Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package python-google-cloud-secret-manager 
for openSUSE:Factory checked in at 2025-10-17 20:14:31
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-google-cloud-secret-manager (Old)
 and      
/work/SRC/openSUSE:Factory/.python-google-cloud-secret-manager.new.18484 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "python-google-cloud-secret-manager"

Fri Oct 17 20:14:31 2025 rev:6 rq:1312040 version:2.25.0

Changes:
--------
--- 
/work/SRC/openSUSE:Factory/python-google-cloud-secret-manager/python-google-cloud-secret-manager.changes
    2025-04-25 22:21:15.676458411 +0200
+++ 
/work/SRC/openSUSE:Factory/.python-google-cloud-secret-manager.new.18484/python-google-cloud-secret-manager.changes
 2025-10-17 20:14:38.007848110 +0200
@@ -1,0 +2,11 @@
+Fri Oct 17 12:39:21 UTC 2025 - John Paul Adrian Glaubitz 
<[email protected]>
+
+- Update to 2.25.0
+  * Add support for Python 3.14 (4763aa7)
+  * Deprecate credentials_file argument (4763aa7)
+- from version 2.24.0
+  * [google-cloud-secret-manager] Update secret manager protos for
+    tags (#13976)
+- Update BuildRequires and Requires from setup.py
+
+-------------------------------------------------------------------

Old:
----
  google_cloud_secret_manager-2.23.3.tar.gz

New:
----
  google_cloud_secret_manager-2.25.0.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ python-google-cloud-secret-manager.spec ++++++
--- /var/tmp/diff_new_pack.JSk9vL/_old  2025-10-17 20:14:38.599873214 +0200
+++ /var/tmp/diff_new_pack.JSk9vL/_new  2025-10-17 20:14:38.603873384 +0200
@@ -18,18 +18,24 @@
 
 %{?sle15_python_module_pythons}
 Name:           python-google-cloud-secret-manager
-Version:        2.23.3
+Version:        2.25.0
 Release:        0
 Summary:        Google Cloud Secret Manager API client library
 License:        Apache-2.0
 URL:            
https://github.com/googleapis/google-cloud-python/tree/main/packages/google-cloud-secret-manager
 Source:         
https://files.pythonhosted.org/packages/source/g/google-cloud-secret-manager/google_cloud_secret_manager-%{version}.tar.gz
+BuildRequires:  %{python_module grpcio}
 BuildRequires:  %{python_module pip}
 BuildRequires:  %{python_module pytest-asyncio}
 BuildRequires:  %{python_module pytest}
 BuildRequires:  %{python_module wheel}
 BuildRequires:  fdupes
 BuildRequires:  python-rpm-macros
+%if %python_version_nodots < 314
+Requires:       python-grpcio >= 1.33.2
+%else
+Requires:       python-grpcio >= 1.75.1
+%endif
 Requires:       python-google-api-core >= 1.34.1
 Requires:       python-grpc-google-iam-v1 >= 0.14.0
 Requires:       python-proto-plus >= 1.25.0

++++++ google_cloud_secret_manager-2.23.3.tar.gz -> 
google_cloud_secret_manager-2.25.0.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/google_cloud_secret_manager-2.23.3/PKG-INFO 
new/google_cloud_secret_manager-2.25.0/PKG-INFO
--- old/google_cloud_secret_manager-2.23.3/PKG-INFO     2025-04-17 
21:01:16.877085700 +0200
+++ new/google_cloud_secret_manager-2.25.0/PKG-INFO     2025-10-14 
17:24:46.305964200 +0200
@@ -1,6 +1,6 @@
-Metadata-Version: 2.1
+Metadata-Version: 2.4
 Name: google-cloud-secret-manager
-Version: 2.23.3
+Version: 2.25.0
 Summary: Google Cloud Secret Manager API client library
 Home-page: 
https://github.com/googleapis/google-cloud-python/tree/main/packages/google-cloud-secret-manager
 Author: Google LLC
@@ -19,16 +19,30 @@
 Classifier: Programming Language :: Python :: 3.11
 Classifier: Programming Language :: Python :: 3.12
 Classifier: Programming Language :: Python :: 3.13
+Classifier: Programming Language :: Python :: 3.14
 Classifier: Operating System :: OS Independent
 Classifier: Topic :: Internet
 Requires-Python: >=3.7
 License-File: LICENSE
 Requires-Dist: 
google-api-core[grpc]!=2.0.*,!=2.1.*,!=2.10.*,!=2.2.*,!=2.3.*,!=2.4.*,!=2.5.*,!=2.6.*,!=2.7.*,!=2.8.*,!=2.9.*,<3.0.0,>=1.34.1
 Requires-Dist: google-auth!=2.24.0,!=2.25.0,<3.0.0,>=2.14.1
+Requires-Dist: grpcio<2.0.0,>=1.33.2
+Requires-Dist: grpcio<2.0.0,>=1.75.1; python_version >= "3.14"
 Requires-Dist: proto-plus<2.0.0,>=1.22.3
 Requires-Dist: proto-plus<2.0.0,>=1.25.0; python_version >= "3.13"
 Requires-Dist: 
protobuf!=4.21.0,!=4.21.1,!=4.21.2,!=4.21.3,!=4.21.4,!=4.21.5,<7.0.0,>=3.20.2
 Requires-Dist: grpc-google-iam-v1<1.0.0,>=0.14.0
+Dynamic: author
+Dynamic: author-email
+Dynamic: classifier
+Dynamic: description
+Dynamic: home-page
+Dynamic: license
+Dynamic: license-file
+Dynamic: platform
+Dynamic: requires-dist
+Dynamic: requires-python
+Dynamic: summary
 
 Python Client for Secret Manager
 ================================
@@ -93,7 +107,7 @@
 Our client libraries are compatible with all current `active`_ and 
`maintenance`_ versions of
 Python.
 
-Python >= 3.7
+Python >= 3.7, including 3.14
 
 .. _active: https://devguide.python.org/devcycle/#in-development-main-branch
 .. _maintenance: https://devguide.python.org/devcycle/#maintenance-branches
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/google_cloud_secret_manager-2.23.3/README.rst 
new/google_cloud_secret_manager-2.25.0/README.rst
--- old/google_cloud_secret_manager-2.23.3/README.rst   2025-04-17 
20:55:59.000000000 +0200
+++ new/google_cloud_secret_manager-2.25.0/README.rst   2025-10-14 
17:22:14.000000000 +0200
@@ -61,7 +61,7 @@
 Our client libraries are compatible with all current `active`_ and 
`maintenance`_ versions of
 Python.
 
