diff --git a/java-security-private-ca/README.md b/java-security-private-ca/README.md index 9fb7e59e7c55..6559ac95b43d 100644 --- a/java-security-private-ca/README.md +++ b/java-security-private-ca/README.md @@ -20,7 +20,7 @@ If you are using Maven with [BOM][libraries-bom], add this to your pom.xml file: com.google.cloud libraries-bom - 26.11.0 + 26.12.0 pom import diff --git a/java-security-private-ca/google-cloud-security-private-ca/src/main/java/com/google/cloud/security/privateca/v1/CertificateAuthorityServiceClient.java b/java-security-private-ca/google-cloud-security-private-ca/src/main/java/com/google/cloud/security/privateca/v1/CertificateAuthorityServiceClient.java index 10ce77aa9fd9..64a3e88d2ba3 100644 --- a/java-security-private-ca/google-cloud-security-private-ca/src/main/java/com/google/cloud/security/privateca/v1/CertificateAuthorityServiceClient.java +++ b/java-security-private-ca/google-cloud-security-private-ca/src/main/java/com/google/cloud/security/privateca/v1/CertificateAuthorityServiceClient.java @@ -1443,6 +1443,7 @@ public final UnaryCallable updateCertific * "[PROJECT]", "[LOCATION]", "[CA_POOL]", "[CERTIFICATE_AUTHORITY]") * .toString()) * .setRequestId("requestId693933066") + * .setIgnoreDependentResources(true) * .build(); * CertificateAuthority response = * certificateAuthorityServiceClient.disableCertificateAuthorityAsync(request).get(); @@ -1478,6 +1479,7 @@ public final UnaryCallable updateCertific * "[PROJECT]", "[LOCATION]", "[CA_POOL]", "[CERTIFICATE_AUTHORITY]") * .toString()) * .setRequestId("requestId693933066") + * .setIgnoreDependentResources(true) * .build(); * OperationFuture future = * certificateAuthorityServiceClient @@ -1515,6 +1517,7 @@ public final UnaryCallable updateCertific * "[PROJECT]", "[LOCATION]", "[CA_POOL]", "[CERTIFICATE_AUTHORITY]") * .toString()) * .setRequestId("requestId693933066") + * .setIgnoreDependentResources(true) * .build(); * ApiFuture future = * certificateAuthorityServiceClient @@ -2489,6 +2492,7 @@ public final ListCertificateAuthoritiesPagedResponse listCertificateAuthorities( * .setRequestId("requestId693933066") * .setIgnoreActiveCertificates(true) * .setSkipGracePeriod(true) + * .setIgnoreDependentResources(true) * .build(); * CertificateAuthority response = * certificateAuthorityServiceClient.deleteCertificateAuthorityAsync(request).get(); @@ -2526,6 +2530,7 @@ public final ListCertificateAuthoritiesPagedResponse listCertificateAuthorities( * .setRequestId("requestId693933066") * .setIgnoreActiveCertificates(true) * .setSkipGracePeriod(true) + * .setIgnoreDependentResources(true) * .build(); * OperationFuture future = * certificateAuthorityServiceClient @@ -2565,6 +2570,7 @@ public final ListCertificateAuthoritiesPagedResponse listCertificateAuthorities( * .setRequestId("requestId693933066") * .setIgnoreActiveCertificates(true) * .setSkipGracePeriod(true) + * .setIgnoreDependentResources(true) * .build(); * ApiFuture future = * certificateAuthorityServiceClient @@ -3402,6 +3408,7 @@ public final OperationFuture deleteCaPoolAsync(String * DeleteCaPoolRequest.newBuilder() * .setName(CaPoolName.of("[PROJECT]", "[LOCATION]", "[CA_POOL]").toString()) * .setRequestId("requestId693933066") + * .setIgnoreDependentResources(true) * .build(); * certificateAuthorityServiceClient.deleteCaPoolAsync(request).get(); * } @@ -3433,6 +3440,7 @@ public final OperationFuture deleteCaPoolAsync( * DeleteCaPoolRequest.newBuilder() * .setName(CaPoolName.of("[PROJECT]", "[LOCATION]", "[CA_POOL]").toString()) * .setRequestId("requestId693933066") + * .setIgnoreDependentResources(true) * .build(); * OperationFuture future = * certificateAuthorityServiceClient.deleteCaPoolOperationCallable().futureCall(request); @@ -3464,6 +3472,7 @@ public final OperationFuture deleteCaPoolAsync( * DeleteCaPoolRequest.newBuilder() * .setName(CaPoolName.of("[PROJECT]", "[LOCATION]", "[CA_POOL]").toString()) * .setRequestId("requestId693933066") + * .setIgnoreDependentResources(true) * .build(); * ApiFuture future = * certificateAuthorityServiceClient.deleteCaPoolCallable().futureCall(request); diff --git a/java-security-private-ca/google-cloud-security-private-ca/src/main/java/com/google/cloud/security/privateca/v1/stub/HttpJsonCertificateAuthorityServiceStub.java b/java-security-private-ca/google-cloud-security-private-ca/src/main/java/com/google/cloud/security/privateca/v1/stub/HttpJsonCertificateAuthorityServiceStub.java index 9a78b7502155..df12711b5caa 100644 --- a/java-security-private-ca/google-cloud-security-private-ca/src/main/java/com/google/cloud/security/privateca/v1/stub/HttpJsonCertificateAuthorityServiceStub.java +++ b/java-security-private-ca/google-cloud-security-private-ca/src/main/java/com/google/cloud/security/privateca/v1/stub/HttpJsonCertificateAuthorityServiceStub.java @@ -675,6 +675,10 @@ public class HttpJsonCertificateAuthorityServiceStub extends CertificateAuthorit fields, "ignoreActiveCertificates", request.getIgnoreActiveCertificates()); + serializer.putQueryParam( + fields, + "ignoreDependentResources", + request.getIgnoreDependentResources()); serializer.putQueryParam(fields, "requestId", request.getRequestId()); serializer.putQueryParam( fields, "skipGracePeriod", request.getSkipGracePeriod()); @@ -925,6 +929,10 @@ public class HttpJsonCertificateAuthorityServiceStub extends CertificateAuthorit Map> fields = new HashMap<>(); ProtoRestSerializer serializer = ProtoRestSerializer.create(); + serializer.putQueryParam( + fields, + "ignoreDependentResources", + request.getIgnoreDependentResources()); serializer.putQueryParam(fields, "requestId", request.getRequestId()); serializer.putQueryParam(fields, "$alt", "json;enum-encoding=int"); return fields; diff --git a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCaPoolRequest.java b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCaPoolRequest.java index d1588a680092..ba2e6bb41e31 100644 --- a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCaPoolRequest.java +++ b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCaPoolRequest.java @@ -199,6 +199,27 @@ public com.google.protobuf.ByteString getRequestIdBytes() { } } + public static final int IGNORE_DEPENDENT_RESOURCES_FIELD_NUMBER = 4; + private boolean ignoreDependentResources_ = false; + /** + * + * + *
+   * Optional. This field allows this pool to be deleted even if it's being
+   * depended on by another resource. However, doing so may result in unintended
+   * and unrecoverable effects on any dependent resource(s) since the pool will
+   * no longer be able to issue certificates.
+   * 
+ * + * bool ignore_dependent_resources = 4 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The ignoreDependentResources. + */ + @java.lang.Override + public boolean getIgnoreDependentResources() { + return ignoreDependentResources_; + } + private byte memoizedIsInitialized = -1; @java.lang.Override @@ -219,6 +240,9 @@ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(requestId_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 2, requestId_); } + if (ignoreDependentResources_ != false) { + output.writeBool(4, ignoreDependentResources_); + } getUnknownFields().writeTo(output); } @@ -234,6 +258,9 @@ public int getSerializedSize() { if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(requestId_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(2, requestId_); } + if (ignoreDependentResources_ != false) { + size += com.google.protobuf.CodedOutputStream.computeBoolSize(4, ignoreDependentResources_); + } size += getUnknownFields().getSerializedSize(); memoizedSize = size; return size; @@ -252,6 +279,7 @@ public boolean equals(final java.lang.Object obj) { if (!getName().equals(other.getName())) return false; if (!getRequestId().equals(other.getRequestId())) return false; + if (getIgnoreDependentResources() != other.getIgnoreDependentResources()) return false; if (!getUnknownFields().equals(other.getUnknownFields())) return false; return true; } @@ -267,6 +295,8 @@ public int hashCode() { hash = (53 * hash) + getName().hashCode(); hash = (37 * hash) + REQUEST_ID_FIELD_NUMBER; hash = (53 * hash) + getRequestId().hashCode(); + hash = (37 * hash) + IGNORE_DEPENDENT_RESOURCES_FIELD_NUMBER; + hash = (53 * hash) + com.google.protobuf.Internal.hashBoolean(getIgnoreDependentResources()); hash = (29 * hash) + getUnknownFields().hashCode(); memoizedHashCode = hash; return hash; @@ -410,6 +440,7 @@ public Builder clear() { bitField0_ = 0; name_ = ""; requestId_ = ""; + ignoreDependentResources_ = false; return this; } @@ -452,6 +483,9 @@ private void buildPartial0(com.google.cloud.security.privateca.v1.DeleteCaPoolRe if (((from_bitField0_ & 0x00000002) != 0)) { result.requestId_ = requestId_; } + if (((from_bitField0_ & 0x00000004) != 0)) { + result.ignoreDependentResources_ = ignoreDependentResources_; + } } @java.lang.Override @@ -510,6 +544,9 @@ public Builder mergeFrom(com.google.cloud.security.privateca.v1.DeleteCaPoolRequ bitField0_ |= 0x00000002; onChanged(); } + if (other.getIgnoreDependentResources() != false) { + setIgnoreDependentResources(other.getIgnoreDependentResources()); + } this.mergeUnknownFields(other.getUnknownFields()); onChanged(); return this; @@ -548,6 +585,12 @@ public Builder mergeFrom( bitField0_ |= 0x00000002; break; } // case 18 + case 32: + { + ignoreDependentResources_ = input.readBool(); + bitField0_ |= 0x00000004; + break; + } // case 32 default: { if (!super.parseUnknownField(input, extensionRegistry, tag)) { @@ -849,6 +892,68 @@ public Builder setRequestIdBytes(com.google.protobuf.ByteString value) { return this; } + private boolean ignoreDependentResources_; + /** + * + * + *
+     * Optional. This field allows this pool to be deleted even if it's being
+     * depended on by another resource. However, doing so may result in unintended
+     * and unrecoverable effects on any dependent resource(s) since the pool will
+     * no longer be able to issue certificates.
