x2f, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2f, 0x61, 0x70, 0x69, 0x76, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x2f, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x70, 0x62, 0x3b, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x70, 0x62, 0xf8, 0x01, 0x01, 0xa2, 0x02, 0x03, 0x47, 0x53, 0x4d, 0xaa, 0x02, 0x22, 0x47, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x43, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x53, 0x65, 0x63, 0x72, 0x65, 0x74, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x2e, 0x56, 0x31, 0x42, 0x65, 0x74, 0x61, 0x32, 0xca, 0x02, 0x22, 0x47, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x5c, 0x43, 0x6c, 0x6f, 0x75, 0x64, 0x5c, 0x53, 0x65, 0x63, 0x72, 0x65, 0x74, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x5c, 0x56, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0xea, 0x02, 0x25, 0x47, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x3a, 0x3a, 0x43, 0x6c, 0x6f, 0x75, 0x64, 0x3a, 0x3a, 0x53, 0x65, 0x63, 0x72, 0x65, 0x74, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x72, 0x3a, 0x3a, 0x56, 0x31, 0x62, 0x65, 0x74, 0x61, 0x32, 0x62, 0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x33, } var ( file_google_cloud_secretmanager_v1beta2_resources_proto_rawDescOnce sync.Once file_google_cloud_secretmanager_v1beta2_resources_proto_rawDescData = file_google_cloud_secretmanager_v1beta2_resources_proto_rawDesc ) func file_google_cloud_secretmanager_v1beta2_resources_proto_rawDescGZIP() []byte { file_google_cloud_secretmanager_v1beta2_resources_proto_rawDescOnce.Do(func() { file_google_cloud_secretmanager_v1beta2_resources_proto_rawDescData = protoimpl.X.CompressGZIP(file_google_cloud_secretmanager_v1beta2_resources_proto_rawDescData) }) return file_google_cloud_secretmanager_v1beta2_resources_proto_rawDescData } var file_google_cloud_secretmanager_v1beta2_resources_proto_enumTypes = make([]protoimpl.EnumInfo, 1) var file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes = make([]protoimpl.MessageInfo, 18) var file_google_cloud_secretmanager_v1beta2_resources_proto_goTypes = []interface{}{ (SecretVersion_State)(0), // 0: google.cloud.secretmanager.v1beta2.SecretVersion.State (*Secret)(nil), // 1: google.cloud.secretmanager.v1beta2.Secret (*SecretVersion)(nil), // 2: google.cloud.secretmanager.v1beta2.SecretVersion (*Replication)(nil), // 3: google.cloud.secretmanager.v1beta2.Replication (*CustomerManagedEncryption)(nil), // 4: google.cloud.secretmanager.v1beta2.CustomerManagedEncryption (*ReplicationStatus)(nil), // 5: google.cloud.secretmanager.v1beta2.ReplicationStatus (*CustomerManagedEncryptionStatus)(nil), // 6: google.cloud.secretmanager.v1beta2.CustomerManagedEncryptionStatus (*Topic)(nil), // 7: google.cloud.secretmanager.v1beta2.Topic (*Rotation)(nil), // 8: google.cloud.secretmanager.v1beta2.Rotation (*SecretPayload)(nil), // 9: google.cloud.secretmanager.v1beta2.SecretPayload nil, // 10: google.cloud.secretmanager.v1beta2.Secret.LabelsEntry nil, // 11: google.cloud.secretmanager.v1beta2.Secret.VersionAliasesEntry nil, // 12: google.cloud.secretmanager.v1beta2.Secret.AnnotationsEntry (*Replication_Automatic)(nil), // 13: google.cloud.secretmanager.v1beta2.Replication.Automatic (*Replication_UserManaged)(nil), // 14: google.cloud.secretmanager.v1beta2.Replication.UserManaged (*Replication_UserManaged_Replica)(nil), // 15: google.cloud.secretmanager.v1beta2.Replication.UserManaged.Replica (*ReplicationStatus_AutomaticStatus)(nil), // 16: google.cloud.secretmanager.v1beta2.ReplicationStatus.AutomaticStatus (*ReplicationStatus_UserManagedStatus)(nil), // 17: google.cloud.secretmanager.v1beta2.ReplicationStatus.UserManagedStatus (*ReplicationStatus_UserManagedStatus_ReplicaStatus)(nil), // 18: google.cloud.secretmanager.v1beta2.ReplicationStatus.UserManagedStatus.ReplicaStatus (*timestamppb.Timestamp)(nil), // 19: google.protobuf.Timestamp (*durationpb.Duration)(nil), // 20: google.protobuf.Duration } var file_google_cloud_secretmanager_v1beta2_resources_proto_depIdxs = []int32{ 3, // 0: google.cloud.secretmanager.v1beta2.Secret.replication:type_name -> google.cloud.secretmanager.v1beta2.Replication 19, // 1: google.cloud.secretmanager.v1beta2.Secret.create_time:type_name -> google.protobuf.Timestamp 10, // 2: google.cloud.secretmanager.v1beta2.Secret.labels:type_name -> google.cloud.secretmanager.v1beta2.Secret.LabelsEntry 7, // 3: google.cloud.secretmanager.v1beta2.Secret.topics:type_name -> google.cloud.secretmanager.v1beta2.Topic 19, // 4: google.cloud.secretmanager.v1beta2.Secret.expire_time:type_name -> google.protobuf.Timestamp 