Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package python-google-cloud-secret-manager
for openSUSE:Factory checked in at 2025-10-17 20:14:31
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-google-cloud-secret-manager (Old)
and
/work/SRC/openSUSE:Factory/.python-google-cloud-secret-manager.new.18484 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "python-google-cloud-secret-manager"
Fri Oct 17 20:14:31 2025 rev:6 rq:1312040 version:2.25.0
Changes:
--------
---
/work/SRC/openSUSE:Factory/python-google-cloud-secret-manager/python-google-cloud-secret-manager.changes
2025-04-25 22:21:15.676458411 +0200
+++
/work/SRC/openSUSE:Factory/.python-google-cloud-secret-manager.new.18484/python-google-cloud-secret-manager.changes
2025-10-17 20:14:38.007848110 +0200
@@ -1,0 +2,11 @@
+Fri Oct 17 12:39:21 UTC 2025 - John Paul Adrian Glaubitz
<[email protected]>
+
+- Update to 2.25.0
+ * Add support for Python 3.14 (4763aa7)
+ * Deprecate credentials_file argument (4763aa7)
+- from version 2.24.0
+ * [google-cloud-secret-manager] Update secret manager protos for
+ tags (#13976)
+- Update BuildRequires and Requires from setup.py
+
+-------------------------------------------------------------------
Old:
----
google_cloud_secret_manager-2.23.3.tar.gz
New:
----
google_cloud_secret_manager-2.25.0.tar.gz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ python-google-cloud-secret-manager.spec ++++++
--- /var/tmp/diff_new_pack.JSk9vL/_old 2025-10-17 20:14:38.599873214 +0200
+++ /var/tmp/diff_new_pack.JSk9vL/_new 2025-10-17 20:14:38.603873384 +0200
@@ -18,18 +18,24 @@
%{?sle15_python_module_pythons}
Name: python-google-cloud-secret-manager
-Version: 2.23.3
+Version: 2.25.0
Release: 0
Summary: Google Cloud Secret Manager API client library
License: Apache-2.0
URL:
https://github.com/googleapis/google-cloud-python/tree/main/packages/google-cloud-secret-manager
Source:
https://files.pythonhosted.org/packages/source/g/google-cloud-secret-manager/google_cloud_secret_manager-%{version}.tar.gz
+BuildRequires: %{python_module grpcio}
BuildRequires: %{python_module pip}
BuildRequires: %{python_module pytest-asyncio}
BuildRequires: %{python_module pytest}
BuildRequires: %{python_module wheel}
BuildRequires: fdupes
BuildRequires: python-rpm-macros
+%if %python_version_nodots < 314
+Requires: python-grpcio >= 1.33.2
+%else
+Requires: python-grpcio >= 1.75.1
+%endif
Requires: python-google-api-core >= 1.34.1
Requires: python-grpc-google-iam-v1 >= 0.14.0
Requires: python-proto-plus >= 1.25.0
++++++ google_cloud_secret_manager-2.23.3.tar.gz ->
google_cloud_secret_manager-2.25.0.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/google_cloud_secret_manager-2.23.3/PKG-INFO
new/google_cloud_secret_manager-2.25.0/PKG-INFO
--- old/google_cloud_secret_manager-2.23.3/PKG-INFO 2025-04-17
21:01:16.877085700 +0200
+++ new/google_cloud_secret_manager-2.25.0/PKG-INFO 2025-10-14
17:24:46.305964200 +0200
@@ -1,6 +1,6 @@
-Metadata-Version: 2.1
+Metadata-Version: 2.4
Name: google-cloud-secret-manager
-Version: 2.23.3
+Version: 2.25.0
Summary: Google Cloud Secret Manager API client library
Home-page:
https://github.com/googleapis/google-cloud-python/tree/main/packages/google-cloud-secret-manager
Author: Google LLC
@@ -19,16 +19,30 @@
Classifier: Programming Language :: Python :: 3.11
Classifier: Programming Language :: Python :: 3.12
Classifier: Programming Language :: Python :: 3.13
+Classifier: Programming Language :: Python :: 3.14
Classifier: Operating System :: OS Independent
Classifier: Topic :: Internet
Requires-Python: >=3.7
License-File: LICENSE
Requires-Dist:
google-api-core[grpc]!=2.0.*,!=2.1.*,!=2.10.*,!=2.2.*,!=2.3.*,!=2.4.*,!=2.5.*,!=2.6.*,!=2.7.*,!=2.8.*,!=2.9.*,<3.0.0,>=1.34.1
Requires-Dist: google-auth!=2.24.0,!=2.25.0,<3.0.0,>=2.14.1
+Requires-Dist: grpcio<2.0.0,>=1.33.2
+Requires-Dist: grpcio<2.0.0,>=1.75.1; python_version >= "3.14"
Requires-Dist: proto-plus<2.0.0,>=1.22.3
Requires-Dist: proto-plus<2.0.0,>=1.25.0; python_version >= "3.13"
Requires-Dist:
protobuf!=4.21.0,!=4.21.1,!=4.21.2,!=4.21.3,!=4.21.4,!=4.21.5,<7.0.0,>=3.20.2
Requires-Dist: grpc-google-iam-v1<1.0.0,>=0.14.0
+Dynamic: author
+Dynamic: author-email
+Dynamic: classifier
+Dynamic: description
+Dynamic: home-page
+Dynamic: license
+Dynamic: license-file
+Dynamic: platform
+Dynamic: requires-dist
+Dynamic: requires-python
+Dynamic: summary
Python Client for Secret Manager
================================
@@ -93,7 +107,7 @@
Our client libraries are compatible with all current `active`_ and
`maintenance`_ versions of
Python.
-Python >= 3.7
+Python >= 3.7, including 3.14
.. _active: https://devguide.python.org/devcycle/#in-development-main-branch
.. _maintenance: https://devguide.python.org/devcycle/#maintenance-branches
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/google_cloud_secret_manager-2.23.3/README.rst
new/google_cloud_secret_manager-2.25.0/README.rst
--- old/google_cloud_secret_manager-2.23.3/README.rst 2025-04-17
20:55:59.000000000 +0200
+++ new/google_cloud_secret_manager-2.25.0/README.rst 2025-10-14
17:22:14.000000000 +0200
@@ -61,7 +61,7 @@
Our client libraries are compatible with all current `active`_ and
`maintenance`_ versions of
Python.