+     * 
+ * + * bool ignore_dependent_resources = 4 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The ignoreDependentResources. + */ + @java.lang.Override + public boolean getIgnoreDependentResources() { + return ignoreDependentResources_; + } + /** + * + * + *
+     * Optional. This field allows this pool to be deleted even if it's being
+     * depended on by another resource. However, doing so may result in unintended
+     * and unrecoverable effects on any dependent resource(s) since the pool will
+     * no longer be able to issue certificates.
+     * 
+ * + * bool ignore_dependent_resources = 4 [(.google.api.field_behavior) = OPTIONAL]; + * + * @param value The ignoreDependentResources to set. + * @return This builder for chaining. + */ + public Builder setIgnoreDependentResources(boolean value) { + + ignoreDependentResources_ = value; + bitField0_ |= 0x00000004; + onChanged(); + return this; + } + /** + * + * + *
+     * Optional. This field allows this pool to be deleted even if it's being
+     * depended on by another resource. However, doing so may result in unintended
+     * and unrecoverable effects on any dependent resource(s) since the pool will
+     * no longer be able to issue certificates.
+     * 
+ * + * bool ignore_dependent_resources = 4 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return This builder for chaining. + */ + public Builder clearIgnoreDependentResources() { + bitField0_ = (bitField0_ & ~0x00000004); + ignoreDependentResources_ = false; + onChanged(); + return this; + } + @java.lang.Override public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { return super.setUnknownFields(unknownFields); diff --git a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCaPoolRequestOrBuilder.java b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCaPoolRequestOrBuilder.java index 8f968b02ea2d..093e7a3153a9 100644 --- a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCaPoolRequestOrBuilder.java +++ b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCaPoolRequestOrBuilder.java @@ -100,4 +100,20 @@ public interface DeleteCaPoolRequestOrBuilder * @return The bytes for requestId. */ com.google.protobuf.ByteString getRequestIdBytes(); + + /** + * + * + *
+   * Optional. This field allows this pool to be deleted even if it's being
+   * depended on by another resource. However, doing so may result in unintended
+   * and unrecoverable effects on any dependent resource(s) since the pool will
+   * no longer be able to issue certificates.
+   * 
+ * + * bool ignore_dependent_resources = 4 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The ignoreDependentResources. + */ + boolean getIgnoreDependentResources(); } diff --git a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCertificateAuthorityRequest.java b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCertificateAuthorityRequest.java index 01d1c2e6cde9..4d3fd572a527 100644 --- a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCertificateAuthorityRequest.java +++ b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCertificateAuthorityRequest.java @@ -239,6 +239,27 @@ public boolean getSkipGracePeriod() { return skipGracePeriod_; } + public static final int IGNORE_DEPENDENT_RESOURCES_FIELD_NUMBER = 6; + private boolean ignoreDependentResources_ = false; + /** + * + * + *
+   * Optional. This field allows this ca to be deleted even if it's being
+   * depended on by another resource. However, doing so may result in unintended
+   * and unrecoverable effects on any dependent resource(s) since the CA will
+   * no longer be able to issue certificates.
+   * 
+ * + * bool ignore_dependent_resources = 6 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The ignoreDependentResources. + */ + @java.lang.Override + public boolean getIgnoreDependentResources() { + return ignoreDependentResources_; + } + private byte memoizedIsInitialized = -1; @java.lang.Override @@ -265,6 +286,9 @@ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io if (skipGracePeriod_ != false) { output.writeBool(5, skipGracePeriod_); } + if (ignoreDependentResources_ != false) { + output.writeBool(6, ignoreDependentResources_); + } getUnknownFields().writeTo(output); } @@ -286,6 +310,9 @@ public int getSerializedSize() { if (skipGracePeriod_ != false) { size += com.google.protobuf.CodedOutputStream.computeBoolSize(5, skipGracePeriod_); } + if (ignoreDependentResources_ != false) { + size += com.google.protobuf.CodedOutputStream.computeBoolSize(6, ignoreDependentResources_); + } size += getUnknownFields().getSerializedSize(); memoizedSize = size; return size; @@ -307,6 +334,7 @@ public boolean equals(final java.lang.Object obj) { if (!getRequestId().equals(other.getRequestId())) return false; if (getIgnoreActiveCertificates() != other.getIgnoreActiveCertificates()) return false; if (getSkipGracePeriod() != other.getSkipGracePeriod()) return false; + if (getIgnoreDependentResources() != other.getIgnoreDependentResources()) return false; if (!getUnknownFields().equals(other.getUnknownFields())) return false; return true; } @@ -326,6 +354,8 @@ public int hashCode() { hash = (53 * hash) + com.google.protobuf.Internal.hashBoolean(getIgnoreActiveCertificates()); hash = (37 * hash) + SKIP_GRACE_PERIOD_FIELD_NUMBER; hash = (53 * hash) + com.google.protobuf.Internal.hashBoolean(getSkipGracePeriod()); + hash = (37 * hash) + IGNORE_DEPENDENT_RESOURCES_FIELD_NUMBER; + hash = (53 * hash) + com.google.protobuf.Internal.hashBoolean(getIgnoreDependentResources()); hash = (29 * hash) + getUnknownFields().hashCode(); memoizedHashCode = hash; return hash; @@ -474,6 +504,7 @@ public Builder clear() { requestId_ = ""; ignoreActiveCertificates_ = false; skipGracePeriod_ = false; + ignoreDependentResources_ = false; return this; } @@ -526,6 +557,9 @@ private void buildPartial0( if (((from_bitField0_ & 0x00000008) != 0)) { result.skipGracePeriod_ = skipGracePeriod_; } + if (((from_bitField0_ & 0x00000010) != 0)) { + result.ignoreDependentResources_ = ignoreDependentResources_; + } } @java.lang.Override @@ -594,6 +628,9 @@ public Builder mergeFrom( if (other.getSkipGracePeriod() != false) { setSkipGracePeriod(other.getSkipGracePeriod()); } + if (other.getIgnoreDependentResources() != false) { + setIgnoreDependentResources(other.getIgnoreDependentResources()); + } this.mergeUnknownFields(other.getUnknownFields()); onChanged(); return this; @@ -644,6 +681,12 @@ public Builder mergeFrom( bitField0_ |= 0x00000008; break; } // case 40 + case 48: + { + ignoreDependentResources_ = input.readBool(); + bitField0_ |= 0x00000010; + break; + } // case 48 default: { if (!super.parseUnknownField(input, extensionRegistry, tag)) { @@ -1060,6 +1103,68 @@ public Builder clearSkipGracePeriod() { return this; } + private boolean ignoreDependentResources_; + /** + * + * + *
+     * Optional. This field allows this ca to be deleted even if it's being
+     * depended on by another resource. However, doing so may result in unintended
+     * and unrecoverable effects on any dependent resource(s) since the CA will
+     * no longer be able to issue certificates.
+     * 
+ * + * bool ignore_dependent_resources = 6 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The ignoreDependentResources. + */ + @java.lang.Override + public boolean getIgnoreDependentResources() { + return ignoreDependentResources_; + } + /** + * + * + *
+     * Optional. This field allows this ca to be deleted even if it's being
+     * depended on by another resource. However, doing so may result in unintended
+     * and unrecoverable effects on any dependent resource(s) since the CA will
+     * no longer be able to issue certificates.
+     * 
+ * + * bool ignore_dependent_resources = 6 [(.google.api.field_behavior) = OPTIONAL]; + * + * @param value The ignoreDependentResources to set. + * @return This builder for chaining. + */ + public Builder setIgnoreDependentResources(boolean value) { + + ignoreDependentResources_ = value; + bitField0_ |= 0x00000010; + onChanged(); + return this; + } + /** + * + * + *
+     * Optional. This field allows this ca to be deleted even if it's being
+     * depended on by another resource. However, doing so may result in unintended
+     * and unrecoverable effects on any dependent resource(s) since the CA will
+     * no longer be able to issue certificates.