-Python >= 3.7
+Python >= 3.7, including 3.14
 
 .. _active: https://devguide.python.org/devcycle/#in-development-main-branch
 .. _maintenance: https://devguide.python.org/devcycle/#maintenance-branches
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager/gapic_version.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager/gapic_version.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager/gapic_version.py
  2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager/gapic_version.py
  2025-10-14 17:22:15.000000000 +0200
@@ -13,4 +13,4 @@
 # See the License for the specific language governing permissions and
 # limitations under the License.
 #
-__version__ = "2.23.3"  # {x-release-please-version}
+__version__ = "2.25.0"  # {x-release-please-version}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/gapic_version.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/gapic_version.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/gapic_version.py
       2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/gapic_version.py
       2025-10-14 17:22:15.000000000 +0200
@@ -13,4 +13,4 @@
 # See the License for the specific language governing permissions and
 # limitations under the License.
 #
-__version__ = "2.23.3"  # {x-release-please-version}
+__version__ = "2.25.0"  # {x-release-please-version}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/async_client.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/async_client.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/async_client.py
        2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/async_client.py
        2025-10-14 17:22:13.000000000 +0200
@@ -35,6 +35,7 @@
 from google.api_core.client_options import ClientOptions
 from google.auth import credentials as ga_credentials  # type: ignore
 from google.oauth2 import service_account  # type: ignore
+import google.protobuf
 
 from google.cloud.secretmanager_v1 import gapic_version as package_version
 
@@ -73,8 +74,8 @@
     Manages secrets and operations using those secrets. Implements a
     REST model with the following objects:
 
-    -  [Secret][google.cloud.secretmanager.v1.Secret]
-    -  [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
+    - [Secret][google.cloud.secretmanager.v1.Secret]
+    - [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
     """
 
     _client: SecretManagerServiceClient
@@ -1875,19 +1876,19 @@
                    constraints based on attributes of the request, the
                    resource, or both. To learn which resources support
                    conditions in their IAM policies, see the [IAM
-                   documentation](\ 
https://cloud.google.com/iam/help/conditions/resource-policies).
+                   
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
 
                    **JSON example:**
 
-                   :literal:`\`     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
+                   :literal:``     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
 
                    **YAML example:**
 
-                   :literal:`\`     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
+                   :literal:``     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
 
                    For a description of IAM and its features, see the
                    [IAM
-                   documentation](\ https://cloud.google.com/iam/docs/).
+                   documentation](https://cloud.google.com/iam/docs/).
 
         """
         # Create or coerce a protobuf request object.
@@ -1993,19 +1994,19 @@
                    constraints based on attributes of the request, the
                    resource, or both. To learn which resources support
                    conditions in their IAM policies, see the [IAM
-                   documentation](\ 
https://cloud.google.com/iam/help/conditions/resource-policies).
+                   
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
 
                    **JSON example:**
 
-                   :literal:`\`     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
+                   :literal:``     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
 
                    **YAML example:**
 
-                   :literal:`\`     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
+                   :literal:``     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
 
                    For a description of IAM and its features, see the
                    [IAM
-                   documentation](\ https://cloud.google.com/iam/docs/).
+                   documentation](https://cloud.google.com/iam/docs/).
 
         """
         # Create or coerce a protobuf request object.
@@ -2257,5 +2258,8 @@
     gapic_version=package_version.__version__
 )
 
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"):  # pragma: NO 
COVER
+    DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
+
 
 __all__ = ("SecretManagerServiceAsyncClient",)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/client.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/client.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/client.py
      2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/client.py
      2025-10-14 17:22:13.000000000 +0200
@@ -43,6 +43,7 @@
 from google.auth.transport import mtls  # type: ignore
 from google.auth.transport.grpc import SslCredentials  # type: ignore
 from google.oauth2 import service_account  # type: ignore
+import google.protobuf
 
 from google.cloud.secretmanager_v1 import gapic_version as package_version
 
@@ -119,8 +120,8 @@
     Manages secrets and operations using those secrets. Implements a
     REST model with the following objects:
 
-    -  [Secret][google.cloud.secretmanager.v1.Secret]
-    -  [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
+    - [Secret][google.cloud.secretmanager.v1.Secret]
+    - [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
     """
 
     @staticmethod
@@ -2291,19 +2292,19 @@
                    constraints based on attributes of the request, the
                    resource, or both. To learn which resources support
                    conditions in their IAM policies, see the [IAM
-                   documentation](\ 
https://cloud.google.com/iam/help/conditions/resource-policies).
+                   
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
 
                    **JSON example:**
 
-                   :literal:`\`     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
+                   :literal:``     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
 
                    **YAML example:**
 
-                   :literal:`\`     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
+                   :literal:``     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
 
                    For a description of IAM and its features, see the
                    [IAM
-                   documentation](\ https://cloud.google.com/iam/docs/).
+                   documentation](https://cloud.google.com/iam/docs/).
 
         """
         # Create or coerce a protobuf request object.
@@ -2408,19 +2409,19 @@
                    constraints based on attributes of the request, the
                    resource, or both. To learn which resources support
                    conditions in their IAM policies, see the [IAM
-                   documentation](\ 
https://cloud.google.com/iam/help/conditions/resource-policies).
+                   
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
 
                    **JSON example:**
 
-                   :literal:`\`     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
+                   :literal:``     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
 
                    **YAML example:**
 
-                   :literal:`\`     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
+                   :literal:``     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
 
                    For a description of IAM and its features, see the
                    [IAM
-                   documentation](\ https://cloud.google.com/iam/docs/).
+                   documentation](https://cloud.google.com/iam/docs/).
 
         """
         # Create or coerce a protobuf request object.
@@ -2685,5 +2686,7 @@
     gapic_version=package_version.__version__
 )
 
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"):  # pragma: NO 
COVER
+    DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
 
 __all__ = ("SecretManagerServiceClient",)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/transports/base.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/transports/base.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/transports/base.py
     2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/transports/base.py
     2025-10-14 17:22:15.000000000 +0200
@@ -26,6 +26,7 @@
 from google.iam.v1 import iam_policy_pb2  # type: ignore
 from google.iam.v1 import policy_pb2  # type: ignore
 from google.oauth2 import service_account  # type: ignore
+import google.protobuf
 from google.protobuf import empty_pb2  # type: ignore
 
 from google.cloud.secretmanager_v1 import gapic_version as package_version
@@ -35,6 +36,9 @@
     gapic_version=package_version.__version__
 )
 
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"):  # pragma: NO 
COVER
+    DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
+
 
 class SecretManagerServiceTransport(abc.ABC):
     """Abstract transport class for SecretManagerService."""
@@ -66,9 +70,10 @@
                 credentials identify the application to the service; if none
                 are specified, the client will attempt to ascertain the
                 credentials from the environment.
-            credentials_file (Optional[str]): A file with credentials that can
+            credentials_file (Optional[str]): Deprecated. A file with 
credentials that can
                 be loaded with :func:`google.auth.load_credentials_from_file`.
-                This argument is mutually exclusive with credentials.
+                This argument is mutually exclusive with credentials. This 
argument will be
+                removed in the next major version of this library.
             scopes (Optional[Sequence[str]]): A list of scopes.
             quota_project_id (Optional[str]): An optional project to use for 
billing
                 and quota.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/transports/grpc.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/transports/grpc.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/transports/grpc.py
     2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/transports/grpc.py
     2025-10-14 17:22:14.000000000 +0200
@@ -119,8 +119,8 @@
     Manages secrets and operations using those secrets. Implements a
     REST model with the following objects:
 