-Python >= 3.7
+Python >= 3.7, including 3.14
.. _active: https://devguide.python.org/devcycle/#in-development-main-branch
.. _maintenance: https://devguide.python.org/devcycle/#maintenance-branches
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager/gapic_version.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager/gapic_version.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager/gapic_version.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager/gapic_version.py
2025-10-14 17:22:15.000000000 +0200
@@ -13,4 +13,4 @@
# See the License for the specific language governing permissions and
# limitations under the License.
#
-__version__ = "2.23.3" # {x-release-please-version}
+__version__ = "2.25.0" # {x-release-please-version}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/gapic_version.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/gapic_version.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/gapic_version.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/gapic_version.py
2025-10-14 17:22:15.000000000 +0200
@@ -13,4 +13,4 @@
# See the License for the specific language governing permissions and
# limitations under the License.
#
-__version__ = "2.23.3" # {x-release-please-version}
+__version__ = "2.25.0" # {x-release-please-version}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/async_client.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/async_client.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/async_client.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/async_client.py
2025-10-14 17:22:13.000000000 +0200
@@ -35,6 +35,7 @@
from google.api_core.client_options import ClientOptions
from google.auth import credentials as ga_credentials # type: ignore
from google.oauth2 import service_account # type: ignore
+import google.protobuf
from google.cloud.secretmanager_v1 import gapic_version as package_version
@@ -73,8 +74,8 @@
Manages secrets and operations using those secrets. Implements a
REST model with the following objects:
- - [Secret][google.cloud.secretmanager.v1.Secret]
- - [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
+ - [Secret][google.cloud.secretmanager.v1.Secret]
+ - [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
"""
_client: SecretManagerServiceClient
@@ -1875,19 +1876,19 @@
constraints based on attributes of the request, the
resource, or both. To learn which resources support
conditions in their IAM policies, see the [IAM
- documentation](\
https://cloud.google.com/iam/help/conditions/resource-policies).
+
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
**JSON example:**
- :literal:`\` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
+ :literal:`` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
**YAML example:**
- :literal:`\` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
+ :literal:`` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
For a description of IAM and its features, see the
[IAM
- documentation](\ https://cloud.google.com/iam/docs/).
+ documentation](https://cloud.google.com/iam/docs/).
"""
# Create or coerce a protobuf request object.
@@ -1993,19 +1994,19 @@
constraints based on attributes of the request, the
resource, or both. To learn which resources support
conditions in their IAM policies, see the [IAM
- documentation](\
https://cloud.google.com/iam/help/conditions/resource-policies).
+
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
**JSON example:**
- :literal:`\` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
+ :literal:`` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
**YAML example:**
- :literal:`\` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
+ :literal:`` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
For a description of IAM and its features, see the
[IAM
- documentation](\ https://cloud.google.com/iam/docs/).
+ documentation](https://cloud.google.com/iam/docs/).
"""
# Create or coerce a protobuf request object.
@@ -2257,5 +2258,8 @@
gapic_version=package_version.__version__
)
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO
COVER
+ DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
+
__all__ = ("SecretManagerServiceAsyncClient",)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/client.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/client.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/client.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/client.py
2025-10-14 17:22:13.000000000 +0200
@@ -43,6 +43,7 @@
from google.auth.transport import mtls # type: ignore
from google.auth.transport.grpc import SslCredentials # type: ignore
from google.oauth2 import service_account # type: ignore
+import google.protobuf
from google.cloud.secretmanager_v1 import gapic_version as package_version
@@ -119,8 +120,8 @@
Manages secrets and operations using those secrets. Implements a
REST model with the following objects:
- - [Secret][google.cloud.secretmanager.v1.Secret]
- - [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
+ - [Secret][google.cloud.secretmanager.v1.Secret]
+ - [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
"""
@staticmethod
@@ -2291,19 +2292,19 @@
constraints based on attributes of the request, the
resource, or both. To learn which resources support
conditions in their IAM policies, see the [IAM
- documentation](\
https://cloud.google.com/iam/help/conditions/resource-policies).
+
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
**JSON example:**
- :literal:`\` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
+ :literal:`` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
**YAML example:**
- :literal:`\` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
+ :literal:`` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
For a description of IAM and its features, see the
[IAM
- documentation](\ https://cloud.google.com/iam/docs/).
+ documentation](https://cloud.google.com/iam/docs/).
"""
# Create or coerce a protobuf request object.
@@ -2408,19 +2409,19 @@
constraints based on attributes of the request, the
resource, or both. To learn which resources support
conditions in their IAM policies, see the [IAM
- documentation](\
https://cloud.google.com/iam/help/conditions/resource-policies).
+
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
**JSON example:**
- :literal:`\` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
+ :literal:`` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
**YAML example:**
- :literal:`\` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
+ :literal:`` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
For a description of IAM and its features, see the
[IAM
- documentation](\ https://cloud.google.com/iam/docs/).
+ documentation](https://cloud.google.com/iam/docs/).
"""
# Create or coerce a protobuf request object.
@@ -2685,5 +2686,7 @@
gapic_version=package_version.__version__
)
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO
COVER
+ DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
__all__ = ("SecretManagerServiceClient",)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/transports/base.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/transports/base.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/transports/base.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/transports/base.py
2025-10-14 17:22:15.000000000 +0200
@@ -26,6 +26,7 @@
from google.iam.v1 import iam_policy_pb2 # type: ignore
from google.iam.v1 import policy_pb2 # type: ignore
from google.oauth2 import service_account # type: ignore
+import google.protobuf
from google.protobuf import empty_pb2 # type: ignore
from google.cloud.secretmanager_v1 import gapic_version as package_version
@@ -35,6 +36,9 @@
gapic_version=package_version.__version__
)
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO
COVER
+ DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
+
class SecretManagerServiceTransport(abc.ABC):
"""Abstract transport class for SecretManagerService."""
@@ -66,9 +70,10 @@
credentials identify the application to the service; if none
are specified, the client will attempt to ascertain the
credentials from the environment.
- credentials_file (Optional[str]): A file with credentials that can
+ credentials_file (Optional[str]): Deprecated. A file with
credentials that can
be loaded with :func:`google.auth.load_credentials_from_file`.
- This argument is mutually exclusive with credentials.