+     * 
+ * + * bool ignore_dependent_resources = 6 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return This builder for chaining. + */ + public Builder clearIgnoreDependentResources() { + bitField0_ = (bitField0_ & ~0x00000010); + ignoreDependentResources_ = false; + onChanged(); + return this; + } + @java.lang.Override public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { return super.setUnknownFields(unknownFields); diff --git a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCertificateAuthorityRequestOrBuilder.java b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCertificateAuthorityRequestOrBuilder.java index eba7ad201606..c333c2b63987 100644 --- a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCertificateAuthorityRequestOrBuilder.java +++ b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCertificateAuthorityRequestOrBuilder.java @@ -129,4 +129,20 @@ public interface DeleteCertificateAuthorityRequestOrBuilder * @return The skipGracePeriod. */ boolean getSkipGracePeriod(); + + /** + * + * + *
+   * Optional. This field allows this ca to be deleted even if it's being
+   * depended on by another resource. However, doing so may result in unintended
+   * and unrecoverable effects on any dependent resource(s) since the CA will
+   * no longer be able to issue certificates.
+   * 
+ * + * bool ignore_dependent_resources = 6 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The ignoreDependentResources. + */ + boolean getIgnoreDependentResources(); } diff --git a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DisableCertificateAuthorityRequest.java b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DisableCertificateAuthorityRequest.java index f99bad256d90..b5f647f93d12 100644 --- a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DisableCertificateAuthorityRequest.java +++ b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DisableCertificateAuthorityRequest.java @@ -201,6 +201,27 @@ public com.google.protobuf.ByteString getRequestIdBytes() { } } + public static final int IGNORE_DEPENDENT_RESOURCES_FIELD_NUMBER = 3; + private boolean ignoreDependentResources_ = false; + /** + * + * + *
+   * Optional. This field allows this CA to be disabled even if it's being
+   * depended on by another resource. However, doing so may result in unintended
+   * and unrecoverable effects on any dependent resource(s) since the CA will
+   * no longer be able to issue certificates.
+   * 
+ * + * bool ignore_dependent_resources = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The ignoreDependentResources. + */ + @java.lang.Override + public boolean getIgnoreDependentResources() { + return ignoreDependentResources_; + } + private byte memoizedIsInitialized = -1; @java.lang.Override @@ -221,6 +242,9 @@ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(requestId_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 2, requestId_); } + if (ignoreDependentResources_ != false) { + output.writeBool(3, ignoreDependentResources_); + } getUnknownFields().writeTo(output); } @@ -236,6 +260,9 @@ public int getSerializedSize() { if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(requestId_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(2, requestId_); } + if (ignoreDependentResources_ != false) { + size += com.google.protobuf.CodedOutputStream.computeBoolSize(3, ignoreDependentResources_); + } size += getUnknownFields().getSerializedSize(); memoizedSize = size; return size; @@ -255,6 +282,7 @@ public boolean equals(final java.lang.Object obj) { if (!getName().equals(other.getName())) return false; if (!getRequestId().equals(other.getRequestId())) return false; + if (getIgnoreDependentResources() != other.getIgnoreDependentResources()) return false; if (!getUnknownFields().equals(other.getUnknownFields())) return false; return true; } @@ -270,6 +298,8 @@ public int hashCode() { hash = (53 * hash) + getName().hashCode(); hash = (37 * hash) + REQUEST_ID_FIELD_NUMBER; hash = (53 * hash) + getRequestId().hashCode(); + hash = (37 * hash) + IGNORE_DEPENDENT_RESOURCES_FIELD_NUMBER; + hash = (53 * hash) + com.google.protobuf.Internal.hashBoolean(getIgnoreDependentResources()); hash = (29 * hash) + getUnknownFields().hashCode(); memoizedHashCode = hash; return hash; @@ -416,6 +446,7 @@ public Builder clear() { bitField0_ = 0; name_ = ""; requestId_ = ""; + ignoreDependentResources_ = false; return this; } @@ -463,6 +494,9 @@ private void buildPartial0( if (((from_bitField0_ & 0x00000002) != 0)) { result.requestId_ = requestId_; } + if (((from_bitField0_ & 0x00000004) != 0)) { + result.ignoreDependentResources_ = ignoreDependentResources_; + } } @java.lang.Override @@ -525,6 +559,9 @@ public Builder mergeFrom( bitField0_ |= 0x00000002; onChanged(); } + if (other.getIgnoreDependentResources() != false) { + setIgnoreDependentResources(other.getIgnoreDependentResources()); + } this.mergeUnknownFields(other.getUnknownFields()); onChanged(); return this; @@ -563,6 +600,12 @@ public Builder mergeFrom( bitField0_ |= 0x00000002; break; } // case 18 + case 24: + { + ignoreDependentResources_ = input.readBool(); + bitField0_ |= 0x00000004; + break; + } // case 24 default: { if (!super.parseUnknownField(input, extensionRegistry, tag)) { @@ -864,6 +907,68 @@ public Builder setRequestIdBytes(com.google.protobuf.ByteString value) { return this; } + private boolean ignoreDependentResources_; + /** + * + * + *
+     * Optional. This field allows this CA to be disabled even if it's being
+     * depended on by another resource. However, doing so may result in unintended
+     * and unrecoverable effects on any dependent resource(s) since the CA will
+     * no longer be able to issue certificates.
+     * 
+ * + * bool ignore_dependent_resources = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The ignoreDependentResources. + */ + @java.lang.Override + public boolean getIgnoreDependentResources() { + return ignoreDependentResources_; + } + /** + * + * + *
+     * Optional. This field allows this CA to be disabled even if it's being
+     * depended on by another resource. However, doing so may result in unintended
+     * and unrecoverable effects on any dependent resource(s) since the CA will
+     * no longer be able to issue certificates.
+     * 
+ * + * bool ignore_dependent_resources = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @param value The ignoreDependentResources to set. + * @return This builder for chaining. + */ + public Builder setIgnoreDependentResources(boolean value) { + + ignoreDependentResources_ = value; + bitField0_ |= 0x00000004; + onChanged(); + return this; + } + /** + * + * + *
+     * Optional. This field allows this CA to be disabled even if it's being
+     * depended on by another resource. However, doing so may result in unintended
+     * and unrecoverable effects on any dependent resource(s) since the CA will
+     * no longer be able to issue certificates.
+     * 
+ * + * bool ignore_dependent_resources = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return This builder for chaining. + */ + public Builder clearIgnoreDependentResources() { + bitField0_ = (bitField0_ & ~0x00000004); + ignoreDependentResources_ = false; + onChanged(); + return this; + } + @java.lang.Override public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { return super.setUnknownFields(unknownFields); diff --git a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DisableCertificateAuthorityRequestOrBuilder.java b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DisableCertificateAuthorityRequestOrBuilder.java index bda9c6fdfbff..10653c2cf5b5 100644 --- a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DisableCertificateAuthorityRequestOrBuilder.java +++ b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DisableCertificateAuthorityRequestOrBuilder.java @@ -100,4 +100,20 @@ public interface DisableCertificateAuthorityRequestOrBuilder * @return The bytes for requestId. */ com.google.protobuf.ByteString getRequestIdBytes(); + + /** + * + * + *
+   * Optional. This field allows this CA to be disabled even if it's being
+   * depended on by another resource. However, doing so may result in unintended
+   * and unrecoverable effects on any dependent resource(s) since the CA will
+   * no longer be able to issue certificates.