20, // 5: google.cloud.secretmanager.v1beta2.Secret.ttl:type_name -> google.protobuf.Duration 8, // 6: google.cloud.secretmanager.v1beta2.Secret.rotation:type_name -> google.cloud.secretmanager.v1beta2.Rotation 11, // 7: google.cloud.secretmanager.v1beta2.Secret.version_aliases:type_name -> google.cloud.secretmanager.v1beta2.Secret.VersionAliasesEntry 12, // 8: google.cloud.secretmanager.v1beta2.Secret.annotations:type_name -> google.cloud.secretmanager.v1beta2.Secret.AnnotationsEntry 20, // 9: google.cloud.secretmanager.v1beta2.Secret.version_destroy_ttl:type_name -> google.protobuf.Duration 4, // 10: google.cloud.secretmanager.v1beta2.Secret.customer_managed_encryption:type_name -> google.cloud.secretmanager.v1beta2.CustomerManagedEncryption 19, // 11: google.cloud.secretmanager.v1beta2.SecretVersion.create_time:type_name -> google.protobuf.Timestamp 19, // 12: google.cloud.secretmanager.v1beta2.SecretVersion.destroy_time:type_name -> google.protobuf.Timestamp 0, // 13: google.cloud.secretmanager.v1beta2.SecretVersion.state:type_name -> google.cloud.secretmanager.v1beta2.SecretVersion.State 5, // 14: google.cloud.secretmanager.v1beta2.SecretVersion.replication_status:type_name -> google.cloud.secretmanager.v1beta2.ReplicationStatus 19, // 15: google.cloud.secretmanager.v1beta2.SecretVersion.scheduled_destroy_time:type_name -> google.protobuf.Timestamp 6, // 16: google.cloud.secretmanager.v1beta2.SecretVersion.customer_managed_encryption:type_name -> google.cloud.secretmanager.v1beta2.CustomerManagedEncryptionStatus 13, // 17: google.cloud.secretmanager.v1beta2.Replication.automatic:type_name -> google.cloud.secretmanager.v1beta2.Replication.Automatic 14, // 18: google.cloud.secretmanager.v1beta2.Replication.user_managed:type_name -> google.cloud.secretmanager.v1beta2.Replication.UserManaged 16, // 19: google.cloud.secretmanager.v1beta2.ReplicationStatus.automatic:type_name -> google.cloud.secretmanager.v1beta2.ReplicationStatus.AutomaticStatus 17, // 20: google.cloud.secretmanager.v1beta2.ReplicationStatus.user_managed:type_name -> google.cloud.secretmanager.v1beta2.ReplicationStatus.UserManagedStatus 19, // 21: google.cloud.secretmanager.v1beta2.Rotation.next_rotation_time:type_name -> google.protobuf.Timestamp 20, // 22: google.cloud.secretmanager.v1beta2.Rotation.rotation_period:type_name -> google.protobuf.Duration 4, // 23: google.cloud.secretmanager.v1beta2.Replication.Automatic.customer_managed_encryption:type_name -> google.cloud.secretmanager.v1beta2.CustomerManagedEncryption 15, // 24: google.cloud.secretmanager.v1beta2.Replication.UserManaged.replicas:type_name -> google.cloud.secretmanager.v1beta2.Replication.UserManaged.Replica 4, // 25: google.cloud.secretmanager.v1beta2.Replication.UserManaged.Replica.customer_managed_encryption:type_name -> google.cloud.secretmanager.v1beta2.CustomerManagedEncryption 6, // 26: google.cloud.secretmanager.v1beta2.ReplicationStatus.AutomaticStatus.customer_managed_encryption:type_name -> google.cloud.secretmanager.v1beta2.CustomerManagedEncryptionStatus 18, // 27: google.cloud.secretmanager.v1beta2.ReplicationStatus.UserManagedStatus.replicas:type_name -> google.cloud.secretmanager.v1beta2.ReplicationStatus.UserManagedStatus.ReplicaStatus 6, // 28: google.cloud.secretmanager.v1beta2.ReplicationStatus.UserManagedStatus.ReplicaStatus.customer_managed_encryption:type_name -> google.cloud.secretmanager.v1beta2.CustomerManagedEncryptionStatus 29, // [29:29] is the sub-list for method output_type 29, // [29:29] is the sub-list for method input_type 29, // [29:29] is the sub-list for extension type_name 29, // [29:29] is the sub-list for extension extendee 0, // [0:29] is the sub-list for field type_name } func init() { file_google_cloud_secretmanager_v1beta2_resources_proto_init() } func file_google_cloud_secretmanager_v1beta2_resources_proto_init() { if File_google_cloud_secretmanager_v1beta2_resources_proto != nil { return } if !protoimpl.UnsafeEnabled { file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[0].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*Secret); i { case 0: return &v.state case 1: return &v.sizeCache case 2: return &v.unknownFields default: return nil } } file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[1].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*SecretVersion); i { case 0: return &v.state case 1: return &v.sizeCache case 2: return &v.unknownFields default: return nil } } file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[2].