+ This argument is mutually exclusive with credentials. This
argument will be
+ removed in the next major version of this library.
scopes (Optional[Sequence[str]]): A list of scopes.
quota_project_id (Optional[str]): An optional project to use for
billing
and quota.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/transports/grpc.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/transports/grpc.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/transports/grpc.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/transports/grpc.py
2025-10-14 17:22:14.000000000 +0200
@@ -119,8 +119,8 @@
Manages secrets and operations using those secrets. Implements a
REST model with the following objects:
- - [Secret][google.cloud.secretmanager.v1.Secret]
- - [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
+ - [Secret][google.cloud.secretmanager.v1.Secret]
+ - [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
This class defines the same methods as the primary client, so the
primary client can load the underlying transport implementation
@@ -160,9 +160,10 @@
are specified, the client will attempt to ascertain the
credentials from the environment.
This argument is ignored if a ``channel`` instance is provided.
- credentials_file (Optional[str]): A file with credentials that can
+ credentials_file (Optional[str]): Deprecated. A file with
credentials that can
be loaded with :func:`google.auth.load_credentials_from_file`.
This argument is ignored if a ``channel`` instance is provided.
+ This argument will be removed in the next major version of
this library.
scopes (Optional(Sequence[str])): A list of scopes. This argument
is
ignored if a ``channel`` instance is provided.
channel (Optional[Union[grpc.Channel, Callable[...,
grpc.Channel]]]):
@@ -295,9 +296,10 @@
credentials identify this application to the service. If
none are specified, the client will attempt to ascertain
the credentials from the environment.
- credentials_file (Optional[str]): A file with credentials that can
+ credentials_file (Optional[str]): Deprecated. A file with
credentials that can
be loaded with :func:`google.auth.load_credentials_from_file`.
- This argument is mutually exclusive with credentials.
+ This argument is mutually exclusive with credentials. This
argument will be
+ removed in the next major version of this library.
scopes (Optional[Sequence[str]]): A optional list of scopes needed
for this
service. These are only used when credentials are not
specified and
are passed to :func:`google.auth.default`.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/transports/grpc_asyncio.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/transports/grpc_asyncio.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/transports/grpc_asyncio.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/transports/grpc_asyncio.py
2025-10-14 17:22:16.000000000 +0200
@@ -125,8 +125,8 @@
Manages secrets and operations using those secrets. Implements a
REST model with the following objects:
- - [Secret][google.cloud.secretmanager.v1.Secret]
- - [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
+ - [Secret][google.cloud.secretmanager.v1.Secret]
+ - [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
This class defines the same methods as the primary client, so the
primary client can load the underlying transport implementation
@@ -157,8 +157,9 @@
credentials identify this application to the service. If
none are specified, the client will attempt to ascertain
the credentials from the environment.
- credentials_file (Optional[str]): A file with credentials that can
- be loaded with :func:`google.auth.load_credentials_from_file`.
+ credentials_file (Optional[str]): Deprecated. A file with
credentials that can
+ be loaded with :func:`google.auth.load_credentials_from_file`.
This argument will be
+ removed in the next major version of this library.
scopes (Optional[Sequence[str]]): A optional list of scopes needed
for this
service. These are only used when credentials are not
specified and
are passed to :func:`google.auth.default`.
@@ -209,9 +210,10 @@
are specified, the client will attempt to ascertain the
credentials from the environment.
This argument is ignored if a ``channel`` instance is provided.
- credentials_file (Optional[str]): A file with credentials that can
+ credentials_file (Optional[str]): Deprecated. A file with
credentials that can
be loaded with :func:`google.auth.load_credentials_from_file`.
This argument is ignored if a ``channel`` instance is provided.
+ This argument will be removed in the next major version of
this library.
scopes (Optional[Sequence[str]]): A optional list of scopes needed
for this
service. These are only used when credentials are not
specified and
are passed to :func:`google.auth.default`.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/transports/rest.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/transports/rest.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/services/secret_manager_service/transports/rest.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/services/secret_manager_service/transports/rest.py
2025-10-14 17:22:15.000000000 +0200
@@ -27,6 +27,7 @@
from google.cloud.location import locations_pb2 # type: ignore
from google.iam.v1 import iam_policy_pb2 # type: ignore
from google.iam.v1 import policy_pb2 # type: ignore
+import google.protobuf
from google.protobuf import empty_pb2 # type: ignore
from google.protobuf import json_format
from requests import __version__ as requests_version
@@ -56,6 +57,9 @@
rest_version=f"requests@{requests_version}",
)
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO
COVER
+ DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
+
class SecretManagerServiceRestInterceptor:
"""Interceptor for SecretManagerService.
@@ -934,8 +938,8 @@
Manages secrets and operations using those secrets. Implements a
REST model with the following objects:
- - [Secret][google.cloud.secretmanager.v1.Secret]
- - [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
+ - [Secret][google.cloud.secretmanager.v1.Secret]
+ - [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
This class defines the same methods as the primary client, so the
primary client can load the underlying transport implementation
@@ -970,9 +974,10 @@
are specified, the client will attempt to ascertain the
credentials from the environment.
- credentials_file (Optional[str]): A file with credentials that can
+ credentials_file (Optional[str]): Deprecated. A file with
credentials that can
be loaded with :func:`google.auth.load_credentials_from_file`.
- This argument is ignored if ``channel`` is provided.
+ This argument is ignored if ``channel`` is provided. This
argument will be
+ removed in the next major version of this library.
scopes (Optional(Sequence[str])): A list of scopes. This argument
is
ignored if ``channel`` is provided.
client_cert_source_for_mtls (Callable[[], Tuple[bytes, bytes]]):
Client
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/types/resources.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/types/resources.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1/types/resources.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1/types/resources.py
2025-10-14 17:22:16.000000000 +0200
@@ -111,7 +111,7 @@
A version alias is a string with a maximum length of 63
characters and can contain uppercase and lowercase letters,
- numerals, and the hyphen (``-``) and underscore ('_')
+ numerals, and the hyphen (``-``) and underscore ('\_')
characters. An alias string must start with a letter and
cannot be the string 'latest' or 'NEW'. No more than 50
aliases can be assigned to a given secret.
@@ -129,7 +129,7 @@
Annotation keys must be between 1 and 63 characters long,
have a UTF-8 encoding of maximum 128 bytes, begin and end
with an alphanumeric character ([a-z0-9A-Z]), and may have
- dashes (-), underscores (_), dots (.), and alphanumerics in
+ dashes (-), underscores (\_), dots (.), and alphanumerics in
between these symbols.