+   * 
+ * + * bool ignore_dependent_resources = 3 [(.google.api.field_behavior) = OPTIONAL]; + * + * @return The ignoreDependentResources. + */ + boolean getIgnoreDependentResources(); } diff --git a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/PrivateCaProto.java b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/PrivateCaProto.java index c3bb0b0b77f4..40e7fac178e7 100644 --- a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/PrivateCaProto.java +++ b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/PrivateCaProto.java @@ -195,361 +195,365 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() { + "behavior.proto\032\031google/api/resource.prot" + "o\0322google/cloud/security/privateca/v1/re" + "sources.proto\032#google/longrunning/operat" - + "ions.proto\032 google/protobuf/field_mask.p" - + "roto\032\037google/protobuf/timestamp.proto\"\237\002" - + "\n\030CreateCertificateRequest\0227\n\006parent\030\001 \001" - + "(\tB\'\340A\002\372A!\n\037privateca.googleapis.com/CaP" - + "ool\022\033\n\016certificate_id\030\002 \001(\tB\003\340A\001\022I\n\013cert" - + "ificate\030\003 \001(\0132/.google.cloud.security.pr" - + "ivateca.v1.CertificateB\003\340A\002\022\027\n\nrequest_i" - + "d\030\004 \001(\tB\003\340A\001\022\032\n\rvalidate_only\030\005 \001(\010B\003\340A\001" - + "\022-\n issuing_certificate_authority_id\030\006 \001" - + "(\tB\003\340A\001\"S\n\025GetCertificateRequest\022:\n\004name" - + "\030\001 \001(\tB,\340A\002\372A&\n$privateca.googleapis.com" - + "/Certificate\"\257\001\n\027ListCertificatesRequest" - + "\0227\n\006parent\030\001 \001(\tB\'\340A\002\372A!\n\037privateca.goog" - + "leapis.com/CaPool\022\026\n\tpage_size\030\002 \001(\005B\003\340A" - + "\001\022\027\n\npage_token\030\003 \001(\tB\003\340A\001\022\023\n\006filter\030\004 \001" - + "(\tB\003\340A\001\022\025\n\010order_by\030\005 \001(\tB\003\340A\001\"\217\001\n\030ListC" - + "ertificatesResponse\022E\n\014certificates\030\001 \003(" - + "\0132/.google.cloud.security.privateca.v1.C" - + "ertificate\022\027\n\017next_page_token\030\002 \001(\t\022\023\n\013u" - + "nreachable\030\003 \003(\t\"\272\001\n\030RevokeCertificateRe" - + "quest\022:\n\004name\030\001 \001(\tB,\340A\002\372A&\n$privateca.g" - + "oogleapis.com/Certificate\022I\n\006reason\030\002 \001(" - + "\01624.google.cloud.security.privateca.v1.R" - + "evocationReasonB\003\340A\002\022\027\n\nrequest_id\030\003 \001(\t" - + "B\003\340A\001\"\264\001\n\030UpdateCertificateRequest\022I\n\013ce" - + "rtificate\030\001 \001(\0132/.google.cloud.security." - + "privateca.v1.CertificateB\003\340A\002\0224\n\013update_" - + "mask\030\002 \001(\0132\032.google.protobuf.FieldMaskB\003" - + "\340A\002\022\027\n\nrequest_id\030\003 \001(\tB\003\340A\001\"\374\001\n#Activat" + + "ions.proto\032\033google/protobuf/empty.proto\032" + + " google/protobuf/field_mask.proto\032\037googl" + + "e/protobuf/timestamp.proto\"\237\002\n\030CreateCer" + + "tificateRequest\0227\n\006parent\030\001 \001(\tB\'\340A\002\372A!\n" + + "\037privateca.googleapis.com/CaPool\022\033\n\016cert" + + "ificate_id\030\002 \001(\tB\003\340A\001\022I\n\013certificate\030\003 \001" + + "(\0132/.google.cloud.security.privateca.v1." + + "CertificateB\003\340A\002\022\027\n\nrequest_id\030\004 \001(\tB\003\340A" + + "\001\022\032\n\rvalidate_only\030\005 \001(\010B\003\340A\001\022-\n issuing" + + "_certificate_authority_id\030\006 \001(\tB\003\340A\001\"S\n\025" + + "GetCertificateRequest\022:\n\004name\030\001 \001(\tB,\340A\002" + + "\372A&\n$privateca.googleapis.com/Certificat" + + "e\"\257\001\n\027ListCertificatesRequest\0227\n\006parent\030" + + "\001 \001(\tB\'\340A\002\372A!\n\037privateca.googleapis.com/" + + "CaPool\022\026\n\tpage_size\030\002 \001(\005B\003\340A\001\022\027\n\npage_t" + + "oken\030\003 \001(\tB\003\340A\001\022\023\n\006filter\030\004 \001(\tB\003\340A\001\022\025\n\010" + + "order_by\030\005 \001(\tB\003\340A\001\"\217\001\n\030ListCertificates" + + "Response\022E\n\014certificates\030\001 \003(\0132/.google." + + "cloud.security.privateca.v1.Certificate\022" + + "\027\n\017next_page_token\030\002 \001(\t\022\023\n\013unreachable\030" + + "\003 \003(\t\"\272\001\n\030RevokeCertificateRequest\022:\n\004na" + + "me\030\001 \001(\tB,\340A\002\372A&\n$privateca.googleapis.c" + + "om/Certificate\022I\n\006reason\030\002 \001(\01624.google." + + "cloud.security.privateca.v1.RevocationRe" + + "asonB\003\340A\002\022\027\n\nrequest_id\030\003 \001(\tB\003\340A\001\"\264\001\n\030U" + + "pdateCertificateRequest\022I\n\013certificate\030\001" + + " \001(\0132/.google.cloud.security.privateca.v" + + "1.CertificateB\003\340A\002\0224\n\013update_mask\030\002 \001(\0132" + + "\032.google.protobuf.FieldMaskB\003\340A\002\022\027\n\nrequ" + + "est_id\030\003 \001(\tB\003\340A\001\"\374\001\n#ActivateCertificat" + + "eAuthorityRequest\022C\n\004name\030\001 \001(\tB5\340A\002\372A/\n" + + "-privateca.googleapis.com/CertificateAut" + + "hority\022\037\n\022pem_ca_certificate\030\002 \001(\tB\003\340A\002\022" + + "V\n\022subordinate_config\030\003 \001(\01325.google.clo" + + "ud.security.privateca.v1.SubordinateConf" + + "igB\003\340A\002\022\027\n\nrequest_id\030\004 \001(\tB\003\340A\001\"\372\001\n!Cre" + + "ateCertificateAuthorityRequest\0227\n\006parent" + + "\030\001 \001(\tB\'\340A\002\372A!\n\037privateca.googleapis.com" + + "/CaPool\022%\n\030certificate_authority_id\030\002 \001(" + + "\tB\003\340A\002\022\\\n\025certificate_authority\030\003 \001(\01328." + + "google.cloud.security.privateca.v1.Certi" + + "ficateAuthorityB\003\340A\002\022\027\n\nrequest_id\030\004 \001(\t" + + "B\003\340A\001\"\253\001\n\"DisableCertificateAuthorityReq" + + "uest\022C\n\004name\030\001 \001(\tB5\340A\002\372A/\n-privateca.go" + + "ogleapis.com/CertificateAuthority\022\027\n\nreq" + + "uest_id\030\002 \001(\tB\003\340A\001\022\'\n\032ignore_dependent_r" + + "esources\030\003 \001(\010B\003\340A\001\"\201\001\n!EnableCertificat" + + "eAuthorityRequest\022C\n\004name\030\001 \001(\tB5\340A\002\372A/\n" + + "-privateca.googleapis.com/CertificateAut" + + "hority\022\027\n\nrequest_id\030\002 \001(\tB\003\340A\001\"j\n#Fetch" + + "CertificateAuthorityCsrRequest\022C\n\004name\030\001" + + " \001(\tB5\340A\002\372A/\n-privateca.googleapis.com/C" + + "ertificateAuthority\"<\n$FetchCertificateA" + + "uthorityCsrResponse\022\024\n\007pem_csr\030\001 \001(\tB\003\340A" + + "\003\"e\n\036GetCertificateAuthorityRequest\022C\n\004n" + + "ame\030\001 \001(\tB5\340A\002\372A/\n-privateca.googleapis." + + "com/CertificateAuthority\"\271\001\n!ListCertifi" + + "cateAuthoritiesRequest\0227\n\006parent\030\001 \001(\tB\'" + + "\340A\002\372A!\n\037privateca.googleapis.com/CaPool\022" + + "\026\n\tpage_size\030\002 \001(\005B\003\340A\001\022\027\n\npage_token\030\003 " + + "\001(\tB\003\340A\001\022\023\n\006filter\030\004 \001(\tB\003\340A\001\022\025\n\010order_b" + + "y\030\005 \001(\tB\003\340A\001\"\255\001\n\"ListCertificateAuthorit" + + "iesResponse\022Y\n\027certificate_authorities\030\001" + + " \003(\01328.google.cloud.security.privateca.v" + + "1.CertificateAuthority\022\027\n\017next_page_toke" + + "n\030\002 \001(\t\022\023\n\013unreachable\030\003 \003(\t\"\203\001\n#Undelet" + "eCertificateAuthorityRequest\022C\n\004name\030\001 \001" + "(\tB5\340A\002\372A/\n-privateca.googleapis.com/Cer" - + "tificateAuthority\022\037\n\022pem_ca_certificate\030" - + "\002 \001(\tB\003\340A\002\022V\n\022subordinate_config\030\003 \001(\01325" - + ".google.cloud.security.privateca.v1.Subo" - + "rdinateConfigB\003\340A\002\022\027\n\nrequest_id\030\004 \001(\tB\003" - + "\340A\001\"\372\001\n!CreateCertificateAuthorityReques" - + "t\0227\n\006parent\030\001 \001(\tB\'\340A\002\372A!