-    -  [Secret][google.cloud.secretmanager.v1.Secret]
-    -  [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
+    - [Secret][google.cloud.secretmanager.v1.Secret]
+    - [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
 
     This class defines the same methods as the primary client, so the
     primary client can load the underlying transport implementation
@@ -160,9 +160,10 @@
                 are specified, the client will attempt to ascertain the
                 credentials from the environment.
                 This argument is ignored if a ``channel`` instance is provided.
-            credentials_file (Optional[str]): A file with credentials that can
+            credentials_file (Optional[str]): Deprecated. A file with 
credentials that can
                 be loaded with :func:`google.auth.load_credentials_from_file`.
                 This argument is ignored if a ``channel`` instance is provided.
+                This argument will be removed in the next major version of 
this library.
             scopes (Optional(Sequence[str])): A list of scopes. This argument 
is
                 ignored if a ``channel`` instance is provided.
             channel (Optional[Union[grpc.Channel, Callable[..., 
grpc.Channel]]]):
@@ -295,9 +296,10 @@
                 credentials identify this application to the service. If
                 none are specified, the client will attempt to ascertain
                 the credentials from the environment.
-            credentials_file (Optional[str]): A file with credentials that can
+            credentials_file (Optional[str]): Deprecated. A file with 
credentials that can
                 be loaded with :func:`google.auth.load_credentials_from_file`.
-                This argument is mutually exclusive with credentials.
+                This argument is mutually exclusive with credentials.  This 
argument will be
+                removed in the next major version of this library.
             scopes (Optional[Sequence[str]]): A optional list of scopes needed 
for this
                 service. These are only used when credentials are not 
specified and
                 are passed to :func:`google.auth.default`.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/transports/grpc_asyncio.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/transports/grpc_asyncio.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/transports/grpc_asyncio.py
     2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/transports/grpc_asyncio.py
     2025-10-14 17:22:16.000000000 +0200
@@ -125,8 +125,8 @@
     Manages secrets and operations using those secrets. Implements a
     REST model with the following objects:
 
-    -  [Secret][google.cloud.secretmanager.v1.Secret]
-    -  [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
+    - [Secret][google.cloud.secretmanager.v1.Secret]
+    - [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
 
     This class defines the same methods as the primary client, so the
     primary client can load the underlying transport implementation
@@ -157,8 +157,9 @@
                 credentials identify this application to the service. If
                 none are specified, the client will attempt to ascertain
                 the credentials from the environment.
-            credentials_file (Optional[str]): A file with credentials that can
-                be loaded with :func:`google.auth.load_credentials_from_file`.
+            credentials_file (Optional[str]): Deprecated. A file with 
credentials that can
+                be loaded with :func:`google.auth.load_credentials_from_file`. 
This argument will be
+                removed in the next major version of this library.
             scopes (Optional[Sequence[str]]): A optional list of scopes needed 
for this
                 service. These are only used when credentials are not 
specified and
                 are passed to :func:`google.auth.default`.
@@ -209,9 +210,10 @@
                 are specified, the client will attempt to ascertain the
                 credentials from the environment.
                 This argument is ignored if a ``channel`` instance is provided.
-            credentials_file (Optional[str]): A file with credentials that can
+            credentials_file (Optional[str]): Deprecated. A file with 
credentials that can
                 be loaded with :func:`google.auth.load_credentials_from_file`.
                 This argument is ignored if a ``channel`` instance is provided.
+                This argument will be removed in the next major version of 
this library.
             scopes (Optional[Sequence[str]]): A optional list of scopes needed 
for this
                 service. These are only used when credentials are not 
specified and
                 are passed to :func:`google.auth.default`.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/transports/rest.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/transports/rest.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/transports/rest.py
     2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/transports/rest.py
     2025-10-14 17:22:15.000000000 +0200
@@ -27,6 +27,7 @@
 from google.cloud.location import locations_pb2  # type: ignore
 from google.iam.v1 import iam_policy_pb2  # type: ignore
 from google.iam.v1 import policy_pb2  # type: ignore
+import google.protobuf
 from google.protobuf import empty_pb2  # type: ignore
 from google.protobuf import json_format
 from requests import __version__ as requests_version
@@ -56,6 +57,9 @@
     rest_version=f"requests@{requests_version}",
 )
 
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"):  # pragma: NO 
COVER
+    DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
+
 
 class SecretManagerServiceRestInterceptor:
     """Interceptor for SecretManagerService.
@@ -934,8 +938,8 @@
     Manages secrets and operations using those secrets. Implements a
     REST model with the following objects:
 
-    -  [Secret][google.cloud.secretmanager.v1.Secret]
-    -  [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
+    - [Secret][google.cloud.secretmanager.v1.Secret]
+    - [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
 
     This class defines the same methods as the primary client, so the
     primary client can load the underlying transport implementation
@@ -970,9 +974,10 @@
                 are specified, the client will attempt to ascertain the
                 credentials from the environment.
 
-            credentials_file (Optional[str]): A file with credentials that can
+            credentials_file (Optional[str]): Deprecated. A file with 
credentials that can
                 be loaded with :func:`google.auth.load_credentials_from_file`.
-                This argument is ignored if ``channel`` is provided.
+                This argument is ignored if ``channel`` is provided. This 
argument will be
+                removed in the next major version of this library.
             scopes (Optional(Sequence[str])): A list of scopes. This argument 
is
                 ignored if ``channel`` is provided.
             client_cert_source_for_mtls (Callable[[], Tuple[bytes, bytes]]): 
Client
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/types/resources.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/types/resources.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/types/resources.py
     2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/types/resources.py
     2025-10-14 17:22:16.000000000 +0200
@@ -111,7 +111,7 @@
 
             A version alias is a string with a maximum length of 63
             characters and can contain uppercase and lowercase letters,
-            numerals, and the hyphen (``-``) and underscore ('_')
+            numerals, and the hyphen (``-``) and underscore ('\_')
             characters. An alias string must start with a letter and
             cannot be the string 'latest' or 'NEW'. No more than 50
             aliases can be assigned to a given secret.
@@ -129,7 +129,7 @@
             Annotation keys must be between 1 and 63 characters long,
             have a UTF-8 encoding of maximum 128 bytes, begin and end
             with an alphanumeric character ([a-z0-9A-Z]), and may have
-            dashes (-), underscores (_), dots (.), and alphanumerics in
+            dashes (-), underscores (\_), dots (.), and alphanumerics in
             between these symbols.
 