The total size of annotation keys and values must be less
@@ -155,6 +155,18 @@
added afterwards. They do not apply retroactively to
existing
[SecretVersions][google.cloud.secretmanager.v1.SecretVersion].
+ tags (MutableMapping[str, str]):
+ Optional. Input only. Immutable. Mapping of
+ Tag keys/values directly bound to this resource.
+ For example:
+
+ "123/environment": "production",
+ "123/costCenter": "marketing"
+
+ Tags are used to organize and group resources.
+
+ Tags can be used to control policy evaluation
+ for the resource.
"""
name: str = proto.Field(
@@ -222,6 +234,11 @@
number=15,
message="CustomerManagedEncryption",
)
+ tags: MutableMapping[str, str] = proto.MapField(
+ proto.STRING,
+ proto.STRING,
+ number=16,
+ )
class SecretVersion(proto.Message):
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/gapic_version.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/gapic_version.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/gapic_version.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/gapic_version.py
2025-10-14 17:22:15.000000000 +0200
@@ -13,4 +13,4 @@
# See the License for the specific language governing permissions and
# limitations under the License.
#
-__version__ = "2.23.3" # {x-release-please-version}
+__version__ = "2.25.0" # {x-release-please-version}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/async_client.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/async_client.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/async_client.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/async_client.py
2025-10-14 17:22:16.000000000 +0200
@@ -35,6 +35,7 @@
from google.api_core.client_options import ClientOptions
from google.auth import credentials as ga_credentials # type: ignore
from google.oauth2 import service_account # type: ignore
+import google.protobuf
from google.cloud.secretmanager_v1beta1 import gapic_version as package_version
@@ -72,8 +73,8 @@
Manages secrets and operations using those secrets. Implements a
REST model with the following objects:
- - [Secret][google.cloud.secrets.v1beta1.Secret]
- - [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
+ - [Secret][google.cloud.secrets.v1beta1.Secret]
+ - [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
"""
_client: SecretManagerServiceClient
@@ -1852,19 +1853,19 @@
constraints based on attributes of the request, the
resource, or both. To learn which resources support
conditions in their IAM policies, see the [IAM
- documentation](\
https://cloud.google.com/iam/help/conditions/resource-policies).
+
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
**JSON example:**
- :literal:`\` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
+ :literal:`` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
**YAML example:**
- :literal:`\` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
+ :literal:`` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
For a description of IAM and its features, see the
[IAM
- documentation](\ https://cloud.google.com/iam/docs/).
+ documentation](https://cloud.google.com/iam/docs/).
"""
# Create or coerce a protobuf request object.
@@ -1970,19 +1971,19 @@
constraints based on attributes of the request, the
resource, or both. To learn which resources support
conditions in their IAM policies, see the [IAM
- documentation](\
https://cloud.google.com/iam/help/conditions/resource-policies).
+
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
**JSON example:**
- :literal:`\` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
+ :literal:`` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
**YAML example:**
- :literal:`\` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
+ :literal:`` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
For a description of IAM and its features, see the
[IAM
- documentation](\ https://cloud.google.com/iam/docs/).
+ documentation](https://cloud.google.com/iam/docs/).
"""
# Create or coerce a protobuf request object.
@@ -2234,5 +2235,8 @@
gapic_version=package_version.__version__
)
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO
COVER
+ DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
+
__all__ = ("SecretManagerServiceAsyncClient",)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/client.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/client.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/client.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/client.py
2025-10-14 17:22:13.000000000 +0200
@@ -43,6 +43,7 @@
from google.auth.transport import mtls # type: ignore
from google.auth.transport.grpc import SslCredentials # type: ignore
from google.oauth2 import service_account # type: ignore
+import google.protobuf
from google.cloud.secretmanager_v1beta1 import gapic_version as package_version
@@ -118,8 +119,8 @@
Manages secrets and operations using those secrets. Implements a
REST model with the following objects:
- - [Secret][google.cloud.secrets.v1beta1.Secret]
- - [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
+ - [Secret][google.cloud.secrets.v1beta1.Secret]
+ - [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
"""
@staticmethod
@@ -2253,19 +2254,19 @@
constraints based on attributes of the request, the
resource, or both. To learn which resources support
conditions in their IAM policies, see the [IAM
- documentation](\
https://cloud.google.com/iam/help/conditions/resource-policies).
+
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
**JSON example:**
- :literal:`\` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
+ :literal:`` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
**YAML example:**
- :literal:`\` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
+ :literal:`` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
For a description of IAM and its features, see the
[IAM
- documentation](\ https://cloud.google.com/iam/docs/).
+ documentation](https://cloud.google.com/iam/docs/).
"""
# Create or coerce a protobuf request object.
@@ -2370,19 +2371,19 @@
constraints based on attributes of the request, the
resource, or both. To learn which resources support
conditions in their IAM policies, see the [IAM
- documentation](\
https://cloud.google.com/iam/help/conditions/resource-policies).
+
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
**JSON example:**
- :literal:`\` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
+ :literal:`` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
**YAML example:**
- :literal:`\` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
+ :literal:`` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
For a description of IAM and its features, see the
[IAM
- documentation](\ https://cloud.google.com/iam/docs/).
+ documentation](https://cloud.google.com/iam/docs/).
"""
# Create or coerce a protobuf request object.
@@ -2647,5 +2648,7 @@
gapic_version=package_version.__version__
)
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO
COVER
+ DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
__all__ = ("SecretManagerServiceClient",)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/base.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/base.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/base.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/base.py
2025-10-14 17:22:16.000000000 +0200
@@ -26,6 +26,7 @@
from google.iam.v1 import iam_policy_pb2 # type: ignore
from google.iam.v1 import policy_pb2 # type: ignore
from google.oauth2 import service_account # type: ignore
+import google.protobuf
from google.protobuf import empty_pb2 # type: ignore
from google.cloud.secretmanager_v1beta1 import gapic_version as package_version
@@ -35,6 +36,9 @@
gapic_version=package_version.__version__
)
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO
COVER
+ DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
+
class SecretManagerServiceTransport(abc.ABC):
"""Abstract transport class for SecretManagerService."""
@@ -66,9 +70,10 @@
credentials identify the application to the service; if none
are specified, the client will attempt to ascertain the
credentials from the environment.
- credentials_file (Optional[str]): A file with credentials that can
+ credentials_file (Optional[str]): Deprecated. A file with
credentials that can
be loaded with :func:`google.auth.load_credentials_from_file`.
- This argument is mutually exclusive with credentials.