\n\037privateca.goo" - + "gleapis.com/CaPool\022%\n\030certificate_author" - + "ity_id\030\002 \001(\tB\003\340A\002\022\\\n\025certificate_authori" - + "ty\030\003 \001(\01328.google.cloud.security.private" - + "ca.v1.CertificateAuthorityB\003\340A\002\022\027\n\nreque" - + "st_id\030\004 \001(\tB\003\340A\001\"\202\001\n\"DisableCertificateA" - + "uthorityRequest\022C\n\004name\030\001 \001(\tB5\340A\002\372A/\n-p" - + "rivateca.googleapis.com/CertificateAutho" - + "rity\022\027\n\nrequest_id\030\002 \001(\tB\003\340A\001\"\201\001\n!Enable" - + "CertificateAuthorityRequest\022C\n\004name\030\001 \001(" - + "\tB5\340A\002\372A/\n-privateca.googleapis.com/Cert" - + "ificateAuthority\022\027\n\nrequest_id\030\002 \001(\tB\003\340A" - + "\001\"j\n#FetchCertificateAuthorityCsrRequest" + + "tificateAuthority\022\027\n\nrequest_id\030\002 \001(\tB\003\340" + + "A\001\"\363\001\n!DeleteCertificateAuthorityRequest" + "\022C\n\004name\030\001 \001(\tB5\340A\002\372A/\n-privateca.google" - + "apis.com/CertificateAuthority\"<\n$FetchCe" - + "rtificateAuthorityCsrResponse\022\024\n\007pem_csr" - + "\030\001 \001(\tB\003\340A\003\"e\n\036GetCertificateAuthorityRe" - + "quest\022C\n\004name\030\001 \001(\tB5\340A\002\372A/\n-privateca.g" - + "oogleapis.com/CertificateAuthority\"\271\001\n!L" - + "istCertificateAuthoritiesRequest\0227\n\006pare" - + "nt\030\001 \001(\tB\'\340A\002\372A!\n\037privateca.googleapis.c" - + "om/CaPool\022\026\n\tpage_size\030\002 \001(\005B\003\340A\001\022\027\n\npag" - + "e_token\030\003 \001(\tB\003\340A\001\022\023\n\006filter\030\004 \001(\tB\003\340A\001\022" - + "\025\n\010order_by\030\005 \001(\tB\003\340A\001\"\255\001\n\"ListCertifica" - + "teAuthoritiesResponse\022Y\n\027certificate_aut" - + "horities\030\001 \003(\01328.google.cloud.security.p" - + "rivateca.v1.CertificateAuthority\022\027\n\017next" - + "_page_token\030\002 \001(\t\022\023\n\013unreachable\030\003 \003(\t\"\203" - + "\001\n#UndeleteCertificateAuthorityRequest\022C" - + "\n\004name\030\001 \001(\tB5\340A\002\372A/\n-privateca.googleap" - + "is.com/CertificateAuthority\022\027\n\nrequest_i" - + "d\030\002 \001(\tB\003\340A\001\"\312\001\n!DeleteCertificateAuthor" - + "ityRequest\022C\n\004name\030\001 \001(\tB5\340A\002\372A/\n-privat" - + "eca.googleapis.com/CertificateAuthority\022" - + "\027\n\nrequest_id\030\002 \001(\tB\003\340A\001\022\'\n\032ignore_activ" - + "e_certificates\030\004 \001(\010B\003\340A\001\022\036\n\021skip_grace_" - + "period\030\005 \001(\010B\003\340A\001\"\320\001\n!UpdateCertificateA" - + "uthorityRequest\022\\\n\025certificate_authority" - + "\030\001 \001(\01328.google.cloud.security.privateca" - + ".v1.CertificateAuthorityB\003\340A\002\0224\n\013update_" - + "mask\030\002 \001(\0132\032.google.protobuf.FieldMaskB\003" - + "\340A\002\022\027\n\nrequest_id\030\003 \001(\tB\003\340A\001\"\304\001\n\023CreateC" - + "aPoolRequest\0229\n\006parent\030\001 \001(\tB)\340A\002\372A#\n!lo" - + "cations.googleapis.com/Location\022\027\n\nca_po" - + "ol_id\030\002 \001(\tB\003\340A\002\022@\n\007ca_pool\030\003 \001(\0132*.goog" - + "le.cloud.security.privateca.v1.CaPoolB\003\340" - + "A\002\022\027\n\nrequest_id\030\004 \001(\tB\003\340A\001\"\246\001\n\023UpdateCa" - + "PoolRequest\022@\n\007ca_pool\030\001 \001(\0132*.google.cl" - + "oud.security.privateca.v1.CaPoolB\003\340A\002\0224\n" - + "\013update_mask\030\002 \001(\0132\032.google.protobuf.Fie" - + "ldMaskB\003\340A\002\022\027\n\nrequest_id\030\003 \001(\tB\003\340A\001\"e\n\023" - + "DeleteCaPoolRequest\0225\n\004name\030\001 \001(\tB\'\340A\002\372A" - + "!\n\037privateca.googleapis.com/CaPool\022\027\n\nre" - + "quest_id\030\002 \001(\tB\003\340A\001\"h\n\023FetchCaCertsReque" - + "st\0228\n\007ca_pool\030\001 \001(\tB\'\340A\002\372A!\n\037privateca.g" - + "oogleapis.com/CaPool\022\027\n\nrequest_id\030\002 \001(\t" - + "B\003\340A\001\"\217\001\n\024FetchCaCertsResponse\022T\n\010ca_cer" - + "ts\030\001 \003(\0132B.google.cloud.security.private" - + "ca.v1.FetchCaCertsResponse.CertChain\032!\n\t" - + "CertChain\022\024\n\014certificates\030\001 \003(\t\"I\n\020GetCa" + + "apis.com/CertificateAuthority\022\027\n\nrequest" + + "_id\030\002 \001(\tB\003\340A\001\022\'\n\032ignore_active_certific" + + "ates\030\004 \001(\010B\003\340A\001\022\036\n\021skip_grace_period\030\005 \001" + + "(\010B\003\340A\001\022\'\n\032ignore_dependent_resources\030\006 " + + "\001(\010B\003\340A\001\"\320\001\n!UpdateCertificateAuthorityR" + + "equest\022\\\n\025certificate_authority\030\001 \001(\01328." + + "google.cloud.security.privateca.v1.Certi" + + "ficateAuthorityB\003\340A\002\0224\n\013update_mask\030\002 \001(" + + "\0132\032.google.protobuf.FieldMaskB\003\340A\002\022\027\n\nre" + + "quest_id\030\003 \001(\tB\003\340A\001\"\304\001\n\023CreateCaPoolRequ" + + "est\0229\n\006parent\030\001 \001(\tB)\340A\002\372A#\n!locations.g" + + "oogleapis.com/Location\022\027\n\nca_pool_id\030\002 \001" + + "(\tB\003\340A\002\022@\n\007ca_pool\030\003 \001(\0132*.google.cloud." + + "security.privateca.v1.CaPoolB\003\340A\002\022\027\n\nreq" + + "uest_id\030\004 \001(\tB\003\340A\001\"\246\001\n\023UpdateCaPoolReque" + + "st\022@\n\007ca_pool\030\001 \001(\0132*.google.cloud.secur" + + "ity.privateca.v1.CaPoolB\003\340A\002\0224\n\013update_m" + + "ask\030\002 \001(\0132\032.google.protobuf.FieldMaskB\003\340" + + "A\002\022\027\n\nrequest_id\030\003 \001(\tB\003\340A\001\"\216\001\n\023DeleteCa" + "PoolRequest\0225\n\004name\030\001 \001(\tB\'\340A\002\372A!\n\037priva" - + "teca.googleapis.com/CaPool\"\254\001\n\022ListCaPoo" - + "lsRequest\0229\n\006parent\030\001 \001(\tB)\340A\002\372A#\n!locat" - + "ions.googleapis.com/Location\022\026\n\tpage_siz" - + "e\030\002 \001(\005B\003\340A\001\022\027\n\npage_token\030\003 \001(\tB\003\340A\001\022\023\n" - + "\006filter\030\004 \001(\tB\003\340A\001\022\025\n\010order_by\030\005 \001(\tB\003\340A" - + "\001\"\201\001\n\023ListCaPoolsResponse\022<\n\010ca_pools\030\001 " - + "\003(\0132*.google.cloud.security.privateca.v1" - + ".CaPool\022\027\n\017next_page_token\030\002 \001(\t\022\023\n\013unre" - + "achable\030\003 \003(\t\"o\n#GetCertificateRevocatio" - + "nListRequest\022H\n\004name\030\001 \001(\tB:\340A\002\372A4\n2priv" - + "ateca.googleapis.com/CertificateRevocati" - + "onList\"\313\001\n%ListCertificateRevocationList" - + "sRequest\022E\n\006parent\030\001 \001(\tB5\340A\002\372A/\n-privat" - + "eca.googleapis.com/CertificateAuthority\022" - + "\026\n\tpage_size\030\002 \001(\005B\003\340A\001\022\027\n\npage_token\030\003 " - + "\001(\tB\003\340A\001\022\023\n\006filter\030\004 \001(\tB\003\340A\001\022\025\n\010order_b" - + "y\030\005 \001(\tB\003\340A\001\"\273\001\n&ListCertificateRevocati" - + "onListsResponse\022c\n\034certificate_revocatio" - + "n_lists\030\001 \003(\0132=.google.cloud.security.pr" - + "ivateca.v1.CertificateRevocationList\022\027\n\017" - + "next_page_token\030\002 \001(\t\022\023\n\013unreachable\030\003 \003" - + "(\t\"\340\001\n&UpdateCertificateRevocationListRe" - + "quest\022g\n\033certificate_revocation_list\030\001 \001" - + "(\0132=.google.cloud.security.privateca.v1." - + "CertificateRevocationListB\003\340A\002\0224\n\013update" - + "_mask\030\002 \001(\0132\032.google.protobuf.FieldMaskB" - + "\003\340A\002\022\027\n\nrequest_id\030\003 \001(\tB\003\340A\001\"\370\001\n Create" - + "CertificateTemplateRequest\0229\n\006parent\030\001 \001" - + "(\tB)\340A\002\372A#\n!locations.googleapis.com/Loc" - + "ation\022$\n\027certificate_template_id\030\002 \001(\tB\003" - + "\340A\002\022Z\n\024certificate_template\030\003 \001(\01327.goog" - + "le.cloud.security.privateca.v1.Certifica" - + "teTemplateB\003\340A\002\022\027\n\nrequest_id\030\004 \001(\tB\003\340A\001" - + "\"\177\n DeleteCertificateTemplateRequest\022B\n\004" - + "name\030\001 \001(\tB4\340A\002\372A.