             The total size of annotation keys and values must be less
@@ -155,6 +155,18 @@
             added afterwards. They do not apply retroactively to
             existing
             [SecretVersions][google.cloud.secretmanager.v1.SecretVersion].
+        tags (MutableMapping[str, str]):
+            Optional. Input only. Immutable. Mapping of
+            Tag keys/values directly bound to this resource.
+            For example:
+
+              "123/environment": "production",
+              "123/costCenter": "marketing"
+
+            Tags are used to organize and group resources.
+
+            Tags can be used to control policy evaluation
+            for the resource.
     """
 
     name: str = proto.Field(
@@ -222,6 +234,11 @@
         number=15,
         message="CustomerManagedEncryption",
     )
+    tags: MutableMapping[str, str] = proto.MapField(
+        proto.STRING,
+        proto.STRING,
+        number=16,
+    )
 
 
 class SecretVersion(proto.Message):
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/gapic_version.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/gapic_version.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/gapic_version.py
  2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/gapic_version.py
  2025-10-14 17:22:15.000000000 +0200
@@ -13,4 +13,4 @@
 # See the License for the specific language governing permissions and
 # limitations under the License.
 #
-__version__ = "2.23.3"  # {x-release-please-version}
+__version__ = "2.25.0"  # {x-release-please-version}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/async_client.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/async_client.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/async_client.py
   2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/async_client.py
   2025-10-14 17:22:16.000000000 +0200
@@ -35,6 +35,7 @@
 from google.api_core.client_options import ClientOptions
 from google.auth import credentials as ga_credentials  # type: ignore
 from google.oauth2 import service_account  # type: ignore
+import google.protobuf
 
 from google.cloud.secretmanager_v1beta1 import gapic_version as package_version
 
@@ -72,8 +73,8 @@
     Manages secrets and operations using those secrets. Implements a
     REST model with the following objects:
 
-    -  [Secret][google.cloud.secrets.v1beta1.Secret]
-    -  [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
+    - [Secret][google.cloud.secrets.v1beta1.Secret]
+    - [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
     """
 
     _client: SecretManagerServiceClient
@@ -1852,19 +1853,19 @@
                    constraints based on attributes of the request, the
                    resource, or both. To learn which resources support
                    conditions in their IAM policies, see the [IAM
-                   documentation](\ 
https://cloud.google.com/iam/help/conditions/resource-policies).
+                   
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
 
                    **JSON example:**
 
-                   :literal:`\`     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
+                   :literal:``     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
 
                    **YAML example:**
 
-                   :literal:`\`     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
+                   :literal:``     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
 
                    For a description of IAM and its features, see the
                    [IAM
-                   documentation](\ https://cloud.google.com/iam/docs/).
+                   documentation](https://cloud.google.com/iam/docs/).
 
         """
         # Create or coerce a protobuf request object.
@@ -1970,19 +1971,19 @@
                    constraints based on attributes of the request, the
                    resource, or both. To learn which resources support
                    conditions in their IAM policies, see the [IAM
-                   documentation](\ 
https://cloud.google.com/iam/help/conditions/resource-policies).
+                   
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
 
                    **JSON example:**
 
-                   :literal:`\`     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
+                   :literal:``     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
 
                    **YAML example:**
 
-                   :literal:`\`     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
+                   :literal:``     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
 
                    For a description of IAM and its features, see the
                    [IAM
-                   documentation](\ https://cloud.google.com/iam/docs/).
+                   documentation](https://cloud.google.com/iam/docs/).
 
         """
         # Create or coerce a protobuf request object.
@@ -2234,5 +2235,8 @@
     gapic_version=package_version.__version__
 )
 
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"):  # pragma: NO 
COVER
+    DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
+
 
 __all__ = ("SecretManagerServiceAsyncClient",)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/client.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/client.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/client.py
 2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/client.py
 2025-10-14 17:22:13.000000000 +0200
@@ -43,6 +43,7 @@
 from google.auth.transport import mtls  # type: ignore
 from google.auth.transport.grpc import SslCredentials  # type: ignore
 from google.oauth2 import service_account  # type: ignore
+import google.protobuf
 
 from google.cloud.secretmanager_v1beta1 import gapic_version as package_version
 
@@ -118,8 +119,8 @@
     Manages secrets and operations using those secrets. Implements a
     REST model with the following objects:
 
-    -  [Secret][google.cloud.secrets.v1beta1.Secret]
-    -  [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
+    - [Secret][google.cloud.secrets.v1beta1.Secret]
+    - [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
     """
 
     @staticmethod
@@ -2253,19 +2254,19 @@
                    constraints based on attributes of the request, the
                    resource, or both. To learn which resources support
                    conditions in their IAM policies, see the [IAM
-                   documentation](\ 
https://cloud.google.com/iam/help/conditions/resource-policies).
+                   
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
 
                    **JSON example:**
 
-                   :literal:`\`     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
+                   :literal:``     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
 
                    **YAML example:**
 
-                   :literal:`\`     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
+                   :literal:``     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
 
                    For a description of IAM and its features, see the
                    [IAM
-                   documentation](\ https://cloud.google.com/iam/docs/).
+                   documentation](https://cloud.google.com/iam/docs/).
 
         """
         # Create or coerce a protobuf request object.
@@ -2370,19 +2371,19 @@
                    constraints based on attributes of the request, the
                    resource, or both. To learn which resources support
                    conditions in their IAM policies, see the [IAM
-                   documentation](\ 
https://cloud.google.com/iam/help/conditions/resource-policies).
+                   
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
 
                    **JSON example:**
 
-                   :literal:`\`     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
+                   :literal:``     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
 
                    **YAML example:**
 
-                   :literal:`\`     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
+                   :literal:``     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
 
                    For a description of IAM and its features, see the
                    [IAM
-                   documentation](\ https://cloud.google.com/iam/docs/).
+                   documentation](https://cloud.google.com/iam/docs/).
 
         """
         # Create or coerce a protobuf request object.
@@ -2647,5 +2648,7 @@
     gapic_version=package_version.__version__
 )
 
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"):  # pragma: NO 
COVER
+    DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
 
 __all__ = ("SecretManagerServiceClient",)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/base.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/base.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/base.py
        2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/base.py
        2025-10-14 17:22:16.000000000 +0200
@@ -26,6 +26,7 @@
 from google.iam.v1 import iam_policy_pb2  # type: ignore
 from google.iam.v1 import policy_pb2  # type: ignore
 from google.oauth2 import service_account  # type: ignore
+import google.protobuf
 from google.protobuf import empty_pb2  # type: ignore
 
 from google.cloud.secretmanager_v1beta1 import gapic_version as package_version
@@ -35,6 +36,9 @@
     gapic_version=package_version.__version__
 )
 