+ This argument is mutually exclusive with credentials. This
argument will be
+ removed in the next major version of this library.
scopes (Optional[Sequence[str]]): A list of scopes.
quota_project_id (Optional[str]): An optional project to use for
billing
and quota.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/grpc.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/grpc.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/grpc.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/grpc.py
2025-10-14 17:22:14.000000000 +0200
@@ -119,8 +119,8 @@
Manages secrets and operations using those secrets. Implements a
REST model with the following objects:
- - [Secret][google.cloud.secrets.v1beta1.Secret]
- - [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
+ - [Secret][google.cloud.secrets.v1beta1.Secret]
+ - [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
This class defines the same methods as the primary client, so the
primary client can load the underlying transport implementation
@@ -160,9 +160,10 @@
are specified, the client will attempt to ascertain the
credentials from the environment.
This argument is ignored if a ``channel`` instance is provided.
- credentials_file (Optional[str]): A file with credentials that can
+ credentials_file (Optional[str]): Deprecated. A file with
credentials that can
be loaded with :func:`google.auth.load_credentials_from_file`.
This argument is ignored if a ``channel`` instance is provided.
+ This argument will be removed in the next major version of
this library.
scopes (Optional(Sequence[str])): A list of scopes. This argument
is
ignored if a ``channel`` instance is provided.
channel (Optional[Union[grpc.Channel, Callable[...,
grpc.Channel]]]):
@@ -295,9 +296,10 @@
credentials identify this application to the service. If
none are specified, the client will attempt to ascertain
the credentials from the environment.
- credentials_file (Optional[str]): A file with credentials that can
+ credentials_file (Optional[str]): Deprecated. A file with
credentials that can
be loaded with :func:`google.auth.load_credentials_from_file`.
- This argument is mutually exclusive with credentials.
+ This argument is mutually exclusive with credentials. This
argument will be
+ removed in the next major version of this library.
scopes (Optional[Sequence[str]]): A optional list of scopes needed
for this
service. These are only used when credentials are not
specified and
are passed to :func:`google.auth.default`.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/grpc_asyncio.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/grpc_asyncio.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/grpc_asyncio.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/grpc_asyncio.py
2025-10-14 17:22:13.000000000 +0200
@@ -125,8 +125,8 @@
Manages secrets and operations using those secrets. Implements a
REST model with the following objects:
- - [Secret][google.cloud.secrets.v1beta1.Secret]
- - [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
+ - [Secret][google.cloud.secrets.v1beta1.Secret]
+ - [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
This class defines the same methods as the primary client, so the
primary client can load the underlying transport implementation
@@ -157,8 +157,9 @@
credentials identify this application to the service. If
none are specified, the client will attempt to ascertain
the credentials from the environment.
- credentials_file (Optional[str]): A file with credentials that can
- be loaded with :func:`google.auth.load_credentials_from_file`.
+ credentials_file (Optional[str]): Deprecated. A file with
credentials that can
+ be loaded with :func:`google.auth.load_credentials_from_file`.
This argument will be
+ removed in the next major version of this library.
scopes (Optional[Sequence[str]]): A optional list of scopes needed
for this
service. These are only used when credentials are not
specified and
are passed to :func:`google.auth.default`.
@@ -209,9 +210,10 @@
are specified, the client will attempt to ascertain the
credentials from the environment.
This argument is ignored if a ``channel`` instance is provided.
- credentials_file (Optional[str]): A file with credentials that can
+ credentials_file (Optional[str]): Deprecated. A file with
credentials that can
be loaded with :func:`google.auth.load_credentials_from_file`.
This argument is ignored if a ``channel`` instance is provided.
+ This argument will be removed in the next major version of
this library.
scopes (Optional[Sequence[str]]): A optional list of scopes needed
for this
service. These are only used when credentials are not
specified and
are passed to :func:`google.auth.default`.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/rest.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/rest.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/rest.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta1/services/secret_manager_service/transports/rest.py
2025-10-14 17:22:15.000000000 +0200
@@ -27,6 +27,7 @@
from google.cloud.location import locations_pb2 # type: ignore
from google.iam.v1 import iam_policy_pb2 # type: ignore
from google.iam.v1 import policy_pb2 # type: ignore
+import google.protobuf
from google.protobuf import empty_pb2 # type: ignore
from google.protobuf import json_format
from requests import __version__ as requests_version
@@ -56,6 +57,9 @@
rest_version=f"requests@{requests_version}",
)
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO
COVER
+ DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
+
class SecretManagerServiceRestInterceptor:
"""Interceptor for SecretManagerService.
@@ -934,8 +938,8 @@
Manages secrets and operations using those secrets. Implements a
REST model with the following objects:
- - [Secret][google.cloud.secrets.v1beta1.Secret]
- - [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
+ - [Secret][google.cloud.secrets.v1beta1.Secret]
+ - [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]
This class defines the same methods as the primary client, so the
primary client can load the underlying transport implementation
@@ -970,9 +974,10 @@
are specified, the client will attempt to ascertain the
credentials from the environment.
- credentials_file (Optional[str]): A file with credentials that can
+ credentials_file (Optional[str]): Deprecated. A file with
credentials that can
be loaded with :func:`google.auth.load_credentials_from_file`.
- This argument is ignored if ``channel`` is provided.
+ This argument is ignored if ``channel`` is provided. This
argument will be
+ removed in the next major version of this library.
scopes (Optional(Sequence[str])): A list of scopes. This argument
is
ignored if ``channel`` is provided.
client_cert_source_for_mtls (Callable[[], Tuple[bytes, bytes]]):
Client
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/gapic_version.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/gapic_version.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/gapic_version.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/gapic_version.py
2025-10-14 17:22:15.000000000 +0200
@@ -13,4 +13,4 @@
# See the License for the specific language governing permissions and
# limitations under the License.
#
-__version__ = "2.23.3" # {x-release-please-version}
+__version__ = "2.25.0" # {x-release-please-version}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/async_client.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/async_client.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/async_client.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/async_client.py
2025-10-14 17:22:16.000000000 +0200
@@ -35,6 +35,7 @@
from google.api_core.client_options import ClientOptions
from google.auth import credentials as ga_credentials # type: ignore
from google.oauth2 import service_account # type: ignore
+import google.protobuf
from google.cloud.secretmanager_v1beta2 import gapic_version as package_version
@@ -73,8 +74,8 @@
Manages secrets and operations using those secrets. Implements a
REST model with the following objects:
- - [Secret][google.cloud.secretmanager.v1beta2.Secret]
- - [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]
+ - [Secret][google.cloud.secretmanager.v1beta2.Secret]
+ - [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]
"""
_client: SecretManagerServiceClient
@@ -1880,19 +1881,19 @@
constraints based on attributes of the request, the
resource, or both. To learn which resources support
conditions in their IAM policies, see the [IAM
- documentation](\
https://cloud.google.com/iam/help/conditions/resource-policies).