\n,privateca.googleapis" - + ".com/CertificateTemplate\022\027\n\nrequest_id\030\002" - + " \001(\tB\003\340A\001\"c\n\035GetCertificateTemplateReque" - + "st\022B\n\004name\030\001 \001(\tB4\340A\002\372A.\n,privateca.goog" - + "leapis.com/CertificateTemplate\"\271\001\n\037ListC" - + "ertificateTemplatesRequest\0229\n\006parent\030\001 \001" - + "(\tB)\340A\002\372A#\n!locations.googleapis.com/Loc" - + "ation\022\026\n\tpage_size\030\002 \001(\005B\003\340A\001\022\027\n\npage_to" - + "ken\030\003 \001(\tB\003\340A\001\022\023\n\006filter\030\004 \001(\tB\003\340A\001\022\025\n\010o" - + "rder_by\030\005 \001(\tB\003\340A\001\"\250\001\n ListCertificateTe" - + "mplatesResponse\022V\n\025certificate_templates" - + "\030\001 \003(\01327.google.cloud.security.privateca" - + ".v1.CertificateTemplate\022\027\n\017next_page_tok" - + "en\030\002 \001(\t\022\023\n\013unreachable\030\003 \003(\t\"\315\001\n Update" - + "CertificateTemplateRequest\022Z\n\024certificat" - + "e_template\030\001 \001(\01327.google.cloud.security" - + ".privateca.v1.CertificateTemplateB\003\340A\002\0224" - + "\n\013update_mask\030\002 \001(\0132\032.google.protobuf.Fi" - + "eldMaskB\003\340A\002\022\027\n\nrequest_id\030\003 \001(\tB\003\340A\001\"\200\002" - + "\n\021OperationMetadata\0224\n\013create_time\030\001 \001(\013" - + "2\032.google.protobuf.TimestampB\003\340A\003\0221\n\010end" - + "_time\030\002 \001(\0132\032.google.protobuf.TimestampB" - + "\003\340A\003\022\023\n\006target\030\003 \001(\tB\003\340A\003\022\021\n\004verb\030\004 \001(\tB" - + "\003\340A\003\022\033\n\016status_message\030\005 \001(\tB\003\340A\003\022#\n\026req" - + "uested_cancellation\030\006 \001(\010B\003\340A\003\022\030\n\013api_ve" - + "rsion\030\007 \001(\tB\003\340A\0032\372;\n\033CertificateAuthorit" - + "yService\022\367\001\n\021CreateCertificate\022<.google." - + "cloud.security.privateca.v1.CreateCertif" - + "icateRequest\032/.google.cloud.security.pri" - + "vateca.v1.Certificate\"s\202\323\344\223\002I\":/v1/{pare" - + "nt=projects/*/locations/*/caPools/*}/cer" - + "tificates:\013certificate\332A!parent,certific" - + "ate,certificate_id\022\307\001\n\016GetCertificate\0229." - + "google.cloud.security.privateca.v1.GetCe" - + "rtificateRequest\032/.google.cloud.security" - + ".privateca.v1.Certificate\"I\202\323\344\223\002<\022:/v1/{" - + "name=projects/*/locations/*/caPools/*/ce" - + "rtificates/*}\332A\004name\022\332\001\n\020ListCertificate" - + "s\022;.google.cloud.security.privateca.v1.L" - + "istCertificatesRequest\032<.google.cloud.se" - + "curity.privateca.v1.ListCertificatesResp" - + "onse\"K\202\323\344\223\002<\022:/v1/{parent=projects/*/loc" - + "ations/*/caPools/*}/certificates\332A\006paren" - + "t\022\327\001\n\021RevokeCertificate\022<.google.cloud.s" - + "ecurity.privateca.v1.RevokeCertificateRe" + + "teca.googleapis.com/CaPool\022\027\n\nrequest_id" + + "\030\002 \001(\tB\003\340A\001\022\'\n\032ignore_dependent_resource" + + "s\030\004 \001(\010B\003\340A\001\"h\n\023FetchCaCertsRequest\0228\n\007c" + + "a_pool\030\001 \001(\tB\'\340A\002\372A!\n\037privateca.googleap" + + "is.com/CaPool\022\027\n\nrequest_id\030\002 \001(\tB\003\340A\001\"\217" + + "\001\n\024FetchCaCertsResponse\022T\n\010ca_certs\030\001 \003(" + + "\0132B.google.cloud.security.privateca.v1.F" + + "etchCaCertsResponse.CertChain\032!\n\tCertCha" + + "in\022\024\n\014certificates\030\001 \003(\t\"I\n\020GetCaPoolReq" + + "uest\0225\n\004name\030\001 \001(\tB\'\340A\002\372A!\n\037privateca.go" + + "ogleapis.com/CaPool\"\254\001\n\022ListCaPoolsReque" + + "st\0229\n\006parent\030\001 \001(\tB)\340A\002\372A#\n!locations.go" + + "ogleapis.com/Location\022\026\n\tpage_size\030\002 \001(\005" + + "B\003\340A\001\022\027\n\npage_token\030\003 \001(\tB\003\340A\001\022\023\n\006filter" + + "\030\004 \001(\tB\003\340A\001\022\025\n\010order_by\030\005 \001(\tB\003\340A\001\"\201\001\n\023L" + + "istCaPoolsResponse\022<\n\010ca_pools\030\001 \003(\0132*.g" + + "oogle.cloud.security.privateca.v1.CaPool" + + "\022\027\n\017next_page_token\030\002 \001(\t\022\023\n\013unreachable" + + "\030\003 \003(\t\"o\n#GetCertificateRevocationListRe" + + "quest\022H\n\004name\030\001 \001(\tB:\340A\002\372A4\n2privateca.g" + + "oogleapis.com/CertificateRevocationList\"" + + "\313\001\n%ListCertificateRevocationListsReques" + + "t\022E\n\006parent\030\001 \001(\tB5\340A\002\372A/\n-privateca.goo" + + "gleapis.com/CertificateAuthority\022\026\n\tpage" + + "_size\030\002 \001(\005B\003\340A\001\022\027\n\npage_token\030\003 \001(\tB\003\340A" + + "\001\022\023\n\006filter\030\004 \001(\tB\003\340A\001\022\025\n\010order_by\030\005 \001(\t" + + "B\003\340A\001\"\273\001\n&ListCertificateRevocationLists" + + "Response\022c\n\034certificate_revocation_lists" + + "\030\001 \003(\0132=.google.cloud.security.privateca" + + ".v1.CertificateRevocationList\022\027\n\017next_pa" + + "ge_token\030\002 \001(\t\022\023\n\013unreachable\030\003 \003(\t\"\340\001\n&" + + "UpdateCertificateRevocationListRequest\022g" + + "\n\033certificate_revocation_list\030\001 \001(\0132=.go" + + "ogle.cloud.security.privateca.v1.Certifi" + + "cateRevocationListB\003\340A\002\0224\n\013update_mask\030\002" + + " \001(\0132\032.google.protobuf.FieldMaskB\003\340A\002\022\027\n" + + "\nrequest_id\030\003 \001(\tB\003\340A\001\"\370\001\n CreateCertifi" + + "cateTemplateRequest\0229\n\006parent\030\001 \001(\tB)\340A\002" + + "\372A#\n!locations.googleapis.com/Location\022$" + + "\n\027certificate_template_id\030\002 \001(\tB\003\340A\002\022Z\n\024" + + "certificate_template\030\003 \001(\01327.google.clou" + + "d.security.privateca.v1.CertificateTempl" + + "ateB\003\340A\002\022\027\n\nrequest_id\030\004 \001(\tB\003\340A\001\"\177\n Del" + + "eteCertificateTemplateRequest\022B\n\004name\030\001 " + + "\001(\tB4\340A\002\372A.\n,privateca.googleapis.com/Ce" + + "rtificateTemplate\022\027\n\nrequest_id\030\002 \001(\tB\003\340" + + "A\001\"c\n\035GetCertificateTemplateRequest\022B\n\004n" + + "ame\030\001 \001(\tB4\340A\002\372A.