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"):  # pragma: NO 
COVER
+    DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
+
 
 class SecretManagerServiceTransport(abc.ABC):
     """Abstract transport class for SecretManagerService."""
@@ -66,9 +70,10 @@
                 credentials identify the application to the service; if none
                 are specified, the client will attempt to ascertain the
                 credentials from the environment.
-            credentials_file (Optional[str]): A file with credentials that can
+            credentials_file (Optional[str]): Deprecated. A file with 
credentials that can
                 be loaded with :func:`google.auth.load_credentials_from_file`.
-                This argument is mutually exclusive with credentials.
+                This argument is mutually exclusive with credentials. This 
argument will be
+                removed in the next major version of this library.
             scopes (Optional[Sequence[str]]): A list of scopes.
             quota_project_id (Optional[str]): An optional project to use for 
billing
                 and quota.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/grpc.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/grpc.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/grpc.py
        2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/grpc.py
        2025-10-14 17:22:14.000000000 +0200
@@ -119,8 +119,8 @@
     Manages secrets and operations using those secrets. Implements a
     REST model with the following objects:
 
-    -  [Secret][google.cloud.secrets.v1beta1.Secret]
-    -  [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
+    - [Secret][google.cloud.secrets.v1beta1.Secret]
+    - [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
 
     This class defines the same methods as the primary client, so the
     primary client can load the underlying transport implementation
@@ -160,9 +160,10 @@
                 are specified, the client will attempt to ascertain the
                 credentials from the environment.
                 This argument is ignored if a ``channel`` instance is provided.
-            credentials_file (Optional[str]): A file with credentials that can
+            credentials_file (Optional[str]): Deprecated. A file with 
credentials that can
                 be loaded with :func:`google.auth.load_credentials_from_file`.
                 This argument is ignored if a ``channel`` instance is provided.
+                This argument will be removed in the next major version of 
this library.
             scopes (Optional(Sequence[str])): A list of scopes. This argument 
is
                 ignored if a ``channel`` instance is provided.
             channel (Optional[Union[grpc.Channel, Callable[..., 
grpc.Channel]]]):
@@ -295,9 +296,10 @@
                 credentials identify this application to the service. If
                 none are specified, the client will attempt to ascertain
                 the credentials from the environment.
-            credentials_file (Optional[str]): A file with credentials that can
+            credentials_file (Optional[str]): Deprecated. A file with 
credentials that can
                 be loaded with :func:`google.auth.load_credentials_from_file`.
-                This argument is mutually exclusive with credentials.
+                This argument is mutually exclusive with credentials.  This 
argument will be
+                removed in the next major version of this library.
             scopes (Optional[Sequence[str]]): A optional list of scopes needed 
for this
                 service. These are only used when credentials are not 
specified and
                 are passed to :func:`google.auth.default`.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/grpc_asyncio.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/grpc_asyncio.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/grpc_asyncio.py
        2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/grpc_asyncio.py
        2025-10-14 17:22:13.000000000 +0200
@@ -125,8 +125,8 @@
     Manages secrets and operations using those secrets. Implements a
     REST model with the following objects:
 
-    -  [Secret][google.cloud.secrets.v1beta1.Secret]
-    -  [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
+    - [Secret][google.cloud.secrets.v1beta1.Secret]
+    - [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
 
     This class defines the same methods as the primary client, so the
     primary client can load the underlying transport implementation
@@ -157,8 +157,9 @@
                 credentials identify this application to the service. If
                 none are specified, the client will attempt to ascertain
                 the credentials from the environment.
-            credentials_file (Optional[str]): A file with credentials that can
-                be loaded with :func:`google.auth.load_credentials_from_file`.
+            credentials_file (Optional[str]): Deprecated. A file with 
credentials that can
+                be loaded with :func:`google.auth.load_credentials_from_file`. 
This argument will be
+                removed in the next major version of this library.
             scopes (Optional[Sequence[str]]): A optional list of scopes needed 
for this
                 service. These are only used when credentials are not 
specified and
                 are passed to :func:`google.auth.default`.
@@ -209,9 +210,10 @@
                 are specified, the client will attempt to ascertain the
                 credentials from the environment.
                 This argument is ignored if a ``channel`` instance is provided.
-            credentials_file (Optional[str]): A file with credentials that can
+            credentials_file (Optional[str]): Deprecated. A file with 
credentials that can
                 be loaded with :func:`google.auth.load_credentials_from_file`.
                 This argument is ignored if a ``channel`` instance is provided.
+                This argument will be removed in the next major version of 
this library.
             scopes (Optional[Sequence[str]]): A optional list of scopes needed 
for this
                 service. These are only used when credentials are not 
specified and
                 are passed to :func:`google.auth.default`.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/rest.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/rest.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/rest.py
        2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/rest.py
        2025-10-14 17:22:15.000000000 +0200
@@ -27,6 +27,7 @@
 from google.cloud.location import locations_pb2  # type: ignore
 from google.iam.v1 import iam_policy_pb2  # type: ignore
 from google.iam.v1 import policy_pb2  # type: ignore
+import google.protobuf
 from google.protobuf import empty_pb2  # type: ignore
 from google.protobuf import json_format
 from requests import __version__ as requests_version
@@ -56,6 +57,9 @@
     rest_version=f"requests@{requests_version}",
 )
 
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"):  # pragma: NO 
COVER
+    DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
+
 
 class SecretManagerServiceRestInterceptor:
     """Interceptor for SecretManagerService.
@@ -934,8 +938,8 @@
     Manages secrets and operations using those secrets. Implements a
     REST model with the following objects:
 
-    -  [Secret][google.cloud.secrets.v1beta1.Secret]
-    -  [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
+    - [Secret][google.cloud.secrets.v1beta1.Secret]
+    - [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
 
     This class defines the same methods as the primary client, so the
     primary client can load the underlying transport implementation
@@ -970,9 +974,10 @@
                 are specified, the client will attempt to ascertain the
                 credentials from the environment.
 
-            credentials_file (Optional[str]): A file with credentials that can
+            credentials_file (Optional[str]): Deprecated. A file with 
credentials that can
                 be loaded with :func:`google.auth.load_credentials_from_file`.
-                This argument is ignored if ``channel`` is provided.
+                This argument is ignored if ``channel`` is provided. This 
argument will be
+                removed in the next major version of this library.
             scopes (Optional(Sequence[str])): A list of scopes. This argument 
is
                 ignored if ``channel`` is provided.
             client_cert_source_for_mtls (Callable[[], Tuple[bytes, bytes]]): 
Client
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/gapic_version.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/gapic_version.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/gapic_version.py
  2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/gapic_version.py
  2025-10-14 17:22:15.000000000 +0200
@@ -13,4 +13,4 @@
 # See the License for the specific language governing permissions and
 # limitations under the License.
 #
-__version__ = "2.23.3"  # {x-release-please-version}
+__version__ = "2.25.0"  # {x-release-please-version}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/async_client.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/async_client.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/async_client.py
   2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/async_client.py
   2025-10-14 17:22:16.000000000 +0200
@@ -35,6 +35,7 @@
 from google.api_core.client_options import ClientOptions
 from google.auth import credentials as ga_credentials  # type: ignore
 from google.oauth2 import service_account  # type: ignore
+import google.protobuf
 
 from google.cloud.secretmanager_v1beta2 import gapic_version as package_version
 
@@ -73,8 +74,8 @@
     Manages secrets and operations using those secrets. Implements a
     REST model with the following objects:
 
-    -  [Secret][google.cloud.secretmanager.v1beta2.Secret]
-    -  [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]
+    - [Secret][google.cloud.secretmanager.v1beta2.Secret]
+    - [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]
     """
 
     _client: SecretManagerServiceClient
@@ -1880,19 +1881,19 @@
                    constraints based on attributes of the request, the
                    resource, or both. To learn which resources support
                    conditions in their IAM policies, see the [IAM
-                   documentation](\ 
https://cloud.google.com/iam/help/conditions/resource-policies).
+                   
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
 
                    **JSON example:**
 
-                   :literal:`\`     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
+                   :literal:``     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
 
                    **YAML example:**
 
-                   :literal:`\`     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
+                   :literal:``     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
 
                    For a description of IAM and its features, see the
                    [IAM
-                   documentation](\ https://cloud.google.com/iam/docs/).
+                   documentation](https://cloud.google.com/iam/docs/).
 