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*Replication); i { case 0: return &v.state case 1: return &v.sizeCache case 2: return &v.unknownFields default: return nil } } file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[3].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CustomerManagedEncryption); i { case 0: return &v.state case 1: return &v.sizeCache case 2: return &v.unknownFields default: return nil } } file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[4].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ReplicationStatus); i { case 0: return &v.state case 1: return &v.sizeCache case 2: return &v.unknownFields default: return nil } } file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[5].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*CustomerManagedEncryptionStatus); i { case 0: return &v.state case 1: return &v.sizeCache case 2: return &v.unknownFields default: return nil } } file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[6].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*Topic); i { case 0: return &v.state case 1: return &v.sizeCache case 2: return &v.unknownFields default: return nil } } file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[7].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*Rotation); i { case 0: return &v.state case 1: return &v.sizeCache case 2: return &v.unknownFields default: return nil } } file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[8].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*SecretPayload); i { case 0: return &v.state case 1: return &v.sizeCache case 2: return &v.unknownFields default: return nil } } file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[12].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*Replication_Automatic); i { case 0: return &v.state case 1: return &v.sizeCache case 2: return &v.unknownFields default: return nil } } file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[13].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*Replication_UserManaged); i { case 0: return &v.state case 1: return &v.sizeCache case 2: return &v.unknownFields default: return nil } } file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[14].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*Replication_UserManaged_Replica); i { case 0: return &v.state case 1: return &v.sizeCache case 2: return &v.unknownFields default: return nil } } file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[15].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ReplicationStatus_AutomaticStatus); i { case 0: return &v.state case 1: return &v.sizeCache case 2: return &v.unknownFields default: return nil } } file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[16].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ReplicationStatus_UserManagedStatus); i { case 0: return &v.state case 1: return &v.sizeCache case 2: return &v.unknownFields default: return nil } } file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[17].Exporter = func(v interface{}, i int) interface{} { switch v := v.(*ReplicationStatus_UserManagedStatus_ReplicaStatus); i { case 0: return &v.state case 1: return &v.sizeCache case 2: return &v.unknownFields default: return nil } } } file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[0].OneofWrappers = []interface{}{ (*Secret_ExpireTime)(nil), (*Secret_Ttl)(nil), } file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[2].OneofWrappers = []interface{}{ (*Replication_Automatic_)(nil), (*Replication_UserManaged_)(nil), } file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[4].OneofWrappers = []interface{}{ (*ReplicationStatus_Automatic)(nil), (*ReplicationStatus_UserManaged)(nil), } file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes[8].OneofWrappers = []interface{}{} type x struct{} out := protoimpl.TypeBuilder{ File: protoimpl.DescBuilder{ GoPackagePath: reflect.TypeOf(x{}).PkgPath(), RawDescriptor: file_google_cloud_secretmanager_v1beta2_resources_proto_rawDesc, NumEnums: 1, NumMessages: 18, NumExtensions: 0, NumServices: 0, }, GoTypes: file_google_cloud_secretmanager_v1beta2_resources_proto_goTypes, DependencyIndexes: file_google_cloud_secretmanager_v1beta2_resources_proto_depIdxs, EnumInfos: file_google_cloud_secretmanager_v1beta2_resources_proto_enumTypes, MessageInfos: file_google_cloud_secretmanager_v1beta2_resources_proto_msgTypes, }.Build() File_google_cloud_secretmanager_v1beta2_resources_proto = out.File file_google_cloud_secretmanager_v1beta2_resources_proto_rawDesc = nil file_google_cloud_secretmanager_v1beta2_resources_proto_goTypes = nil file_google_cloud_secretmanager_v1beta2_resources_proto_depIdxs = nil }