+
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
**JSON example:**
- :literal:`\` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
+ :literal:`` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
**YAML example:**
- :literal:`\` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
+ :literal:`` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
For a description of IAM and its features, see the
[IAM
- documentation](\ https://cloud.google.com/iam/docs/).
+ documentation](https://cloud.google.com/iam/docs/).
"""
# Create or coerce a protobuf request object.
@@ -1998,19 +1999,19 @@
constraints based on attributes of the request, the
resource, or both. To learn which resources support
conditions in their IAM policies, see the [IAM
- documentation](\
https://cloud.google.com/iam/help/conditions/resource-policies).
+
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
**JSON example:**
- :literal:`\` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
+ :literal:`` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
**YAML example:**
- :literal:`\` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
+ :literal:`` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
For a description of IAM and its features, see the
[IAM
- documentation](\ https://cloud.google.com/iam/docs/).
+ documentation](https://cloud.google.com/iam/docs/).
"""
# Create or coerce a protobuf request object.
@@ -2262,5 +2263,8 @@
gapic_version=package_version.__version__
)
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO
COVER
+ DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
+
__all__ = ("SecretManagerServiceAsyncClient",)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/client.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/client.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/client.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/client.py
2025-10-14 17:22:15.000000000 +0200
@@ -43,6 +43,7 @@
from google.auth.transport import mtls # type: ignore
from google.auth.transport.grpc import SslCredentials # type: ignore
from google.oauth2 import service_account # type: ignore
+import google.protobuf
from google.cloud.secretmanager_v1beta2 import gapic_version as package_version
@@ -119,8 +120,8 @@
Manages secrets and operations using those secrets. Implements a
REST model with the following objects:
- - [Secret][google.cloud.secretmanager.v1beta2.Secret]
- - [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]
+ - [Secret][google.cloud.secretmanager.v1beta2.Secret]
+ - [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]
"""
@staticmethod
@@ -2296,19 +2297,19 @@
constraints based on attributes of the request, the
resource, or both. To learn which resources support
conditions in their IAM policies, see the [IAM
- documentation](\
https://cloud.google.com/iam/help/conditions/resource-policies).
+
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
**JSON example:**
- :literal:`\` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
+ :literal:`` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
**YAML example:**
- :literal:`\` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
+ :literal:`` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
For a description of IAM and its features, see the
[IAM
- documentation](\ https://cloud.google.com/iam/docs/).
+ documentation](https://cloud.google.com/iam/docs/).
"""
# Create or coerce a protobuf request object.
@@ -2413,19 +2414,19 @@
constraints based on attributes of the request, the
resource, or both. To learn which resources support
conditions in their IAM policies, see the [IAM
- documentation](\
https://cloud.google.com/iam/help/conditions/resource-policies).
+
documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
**JSON example:**
- :literal:`\` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
+ :literal:`` { "bindings": [ {
"role": "roles/resourcemanager.organizationAdmin", "members": [
"user:[email protected]", "group:[email protected]",
"domain:google.com",
"serviceAccount:[email protected]" ]
}, { "role": "roles/resourcemanager.organizationViewer",
"members": [ "user:[email protected]" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020",
"expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } } ],
"etag": "BwWWja0YfJA=", "version": 3 }`\ \`
**YAML example:**
- :literal:`\` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
+ :literal:`` bindings: - members: -
user:[email protected] - group:[email protected] -
domain:google.com -
serviceAccount:[email protected] role:
roles/resourcemanager.organizationAdmin - members: -
user:[email protected] role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant
access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3`\ \`
For a description of IAM and its features, see the
[IAM
- documentation](\ https://cloud.google.com/iam/docs/).
+ documentation](https://cloud.google.com/iam/docs/).
"""
# Create or coerce a protobuf request object.
@@ -2690,5 +2691,7 @@
gapic_version=package_version.__version__
)
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO
COVER
+ DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
__all__ = ("SecretManagerServiceClient",)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/base.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/base.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/base.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/base.py
2025-10-14 17:22:13.000000000 +0200
@@ -26,6 +26,7 @@
from google.iam.v1 import iam_policy_pb2 # type: ignore
from google.iam.v1 import policy_pb2 # type: ignore
from google.oauth2 import service_account # type: ignore
+import google.protobuf
from google.protobuf import empty_pb2 # type: ignore
from google.cloud.secretmanager_v1beta2 import gapic_version as package_version
@@ -35,6 +36,9 @@
gapic_version=package_version.__version__
)
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO
COVER
+ DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
+
class SecretManagerServiceTransport(abc.ABC):
"""Abstract transport class for SecretManagerService."""
@@ -66,9 +70,10 @@
credentials identify the application to the service; if none
are specified, the client will attempt to ascertain the
credentials from the environment.
- credentials_file (Optional[str]): A file with credentials that can
+ credentials_file (Optional[str]): Deprecated. A file with
credentials that can
be loaded with :func:`google.auth.load_credentials_from_file`.
- This argument is mutually exclusive with credentials.
+ This argument is mutually exclusive with credentials. This
argument will be
+ removed in the next major version of this library.
scopes (Optional[Sequence[str]]): A list of scopes.
quota_project_id (Optional[str]): An optional project to use for
billing
and quota.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/grpc.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/grpc.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/grpc.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/grpc.py
2025-10-14 17:22:16.000000000 +0200
@@ -119,8 +119,8 @@
Manages secrets and operations using those secrets. Implements a
REST model with the following objects:
- - [Secret][google.cloud.secretmanager.v1beta2.Secret]
- - [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]
+ - [Secret][google.cloud.secretmanager.v1beta2.Secret]
+ - [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]
This class defines the same methods as the primary client, so the
primary client can load the underlying transport implementation
@@ -160,9 +160,10 @@
are specified, the client will attempt to ascertain the
credentials from the environment.
This argument is ignored if a ``channel`` instance is provided.