         """
         # Create or coerce a protobuf request object.
@@ -1998,19 +1999,19 @@
                    constraints based on attributes of the request, the
                    resource, or both. To learn which resources support
                    conditions in their IAM policies, see the [IAM
-                   documentation](\ 
https://cloud.google.com/iam/help/conditions/resource-policies).
+                   
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
 
                    **JSON example:**
 
-                   :literal:`\`     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
+                   :literal:``     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
 
                    **YAML example:**
 
-                   :literal:`\`     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
+                   :literal:``     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
 
                    For a description of IAM and its features, see the
                    [IAM
-                   documentation](\ https://cloud.google.com/iam/docs/).
+                   documentation](https://cloud.google.com/iam/docs/).
 
         """
         # Create or coerce a protobuf request object.
@@ -2262,5 +2263,8 @@
     gapic_version=package_version.__version__
 )
 
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"):  # pragma: NO 
COVER
+    DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
+
 
 __all__ = ("SecretManagerServiceAsyncClient",)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/client.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/client.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/client.py
 2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/client.py
 2025-10-14 17:22:15.000000000 +0200
@@ -43,6 +43,7 @@
 from google.auth.transport import mtls  # type: ignore
 from google.auth.transport.grpc import SslCredentials  # type: ignore
 from google.oauth2 import service_account  # type: ignore
+import google.protobuf
 
 from google.cloud.secretmanager_v1beta2 import gapic_version as package_version
 
@@ -119,8 +120,8 @@
     Manages secrets and operations using those secrets. Implements a
     REST model with the following objects:
 
-    -  [Secret][google.cloud.secretmanager.v1beta2.Secret]
-    -  [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]
+    - [Secret][google.cloud.secretmanager.v1beta2.Secret]
+    - [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]
     """
 
     @staticmethod
@@ -2296,19 +2297,19 @@
                    constraints based on attributes of the request, the
                    resource, or both. To learn which resources support
                    conditions in their IAM policies, see the [IAM
-                   documentation](\ 
https://cloud.google.com/iam/help/conditions/resource-policies).
+                   
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
 
                    **JSON example:**
 
-                   :literal:`\`     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
+                   :literal:``     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
 
                    **YAML example:**
 
-                   :literal:`\`     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
+                   :literal:``     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
 
                    For a description of IAM and its features, see the
                    [IAM
-                   documentation](\ https://cloud.google.com/iam/docs/).
+                   documentation](https://cloud.google.com/iam/docs/).
 
         """
         # Create or coerce a protobuf request object.
@@ -2413,19 +2414,19 @@
                    constraints based on attributes of the request, the
                    resource, or both. To learn which resources support
                    conditions in their IAM policies, see the [IAM
-                   documentation](\ 
https://cloud.google.com/iam/help/conditions/resource-policies).
+                   
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
 
                    **JSON example:**
 
-                   :literal:`\`     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
+                   :literal:``     {       "bindings": [         {           
"role": "roles/resourcemanager.organizationAdmin",           "members": [       
      "user:[email protected]",             "group:[email protected]",          
   "domain:google.com",             
"serviceAccount:[email protected]"           ]         
},         {           "role": "roles/resourcemanager.organizationViewer",      
     "members": [             "user:[email protected]"           ],           
"condition": {             "title": "expirable access",             
"description": "Does not grant access after Sep 2020",             
"expression": "request.time <             
timestamp('2020-10-01T00:00:00.000Z')",           }         }       ],       
"etag": "BwWWja0YfJA=",       "version": 3     }`\ \`
 
                    **YAML example:**
 
-                   :literal:`\`     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
+                   :literal:``     bindings:     - members:       - 
user:[email protected]       - group:[email protected]       - 
domain:google.com       - 
serviceAccount:[email protected]       role: 
roles/resourcemanager.organizationAdmin     - members:       - 
user:[email protected]       role: roles/resourcemanager.organizationViewer      
 condition:         title: expirable access         description: Does not grant 
access after Sep 2020         expression: request.time < 
timestamp('2020-10-01T00:00:00.000Z')     etag: BwWWja0YfJA=     version: 3`\ \`
 
                    For a description of IAM and its features, see the
                    [IAM
-                   documentation](\ https://cloud.google.com/iam/docs/).
+                   documentation](https://cloud.google.com/iam/docs/).
 
         """
         # Create or coerce a protobuf request object.
@@ -2690,5 +2691,7 @@
     gapic_version=package_version.__version__
 )
 
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"):  # pragma: NO 
COVER
+    DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
 
 __all__ = ("SecretManagerServiceClient",)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/base.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/base.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/base.py
        2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/base.py
        2025-10-14 17:22:13.000000000 +0200
@@ -26,6 +26,7 @@
 from google.iam.v1 import iam_policy_pb2  # type: ignore
 from google.iam.v1 import policy_pb2  # type: ignore
 from google.oauth2 import service_account  # type: ignore
+import google.protobuf
 from google.protobuf import empty_pb2  # type: ignore
 
 from google.cloud.secretmanager_v1beta2 import gapic_version as package_version
@@ -35,6 +36,9 @@
     gapic_version=package_version.__version__
 )
 
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"):  # pragma: NO 
COVER
+    DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
+
 
 class SecretManagerServiceTransport(abc.ABC):
     """Abstract transport class for SecretManagerService."""
@@ -66,9 +70,10 @@
                 credentials identify the application to the service; if none
                 are specified, the client will attempt to ascertain the
                 credentials from the environment.
-            credentials_file (Optional[str]): A file with credentials that can
+            credentials_file (Optional[str]): Deprecated. A file with 
credentials that can
                 be loaded with :func:`google.auth.load_credentials_from_file`.
-                This argument is mutually exclusive with credentials.
+                This argument is mutually exclusive with credentials. This 
argument will be
+                removed in the next major version of this library.
             scopes (Optional[Sequence[str]]): A list of scopes.
             quota_project_id (Optional[str]): An optional project to use for 
billing
                 and quota.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/grpc.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/grpc.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/grpc.py
        2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/grpc.py
        2025-10-14 17:22:16.000000000 +0200
@@ -119,8 +119,8 @@
     Manages secrets and operations using those secrets. Implements a
     REST model with the following objects:
 