- credentials_file (Optional[str]): A file with credentials that can
+ credentials_file (Optional[str]): Deprecated. A file with
credentials that can
be loaded with :func:`google.auth.load_credentials_from_file`.
This argument is ignored if a ``channel`` instance is provided.
+ This argument will be removed in the next major version of
this library.
scopes (Optional(Sequence[str])): A list of scopes. This argument
is
ignored if a ``channel`` instance is provided.
channel (Optional[Union[grpc.Channel, Callable[...,
grpc.Channel]]]):
@@ -295,9 +296,10 @@
credentials identify this application to the service. If
none are specified, the client will attempt to ascertain
the credentials from the environment.
- credentials_file (Optional[str]): A file with credentials that can
+ credentials_file (Optional[str]): Deprecated. A file with
credentials that can
be loaded with :func:`google.auth.load_credentials_from_file`.
- This argument is mutually exclusive with credentials.
+ This argument is mutually exclusive with credentials. This
argument will be
+ removed in the next major version of this library.
scopes (Optional[Sequence[str]]): A optional list of scopes needed
for this
service. These are only used when credentials are not
specified and
are passed to :func:`google.auth.default`.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/grpc_asyncio.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/grpc_asyncio.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/grpc_asyncio.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/grpc_asyncio.py
2025-10-14 17:22:12.000000000 +0200
@@ -125,8 +125,8 @@
Manages secrets and operations using those secrets. Implements a
REST model with the following objects:
- - [Secret][google.cloud.secretmanager.v1beta2.Secret]
- - [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]
+ - [Secret][google.cloud.secretmanager.v1beta2.Secret]
+ - [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]
This class defines the same methods as the primary client, so the
primary client can load the underlying transport implementation
@@ -157,8 +157,9 @@
credentials identify this application to the service. If
none are specified, the client will attempt to ascertain
the credentials from the environment.
- credentials_file (Optional[str]): A file with credentials that can
- be loaded with :func:`google.auth.load_credentials_from_file`.
+ credentials_file (Optional[str]): Deprecated. A file with
credentials that can
+ be loaded with :func:`google.auth.load_credentials_from_file`.
This argument will be
+ removed in the next major version of this library.
scopes (Optional[Sequence[str]]): A optional list of scopes needed
for this
service. These are only used when credentials are not
specified and
are passed to :func:`google.auth.default`.
@@ -209,9 +210,10 @@
are specified, the client will attempt to ascertain the
credentials from the environment.
This argument is ignored if a ``channel`` instance is provided.
- credentials_file (Optional[str]): A file with credentials that can
+ credentials_file (Optional[str]): Deprecated. A file with
credentials that can
be loaded with :func:`google.auth.load_credentials_from_file`.
This argument is ignored if a ``channel`` instance is provided.
+ This argument will be removed in the next major version of
this library.
scopes (Optional[Sequence[str]]): A optional list of scopes needed
for this
service. These are only used when credentials are not
specified and
are passed to :func:`google.auth.default`.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/rest.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/rest.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/rest.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/services/secret_manager_service/transports/rest.py
2025-10-14 17:22:16.000000000 +0200
@@ -27,6 +27,7 @@
from google.cloud.location import locations_pb2 # type: ignore
from google.iam.v1 import iam_policy_pb2 # type: ignore
from google.iam.v1 import policy_pb2 # type: ignore
+import google.protobuf
from google.protobuf import empty_pb2 # type: ignore
from google.protobuf import json_format
from requests import __version__ as requests_version
@@ -56,6 +57,9 @@
rest_version=f"requests@{requests_version}",
)
+if hasattr(DEFAULT_CLIENT_INFO, "protobuf_runtime_version"): # pragma: NO
COVER
+ DEFAULT_CLIENT_INFO.protobuf_runtime_version = google.protobuf.__version__
+
class SecretManagerServiceRestInterceptor:
"""Interceptor for SecretManagerService.
@@ -934,8 +938,8 @@
Manages secrets and operations using those secrets. Implements a
REST model with the following objects:
- - [Secret][google.cloud.secretmanager.v1beta2.Secret]
- - [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]
+ - [Secret][google.cloud.secretmanager.v1beta2.Secret]
+ - [SecretVersion][google.cloud.secretmanager.v1beta2.SecretVersion]
This class defines the same methods as the primary client, so the
primary client can load the underlying transport implementation
@@ -970,9 +974,10 @@
are specified, the client will attempt to ascertain the
credentials from the environment.
- credentials_file (Optional[str]): A file with credentials that can
+ credentials_file (Optional[str]): Deprecated. A file with
credentials that can
be loaded with :func:`google.auth.load_credentials_from_file`.
- This argument is ignored if ``channel`` is provided.
+ This argument is ignored if ``channel`` is provided. This
argument will be
+ removed in the next major version of this library.
scopes (Optional(Sequence[str])): A list of scopes. This argument
is
ignored if ``channel`` is provided.
client_cert_source_for_mtls (Callable[[], Tuple[bytes, bytes]]):
Client
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/types/resources.py
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/types/resources.py
---
old/google_cloud_secret_manager-2.23.3/google/cloud/secretmanager_v1beta2/types/resources.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google/cloud/secretmanager_v1beta2/types/resources.py
2025-10-14 17:22:14.000000000 +0200
@@ -112,7 +112,7 @@
A version alias is a string with a maximum length of 63
characters and can contain uppercase and lowercase letters,
- numerals, and the hyphen (``-``) and underscore ('_')
+ numerals, and the hyphen (``-``) and underscore ('\_')
characters. An alias string must start with a letter and
cannot be the string 'latest' or 'NEW'. No more than 50
aliases can be assigned to a given secret.
@@ -130,7 +130,7 @@
Annotation keys must be between 1 and 63 characters long,
have a UTF-8 encoding of maximum 128 bytes, begin and end
with an alphanumeric character ([a-z0-9A-Z]), and may have
- dashes (-), underscores (_), dots (.), and alphanumerics in
+ dashes (-), underscores (\_), dots (.), and alphanumerics in
between these symbols.