-    -  [Secret][google.cloud.secretmanager.v1beta2.Secret]
-    -  [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]
+    - [Secret][google.cloud.secretmanager.v1beta2.Secret]
+    - [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]
 
     This class defines the same methods as the primary client, so the
     primary client can load the underlying transport implementation
@@ -160,9 +160,10 @@
                 are specified, the client will attempt to ascertain the
                 credentials from the environment.
                 This argument is ignored if a ``channel`` instance is provided.
-            credentials_file (Optional[str]): A file with credentials that can
+            credentials_file (Optional[str]): Deprecated. A file with 
credentials that can
                 be loaded with :func:`google.auth.load_credentials_from_file`.
                 This argument is ignored if a ``channel`` instance is provided.
+                This argument will be removed in the next major version of 
this library.
             scopes (Optional(Sequence[str])): A list of scopes. This argument 
is
                 ignored if a ``channel`` instance is provided.
             channel (Optional[Union[grpc.Channel, Callable[..., 
grpc.Channel]]]):
@@ -295,9 +296,10 @@
                 credentials identify this application to the service. If
                 none are specified, the client will attempt to ascertain
                 the credentials from the environment.
-            credentials_file (Optional[str]): A file with credentials that can
+            credentials_file (Optional[str]): Deprecated. A file with 
credentials that can
                 be loaded with :func:`google.auth.load_credentials_from_file`.
-                This argument is mutually exclusive with credentials.
+                This argument is mutually exclusive with credentials.  This 
argument will be
+                removed in the next major version of this library.
             scopes (Optional[Sequence[str]]): A optional list of scopes needed 
for this
                 service. These are only used when credentials are not 
specified and
                 are passed to :func:`google.auth.default`.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/grpc_asyncio.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/grpc_asyncio.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/grpc_asyncio.py
        2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/grpc_asyncio.py
        2025-10-14 17:22:12.000000000 +0200
@@ -125,8 +125,8 @@
     Manages secrets and operations using those secrets. Implements a
     REST model with the following objects:
 
-    -  [Secret][google.cloud.secretmanager.v1beta2.Secret]
-    -  [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]
+    - [Secret][google.cloud.secretmanager.v1beta2.Secret]
+    - [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]
 
     This class defines the same methods as the primary client, so the
     primary client can load the underlying transport implementation
@@ -157,8 +157,9 @@
                 credentials identify this application to the service. If
                 none are specified, the client will attempt to ascertain
                 the credentials from the environment.
-            credentials_file (Optional[str]): A file with credentials that can
-                be loaded with :func:`google.auth.load_credentials_from_file`.
+            credentials_file (Optional[str]): Deprecated. A file with 
credentials that can
+                be loaded with :func:`google.auth.load_credentials_from_file`. 
This argument will be
+                removed in the next major version of this library.
             scopes (Optional[Sequence[str]]): A optional list of scopes needed 
for this
                 service. These are only used when credentials are not 
specified and
                 are passed to :func:`google.auth.default`.
@@ -209,9 +210,10 @@
                 are specified, the client will attempt to ascertain the
                 credentials from the environment.
                 This argument is ignored if a ``channel`` instance is provided.
-            credentials_file (Optional[str]): A file with credentials that can
+            credentials_file (Optional[str]): Deprecated. A file with 
credentials that can
                 be loaded with :func:`google.auth.load_credentials_from_file`.
                 This argument is ignored if a ``channel`` instance is provided.
+                This argument will be removed in the next major version of 
this library.
             scopes (Optional[Sequence[str]]): A optional list of scopes needed 
for this
                 service. These are only used when credentials are not 
specified and
                 are passed to :func:`google.auth.default`.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/rest.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/rest.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/rest.py
        2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/rest.py
        2025-10-14 17:22:16.000000000 +0200
@@ -27,6 +27,7 @@
 from google.cloud.location import locations_pb2  # type: ignore
 from google.iam.v1 import iam_policy_pb2  # type: ignore
 from google.iam.v1 import policy_pb2  # type: ignore
+import google.protobuf
 from google.protobuf import empty_pb2  # type: ignore
 from google.protobuf import json_format
 from requests import __version__ as requests_version
@@ -56,6 +57,9 @@
     rest_version=f"requests@{requests_version}",
 )
 
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"):  # pragma: NO 
COVER
+    DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
+
 
 class SecretManagerServiceRestInterceptor:
     """Interceptor for SecretManagerService.
@@ -934,8 +938,8 @@
     Manages secrets and operations using those secrets. Implements a
     REST model with the following objects:
 
-    -  [Secret][google.cloud.secretmanager.v1beta2.Secret]
-    -  [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]
+    - [Secret][google.cloud.secretmanager.v1beta2.Secret]
+    - [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]
 
     This class defines the same methods as the primary client, so the
     primary client can load the underlying transport implementation
@@ -970,9 +974,10 @@
                 are specified, the client will attempt to ascertain the
                 credentials from the environment.
 
-            credentials_file (Optional[str]): A file with credentials that can
+            credentials_file (Optional[str]): Deprecated. A file with 
credentials that can
                 be loaded with :func:`google.auth.load_credentials_from_file`.
-                This argument is ignored if ``channel`` is provided.
+                This argument is ignored if ``channel`` is provided. This 
argument will be
+                removed in the next major version of this library.
             scopes (Optional(Sequence[str])): A list of scopes. This argument 
is
                 ignored if ``channel`` is provided.
             client_cert_source_for_mtls (Callable[[], Tuple[bytes, bytes]]): 
Client
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/types/resources.py
 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/types/resources.py
--- 
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/types/resources.py
        2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/types/resources.py
        2025-10-14 17:22:14.000000000 +0200
@@ -112,7 +112,7 @@
 
             A version alias is a string with a maximum length of 63
             characters and can contain uppercase and lowercase letters,
-            numerals, and the hyphen (``-``) and underscore ('_')
+            numerals, and the hyphen (``-``) and underscore ('\_')
             characters. An alias string must start with a letter and
             cannot be the string 'latest' or 'NEW'. No more than 50
             aliases can be assigned to a given secret.
@@ -130,7 +130,7 @@
             Annotation keys must be between 1 and 63 characters long,
             have a UTF-8 encoding of maximum 128 bytes, begin and end
             with an alphanumeric character ([a-z0-9A-Z]), and may have
-            dashes (-), underscores (_), dots (.), and alphanumerics in
+            dashes (-), underscores (\_), dots (.), and alphanumerics in
             between these symbols.
 