The total size of annotation keys and values must be less
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google_cloud_secret_manager.egg-info/PKG-INFO
new/google_cloud_secret_manager-2.25.0/google_cloud_secret_manager.egg-info/PKG-INFO
---
old/google_cloud_secret_manager-2.23.3/google_cloud_secret_manager.egg-info/PKG-INFO
2025-04-17 21:01:16.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google_cloud_secret_manager.egg-info/PKG-INFO
2025-10-14 17:24:46.000000000 +0200
@@ -1,6 +1,6 @@
-Metadata-Version: 2.1
+Metadata-Version: 2.4
Name: google-cloud-secret-manager
-Version: 2.23.3
+Version: 2.25.0
Summary: Google Cloud Secret Manager API client library
Home-page:
https://github.com/googleapis/google-cloud-python/tree/main/packages/google-cloud-secret-manager
Author: Google LLC
@@ -19,16 +19,30 @@
Classifier: Programming Language :: Python :: 3.11
Classifier: Programming Language :: Python :: 3.12
Classifier: Programming Language :: Python :: 3.13
+Classifier: Programming Language :: Python :: 3.14
Classifier: Operating System :: OS Independent
Classifier: Topic :: Internet
Requires-Python: >=3.7
License-File: LICENSE
Requires-Dist:
google-api-core[grpc]!=2.0.*,!=2.1.*,!=2.10.*,!=2.2.*,!=2.3.*,!=2.4.*,!=2.5.*,!=2.6.*,!=2.7.*,!=2.8.*,!=2.9.*,<3.0.0,>=1.34.1
Requires-Dist: google-auth!=2.24.0,!=2.25.0,<3.0.0,>=2.14.1
+Requires-Dist: grpcio<2.0.0,>=1.33.2
+Requires-Dist: grpcio<2.0.0,>=1.75.1; python_version >= "3.14"
Requires-Dist: proto-plus<2.0.0,>=1.22.3
Requires-Dist: proto-plus<2.0.0,>=1.25.0; python_version >= "3.13"
Requires-Dist:
protobuf!=4.21.0,!=4.21.1,!=4.21.2,!=4.21.3,!=4.21.4,!=4.21.5,<7.0.0,>=3.20.2
Requires-Dist: grpc-google-iam-v1<1.0.0,>=0.14.0
+Dynamic: author
+Dynamic: author-email
+Dynamic: classifier
+Dynamic: description
+Dynamic: home-page
+Dynamic: license
+Dynamic: license-file
+Dynamic: platform
+Dynamic: requires-dist
+Dynamic: requires-python
+Dynamic: summary
Python Client for Secret Manager
================================
@@ -93,7 +107,7 @@
Our client libraries are compatible with all current `active`_ and
`maintenance`_ versions of
Python.
-Python >= 3.7
+Python >= 3.7, including 3.14
.. _active: https://devguide.python.org/devcycle/#in-development-main-branch
.. _maintenance: https://devguide.python.org/devcycle/#maintenance-branches
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/google_cloud_secret_manager.egg-info/requires.txt
new/google_cloud_secret_manager-2.25.0/google_cloud_secret_manager.egg-info/requires.txt
---
old/google_cloud_secret_manager-2.23.3/google_cloud_secret_manager.egg-info/requires.txt
2025-04-17 21:01:16.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/google_cloud_secret_manager.egg-info/requires.txt
2025-10-14 17:24:46.000000000 +0200
@@ -1,8 +1,12 @@
google-api-core[grpc]!=2.0.*,!=2.1.*,!=2.10.*,!=2.2.*,!=2.3.*,!=2.4.*,!=2.5.*,!=2.6.*,!=2.7.*,!=2.8.*,!=2.9.*,<3.0.0,>=1.34.1
google-auth!=2.24.0,!=2.25.0,<3.0.0,>=2.14.1
+grpcio<2.0.0,>=1.33.2
proto-plus<2.0.0,>=1.22.3
protobuf!=4.21.0,!=4.21.1,!=4.21.2,!=4.21.3,!=4.21.4,!=4.21.5,<7.0.0,>=3.20.2
grpc-google-iam-v1<1.0.0,>=0.14.0
[:python_version >= "3.13"]
proto-plus<2.0.0,>=1.25.0
+
+[:python_version >= "3.14"]
+grpcio<2.0.0,>=1.75.1
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/google_cloud_secret_manager-2.23.3/setup.py
new/google_cloud_secret_manager-2.25.0/setup.py
--- old/google_cloud_secret_manager-2.23.3/setup.py 2025-04-17
20:55:59.000000000 +0200
+++ new/google_cloud_secret_manager-2.25.0/setup.py 2025-10-14
17:22:15.000000000 +0200
@@ -45,6 +45,8 @@
# Exclude incompatible versions of `google-auth`
# See https://github.com/googleapis/google-cloud-python/issues/12364
"google-auth >= 2.14.1, <3.0.0,!=2.24.0,!=2.25.0",
+ "grpcio >= 1.33.2, < 2.0.0",
+ "grpcio >= 1.75.1, < 2.0.0; python_version >= '3.14'",
"proto-plus >= 1.22.3, <2.0.0",
"proto-plus >= 1.25.0, <2.0.0; python_version >= '3.13'",
"protobuf>=3.20.2,<7.0.0,!=4.21.0,!=4.21.1,!=4.21.2,!=4.21.3,!=4.21.4,!=4.21.5",
@@ -87,6 +89,7 @@
"Programming Language :: Python :: 3.11",
"Programming Language :: Python :: 3.12",
"Programming Language :: Python :: 3.13",
+ "Programming Language :: Python :: 3.14",
"Operating System :: OS Independent",
"Topic :: Internet",
],
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/google_cloud_secret_manager-2.23.3/tests/unit/gapic/secretmanager_v1/test_secret_manager_service.py
new/google_cloud_secret_manager-2.25.0/tests/unit/gapic/secretmanager_v1/test_secret_manager_service.py
---
old/google_cloud_secret_manager-2.23.3/tests/unit/gapic/secretmanager_v1/test_secret_manager_service.py
2025-04-17 20:55:59.000000000 +0200
+++
new/google_cloud_secret_manager-2.25.0/tests/unit/gapic/secretmanager_v1/test_secret_manager_service.py
2025-10-14 17:22:16.000000000 +0200
@@ -10302,6 +10302,7 @@
"annotations": {},
"version_destroy_ttl": {},
"customer_managed_encryption": {},
+ "tags": {},
}
# The version of a generated dependency at test runtime may differ from
the version used during generation.
# Delete any fields which are not present in the current runtime dependency
@@ -10778,6 +10779,7 @@
"annotations": {},
"version_destroy_ttl": {},
"customer_managed_encryption": {},
+ "tags": {},
}
# The version of a generated dependency at test runtime may differ from
the version used during generation.
# Delete any fields which are not present in the current runtime dependency