             The total size of annotation keys and values must be less
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google_cloud_secret_manager.egg-info/PKG-INFO
 
new/google_cloud_secret_manager-2.25.0/google_cloud_secret_manager.egg-info/PKG-INFO
--- 
old/google_cloud_secret_manager-2.23.3/google_cloud_secret_manager.egg-info/PKG-INFO
        2025-04-17 21:01:16.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google_cloud_secret_manager.egg-info/PKG-INFO
        2025-10-14 17:24:46.000000000 +0200
@@ -1,6 +1,6 @@
-Metadata-Version: 2.1
+Metadata-Version: 2.4
 Name: google-cloud-secret-manager
-Version: 2.23.3
+Version: 2.25.0
 Summary: Google Cloud Secret Manager API client library
 Home-page: 
https://github.com/googleapis/google-cloud-python/tree/main/packages/google-cloud-secret-manager
 Author: Google LLC
@@ -19,16 +19,30 @@
 Classifier: Programming Language :: Python :: 3.11
 Classifier: Programming Language :: Python :: 3.12
 Classifier: Programming Language :: Python :: 3.13
+Classifier: Programming Language :: Python :: 3.14
 Classifier: Operating System :: OS Independent
 Classifier: Topic :: Internet
 Requires-Python: >=3.7
 License-File: LICENSE
 Requires-Dist: 
google-api-core[grpc]!=2.0.*,!=2.1.*,!=2.10.*,!=2.2.*,!=2.3.*,!=2.4.*,!=2.5.*,!=2.6.*,!=2.7.*,!=2.8.*,!=2.9.*,<3.0.0,>=1.34.1
 Requires-Dist: google-auth!=2.24.0,!=2.25.0,<3.0.0,>=2.14.1
+Requires-Dist: grpcio<2.0.0,>=1.33.2
+Requires-Dist: grpcio<2.0.0,>=1.75.1; python_version >= "3.14"
 Requires-Dist: proto-plus<2.0.0,>=1.22.3
 Requires-Dist: proto-plus<2.0.0,>=1.25.0; python_version >= "3.13"
 Requires-Dist: 
protobuf!=4.21.0,!=4.21.1,!=4.21.2,!=4.21.3,!=4.21.4,!=4.21.5,<7.0.0,>=3.20.2
 Requires-Dist: grpc-google-iam-v1<1.0.0,>=0.14.0
+Dynamic: author
+Dynamic: author-email
+Dynamic: classifier
+Dynamic: description
+Dynamic: home-page
+Dynamic: license
+Dynamic: license-file
+Dynamic: platform
+Dynamic: requires-dist
+Dynamic: requires-python
+Dynamic: summary
 
 Python Client for Secret Manager
 ================================
@@ -93,7 +107,7 @@
 Our client libraries are compatible with all current `active`_ and 
`maintenance`_ versions of
 Python.
 
-Python >= 3.7
+Python >= 3.7, including 3.14
 
 .. _active: https://devguide.python.org/devcycle/#in-development-main-branch
 .. _maintenance: https://devguide.python.org/devcycle/#maintenance-branches
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/google_cloud_secret_manager.egg-info/requires.txt
 
new/google_cloud_secret_manager-2.25.0/google_cloud_secret_manager.egg-info/requires.txt
--- 
old/google_cloud_secret_manager-2.23.3/google_cloud_secret_manager.egg-info/requires.txt
    2025-04-17 21:01:16.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/google_cloud_secret_manager.egg-info/requires.txt
    2025-10-14 17:24:46.000000000 +0200
@@ -1,8 +1,12 @@
 
google-api-core[grpc]!=2.0.*,!=2.1.*,!=2.10.*,!=2.2.*,!=2.3.*,!=2.4.*,!=2.5.*,!=2.6.*,!=2.7.*,!=2.8.*,!=2.9.*,<3.0.0,>=1.34.1
 google-auth!=2.24.0,!=2.25.0,<3.0.0,>=2.14.1
+grpcio<2.0.0,>=1.33.2
 proto-plus<2.0.0,>=1.22.3
 protobuf!=4.21.0,!=4.21.1,!=4.21.2,!=4.21.3,!=4.21.4,!=4.21.5,<7.0.0,>=3.20.2
 grpc-google-iam-v1<1.0.0,>=0.14.0
 
 [:python_version >= "3.13"]
 proto-plus<2.0.0,>=1.25.0
+
+[:python_version >= "3.14"]
+grpcio<2.0.0,>=1.75.1
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/google_cloud_secret_manager-2.23.3/setup.py 
new/google_cloud_secret_manager-2.25.0/setup.py
--- old/google_cloud_secret_manager-2.23.3/setup.py     2025-04-17 
20:55:59.000000000 +0200
+++ new/google_cloud_secret_manager-2.25.0/setup.py     2025-10-14 
17:22:15.000000000 +0200
@@ -45,6 +45,8 @@
     # Exclude incompatible versions of `google-auth`
     # See https://github.com/googleapis/google-cloud-python/issues/12364
     "google-auth >= 2.14.1, <3.0.0,!=2.24.0,!=2.25.0",
+    "grpcio >= 1.33.2, < 2.0.0",
+    "grpcio >= 1.75.1, < 2.0.0; python_version >= '3.14'",
     "proto-plus >= 1.22.3, <2.0.0",
     "proto-plus >= 1.25.0, <2.0.0; python_version >= '3.13'",
     
"protobuf>=3.20.2,<7.0.0,!=4.21.0,!=4.21.1,!=4.21.2,!=4.21.3,!=4.21.4,!=4.21.5",
@@ -87,6 +89,7 @@
         "Programming Language :: Python :: 3.11",
         "Programming Language :: Python :: 3.12",
         "Programming Language :: Python :: 3.13",
+        "Programming Language :: Python :: 3.14",
         "Operating System :: OS Independent",
         "Topic :: Internet",
     ],
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/google_cloud_secret_manager-2.23.3/tests/unit/gapic/secretmanager_v1/test_secret_manager_service.py
 
new/google_cloud_secret_manager-2.25.0/tests/unit/gapic/secretmanager_v1/test_secret_manager_service.py
--- 
old/google_cloud_secret_manager-2.23.3/tests/unit/gapic/secretmanager_v1/test_secret_manager_service.py
     2025-04-17 20:55:59.000000000 +0200
+++ 
new/google_cloud_secret_manager-2.25.0/tests/unit/gapic/secretmanager_v1/test_secret_manager_service.py
     2025-10-14 17:22:16.000000000 +0200
@@ -10302,6 +10302,7 @@
         "annotations": {},
         "version_destroy_ttl": {},
         "customer_managed_encryption": {},
+        "tags": {},
     }
     # The version of a generated dependency at test runtime may differ from 
the version used during generation.
     # Delete any fields which are not present in the current runtime dependency
@@ -10778,6 +10779,7 @@
         "annotations": {},
         "version_destroy_ttl": {},
         "customer_managed_encryption": {},
+        "tags": {},
     }
     # The version of a generated dependency at test runtime may differ from 
the version used during generation.
     # Delete any fields which are not present in the current runtime dependency

Reply via email to