\n,privateca.googleapis." + + "com/CertificateTemplate\"\271\001\n\037ListCertific" + + "ateTemplatesRequest\0229\n\006parent\030\001 \001(\tB)\340A\002" + + "\372A#\n!locations.googleapis.com/Location\022\026" + + "\n\tpage_size\030\002 \001(\005B\003\340A\001\022\027\n\npage_token\030\003 \001" + + "(\tB\003\340A\001\022\023\n\006filter\030\004 \001(\tB\003\340A\001\022\025\n\010order_by" + + "\030\005 \001(\tB\003\340A\001\"\250\001\n ListCertificateTemplates" + + "Response\022V\n\025certificate_templates\030\001 \003(\0132" + + "7.google.cloud.security.privateca.v1.Cer" + + "tificateTemplate\022\027\n\017next_page_token\030\002 \001(" + + "\t\022\023\n\013unreachable\030\003 \003(\t\"\315\001\n UpdateCertifi" + + "cateTemplateRequest\022Z\n\024certificate_templ" + + "ate\030\001 \001(\01327.google.cloud.security.privat" + + "eca.v1.CertificateTemplateB\003\340A\002\0224\n\013updat" + + "e_mask\030\002 \001(\0132\032.google.protobuf.FieldMask" + + "B\003\340A\002\022\027\n\nrequest_id\030\003 \001(\tB\003\340A\001\"\200\002\n\021Opera" + + "tionMetadata\0224\n\013create_time\030\001 \001(\0132\032.goog" + + "le.protobuf.TimestampB\003\340A\003\0221\n\010end_time\030\002" + + " \001(\0132\032.google.protobuf.TimestampB\003\340A\003\022\023\n" + + "\006target\030\003 \001(\tB\003\340A\003\022\021\n\004verb\030\004 \001(\tB\003\340A\003\022\033\n" + + "\016status_message\030\005 \001(\tB\003\340A\003\022#\n\026requested_" + + "cancellation\030\006 \001(\010B\003\340A\003\022\030\n\013api_version\030\007" + + " \001(\tB\003\340A\0032\372;\n\033CertificateAuthorityServic" + + "e\022\367\001\n\021CreateCertificate\022<.google.cloud.s" + + "ecurity.privateca.v1.CreateCertificateRe" + "quest\032/.google.cloud.security.privateca." - + "v1.Certificate\"S\202\323\344\223\002F\"A/v1/{name=projec" - + "ts/*/locations/*/caPools/*/certificates/" - + "*}:revoke:\001*\332A\004name\022\371\001\n\021UpdateCertificat" - + "e\022<.google.cloud.security.privateca.v1.U" - + "pdateCertificateRequest\032/.google.cloud.s" - + "ecurity.privateca.v1.Certificate\"u\202\323\344\223\002U" - + "2F/v1/{certificate.name=projects/*/locat" - + "ions/*/caPools/*/certificates/*}:\013certif" - + "icate\332A\027certificate,update_mask\022\224\002\n\034Acti" - + "vateCertificateAuthority\022G.google.cloud." - + "security.privateca.v1.ActivateCertificat" - + "eAuthorityRequest\032\035.google.longrunning.O" - + "peration\"\213\001\202\323\344\223\002R\"M/v1/{name=projects/*/" - + "locations/*/caPools/*/certificateAuthori" - + "ties/*}:activate:\001*\332A\004name\312A)\n\024Certifica" - + "teAuthority\022\021OperationMetadata\022\314\002\n\032Creat" - + "eCertificateAuthority\022E.google.cloud.sec" - + "urity.privateca.v1.CreateCertificateAuth" - + "orityRequest\032\035.google.longrunning.Operat" - + "ion\"\307\001\202\323\344\223\002]\"D/v1/{parent=projects/*/loc" - + "ations/*/caPools/*}/certificateAuthoriti" - + "es:\025certificate_authority\332A5parent,certi" - + "ficate_authority,certificate_authority_i" - + "d\312A)\n\024CertificateAuthority\022\021OperationMet" - + "adata\022\221\002\n\033DisableCertificateAuthority\022F." - + "google.cloud.security.privateca.v1.Disab" - + "leCertificateAuthorityRequest\032\035.google.l" - + "ongrunning.Operation\"\212\001\202\323\344\223\002Q\"L/v1/{name" - + "=projects/*/locations/*/caPools/*/certif" - + "icateAuthorities/*}:disable:\001*\332A\004name\312A)" - + "\n\024CertificateAuthority\022\021OperationMetadat" - + "a\022\216\002\n\032EnableCertificateAuthority\022E.googl" - + "e.cloud.security.privateca.v1.EnableCert" - + "ificateAuthorityRequest\032\035.google.longrun" - + "ning.Operation\"\211\001\202\323\344\223\002P\"K/v1/{name=proje" - + "cts/*/locations/*/caPools/*/certificateA" - + "uthorities/*}:enable:\001*\332A\004name\312A)\n\024Certi" - + "ficateAuthority\022\021OperationMetadata\022\214\002\n\034F" - + "etchCertificateAuthorityCsr\022G.google.clo" - + "ud.security.privateca.v1.FetchCertificat" - + "eAuthorityCsrRequest\032H.google.cloud.secu" - + "rity.privateca.v1.FetchCertificateAuthor" - + "ityCsrResponse\"Y\202\323\344\223\002L\022J/v1/{name=projec" + + "v1.Certificate\"s\202\323\344\223\002I\":/v1/{parent=proj" + + "ects/*/locations/*/caPools/*}/certificat" + + "es:\013certificate\332A!parent,certificate,cer" + + "tificate_id\022\307\001\n\016GetCertificate\0229.google." + + "cloud.security.privateca.v1.GetCertifica" + + "teRequest\032/.google.cloud.security.privat" + + "eca.v1.Certificate\"I\202\323\344\223\002<\022:/v1/{name=pr" + + "ojects/*/locations/*/caPools/*/certifica" + + "tes/*}\332A\004name\022\332\001\n\020ListCertificates\022;.goo" + + "gle.cloud.security.privateca.v1.ListCert" + + "ificatesRequest\032<.google.cloud.security." + + "privateca.v1.ListCertificatesResponse\"K\202" + + "\323\344\223\002<\022:/v1/{parent=projects/*/locations/" + + "*/caPools/*}/certificates\332A\006parent\022\327\001\n\021R" + + "evokeCertificate\022<.google.cloud.security" + + ".privateca.v1.RevokeCertificateRequest\032/" + + ".google.cloud.security.privateca.v1.Cert" + + "ificate\"S\202\323\344\223\002F\"A/v1/{name=projects/*/lo" + + "cations/*/caPools/*/certificates/*}:revo" + + "ke:\001*\332A\004name\022\371\001\n\021UpdateCertificate\022<.goo" + + "gle.cloud.security.privateca.v1.UpdateCe" + + "rtificateRequest\032/.google.cloud.security" + + ".privateca.v1.Certificate\"u\202\323\344\223\002U2F/v1/{" + + "certificate.name=projects/*/locations/*/" + + "caPools/*/certificates/*}:\013certificate\332A" + + "\027certificate,update_mask\022\224\002\n\034ActivateCer" + + "tificateAuthority\022G.google.cloud.securit" + + "y.privateca.v1.ActivateCertificateAuthor" + + "ityRequest\032\035.google.longrunning.Operatio" + + "n\"\213\001\202\323\344\223\002R\"M/v1/{name=projects/*/locatio" + + "ns/*/caPools/*/certificateAuthorities/*}" + + ":activate:\001*\332A\004name\312A)\n\024CertificateAutho" + + "rity\022\021OperationMetadata\022\314\002\n\032CreateCertif" + + "icateAuthority\022E.google.cloud.security.p" + + "rivateca.v1.CreateCertificateAuthorityRe" + + "quest\032\035.google.longrunning.Operation\"\307\001\202" + + "\323\344\223\002]\"D/v1/{parent=projects/*/locations/" + + "*/caPools/*}/certificateAuthorities:\025cer" + + "tificate_authority\332A5parent,certificate_" + + "authority,certificate_authority_id\312A)\n\024C" + + "ertificateAuthority\022\021OperationMetadata\022\221" + + "\002\n\033DisableCertificateAuthority\022F.google." + + "cloud.security.privateca.v1.DisableCerti" + + "ficateAuthorityRequest\032\035.google.longrunn" + + "ing.Operation\"\212\001\202\323\344\223\002Q\"L/v1/{name=projec" + "ts/*/locations/*/caPools/*/certificateAu" - + "thorities/*}:fetch\332A\004name\022\354\001\n\027GetCertifi" - + "cateAuthority\022B.google.cloud.security.pr" - + "ivateca.v1.GetCertificateAuthorityReques" - + "t\0328.google.cloud.security.privateca.v1.C" - + "ertificateAuthority\"S\202\323\344\223\002F\022D/v1/{name=p" - + "rojects/*/locations/*/caPools/*/certific" - + "ateAuthorities/*}\332A\004name\022\202\002\n\032ListCertifi" - + "cateAuthorities\022E.google.cloud.security." - + "privateca.v1.ListCertificateAuthoritiesR" - + "equest\032F.google.cloud.security.privateca" - + ".v1.ListCertificateAuthoritiesResponse\"U" - + "\202\323\344\223\002F\022D/v1/{parent=projects/*/locations" - + "/*/caPools/*}/certificateAuthorities\332A\006p" - + "arent\022\224\002\n\034UndeleteCertificateAuthority\022G" - + ".google.cloud.security.privateca.v1.Unde" - + "leteCertificateAuthorityRequest\032\035.google" - + ".longrunning.Operation\"\213\001\202\323\344\223\002R\"M/v1/{na" - + "me=projects/*/locations/*/caPools/*/cert" - + "ificateAuthorities/*}:undelete:\001*\332A\004name" - + "\312A)\n\024CertificateAuthority\022\021OperationMeta" - + "data\022\203\002\n\032DeleteCertificateAuthority\022E.go" - + "ogle.cloud.security.privateca.v1.DeleteC" - + "ertificateAuthorityRequest\032\035.google.long" - + "running.Operation\"\177\202\323\344\223\002F*D/v1/{name=pro" - + "jects/*/locations/*/caPools/*/certificat" - + "eAuthorities/*}\332A\004name\312A)\n\024CertificateAu" - + "thority\022\021OperationMetadata\022\316\002\n\032UpdateCer" - + "tificateAuthority\022E.google.cloud.securit" - + "y.privateca.v1.UpdateCertificateAuthorit" - + "yRequest\032\035.google.longrunning.Operation\"" - + "\311\001\202\323\344\223\002s2Z/v1/{certificate_authority.nam" - + "e=projects/*/locations/*/caPools/*/certi" - + "ficateAuthorities/*}:\025certificate_author" - + "ity\332A!certificate_authority,update_mask\312" - + "A)\n\024CertificateAuthority\022\021OperationMetad" - + "ata\022\336\001\n\014CreateCaPool\0227.google.cloud.secu" - + "rity.privateca.v1.CreateCaPoolRequest\032\035." - + "google.longrunning.Operation\"v\202\323\344\223\0026\"+/v" - + "1/{parent=projects/*/locations/*}/caPool" - + "s:\007ca_pool\332A\031parent,ca_pool,ca_pool_id\312A" - + "\033\n\006CaPool\022\021OperationMetadata\022\340\001\n\014UpdateC" - + "aPool\0227.google.cloud.security.privateca." - + "v1.UpdateCaPoolRequest\032\035.google.longrunn" - + "ing.Operation\"x\202\323\344\223\002>23/v1/{ca_pool.name" - + "=projects/*/locations/*/caPools/*}:\007ca_p" - + "ool\332A\023ca_pool,update_mask\312A\033\n\006CaPool\022\021Op" - + "erationMetadata\022\251\001\n\tGetCaPool\0224.google.c" - + "loud.security.privateca.v1.GetCaPoolRequ" - + "est\032*.google.cloud.security.privateca.v1" - + ".CaPool\":\202\323\344\223\002-\022+/v1/{name=projects/*/lo" - + "cations/*/caPools/*}\332A\004name\022\274\001\n\013ListCaPo" - + "ols\0226.google.cloud.security.privateca.v1" - + ".ListCaPoolsRequest\0327.google.cloud.secur" - + "ity.privateca.v1.ListCaPoolsResponse\"<\202\323" - + "\344\223\002-\022+/v1/{parent=projects/*/locations/*" - + "}/caPools\332A\006parent\022\317\001\n\014DeleteCaPool\0227.go" - + "ogle.cloud.security.privateca.v1.DeleteC" - + "aPoolRequest\032\035.google.longrunning.Operat" - + "ion\"g\202\323\344\223\002-*+/v1/{name=projects/*/locati" - + "ons/*/caPools/*}\332A\004name\312A*\n\025google.proto" - + "buf.Empty\022\021OperationMetadata\022\323\001\n\014FetchCa" - + "Certs\0227.google.cloud.security.privateca." - + "v1.FetchCaCertsRequest\0328.google.cloud.se" - + "curity.privateca.v1.FetchCaCertsResponse" - + "\"P\202\323\344\223\002@\";/v1/{ca_pool=projects/*/locati" - + "ons/*/caPools/*}:fetchCaCerts:\001*\332A\007ca_po" - + "ol\022\230\002\n\034GetCertificateRevocationList\022G.go" - + "ogle.cloud.security.privateca.v1.GetCert" - + "ificateRevocationListRequest\032=.google.cl" - + "oud.security.privateca.v1.CertificateRev" - + "ocationList\"p\202\323\344\223\002c\022a/v1/{name=projects/" - + "*/locations/*/caPools/*/certificateAutho" - + "rities/*/certificateRevocationLists/*}\332A" - + "\004name\022\253\002\n\036ListCertificateRevocationLists" - + "\022I.google.cloud.security.privateca.v1.Li" - + "stCertificateRevocationListsRequest\032J.go" + + "thorities/*}:disable:\001*\332A\004name\312A)\n\024Certi" + + "ficateAuthority\022\021OperationMetadata\022\216\002\n\032E" + + "nableCertificateAuthority\022E.google.cloud" + + ".security.privateca.v1.EnableCertificate" + + "AuthorityRequest\032\035.google.longrunning.Op" + + "eration\"\211\001\202\323\344\223\002P\"K/v1/{name=projects/*/l" + + "ocations/*/caPools/*/certificateAuthorit" + + "ies/*}:enable:\001*\332A\004name\312A)\n\024CertificateA" + + "uthority\022\021OperationMetadata\022\214\002\n\034FetchCer" + + "tificateAuthorityCsr\022G.google.cloud.secu" + + "rity.privateca.v1.FetchCertificateAuthor" + + "ityCsrRequest\032H.google.cloud.security.pr" + + "ivateca.v1.FetchCertificateAuthorityCsrR" + + "esponse\"Y\202\323\344\223\002L\022J/v1/{name=projects/*/lo" + + "cations/*/caPools/*/certificateAuthoriti" + + "es/*}:fetch\332A\004name\022\354\001\n\027GetCertificateAut" + + "hority\022B.google.cloud.security.privateca" + + ".v1.GetCertificateAuthorityRequest\0328.goo" + + "gle.cloud.security.privateca.v1.Certific" + + "ateAuthority\"S\202\323\344\223\002F\022D/v1/{name=projects" + + "/*/locations/*/caPools/*/certificateAuth" + + "orities/*}\332A\004name\022\202\002\n\032ListCertificateAut" + + "horities\022E.google.cloud.security.private" + + "ca.v1.ListCertificateAuthoritiesRequest\032" + + "F.google.cloud.security.privateca.v1.Lis" + + "tCertificateAuthoritiesResponse\"U\202\323\344\223\002F\022" + + "D/v1/{parent=projects/*/locations/*/caPo" + + "ols/*}/certificateAuthorities\332A\006parent\022\224" + + "\002\n\034UndeleteCertificateAuthority\022G.google" + + ".cloud.security.privateca.v1.UndeleteCer" + + "tificateAuthorityRequest\032\035.google.longru" + + "nning.Operation\"\213\001\202\323\344\223\002R\"M/v1/{name=proj" + + "ects/*/locations/*/caPools/*/certificate" + + "Authorities/*}:undelete:\001*\332A\004name\312A)\n\024Ce" + + "rtificateAuthority\022\021OperationMetadata\022\203\002" + + "\n\032DeleteCertificateAuthority\022E.google.cl" + + "oud.security.privateca.v1.DeleteCertific" + + "ateAuthorityRequest\032\035.google.longrunning" + + ".Operation\"\177\202\323\344\223\002F*D/v1/{name=projects/*" + + "/locations/*/caPools/*/certificateAuthor" + + "ities/*}\332A\004name\312A)\n\024CertificateAuthority" + + "\022\021OperationMetadata\022\316\002\n\032UpdateCertificat" + + "eAuthority\022E.google.cloud.security.priva" + + "teca.v1.UpdateCertificateAuthorityReques" + + "t\032\035.google.longrunning.Operation\"\311\001\202\323\344\223\002" + + "s2Z/v1/{certificate_authority.name=proje" + + "cts/*/locations/*/caPools/*/certificateA" + + "uthorities/*}:\025certificate_authority\332A!c" + + "ertificate_authority,update_mask\312A)\n\024Cer" + + "tificateAuthority\022\021OperationMetadata\022\336\001\n" + + "\014CreateCaPool\0227.google.cloud.security.pr" + + "ivateca.v1.CreateCaPoolRequest\032\035.google." + + "longrunning.Operation\"v\202\323\344\223\0026\"+/v1/{pare" + + "nt=projects/*/locations/*}/caPools:\007ca_p" + + "ool\332A\031parent,ca_pool,ca_pool_id\312A\033\n\006CaPo" + + "ol\022\021OperationMetadata\022\340\001\n\014UpdateCaPool\0227" + + ".google.cloud.security.privateca.v1.Upda" + + "teCaPoolRequest\032\035.google.longrunning.Ope" + + "ration\"x\202\323\344\223\002>23/v1/{ca_pool.name=projec" + + "ts/*/locations/*/caPools/*}:\007ca_pool\332A\023c" + + "a_pool,update_mask\312A\033\n\006CaPool\022\021Operation" + + "Metadata\022\251\001\n\tGetCaPool\0224.google.cloud.se" + + "curity.privateca.v1.GetCaPoolRequest\032*.g" + + "oogle.cloud.security.privateca.v1.CaPool" + + "\":\202\323\344\223\002-\022+/v1/{name=projects/*/locations" + + "/*/caPools/*}\332A\004name\022\274\001\n\013ListCaPools\0226.g" + + "oogle.cloud.security.privateca.v1.ListCa" + + "PoolsRequest\0327.google.cloud.security.pri" + + "vateca.v1.ListCaPoolsResponse\"<\202\323\344\223\002-\022+/" + + "v1/{parent=projects/*/locations/*}/caPoo" + + "ls\332A\006parent\022\317\001\n\014DeleteCaPool\0227.google.cl" + + "oud.security.privateca.v1.DeleteCaPoolRe" + + "quest\032\035.google.longrunning.Operation\"g\202\323" + + "\344\223\002-*+/v1/{name=projects/*/locations/*/c" + + "aPools/*}\332A\004name\312A*\n\025google.protobuf.Emp" + + "ty\022\021OperationMetadata\022\323\001\n\014FetchCaCerts\0227" + + ".google.cloud.security.privateca.v1.Fetc" + + "hCaCertsRequest\0328.google.cloud.security." + + "privateca.v1.FetchCaCertsResponse\"P\202\323\344\223\002" + + "@\";/v1/{ca_pool=projects/*/locations/*/c" + + "aPools/*}:fetchCaCerts:\001*\332A\007ca_pool\022\230\002\n\034" + + "GetCertificateRevocationList\022G.google.cl" + + "oud.security.privateca.v1.GetCertificate" + + "RevocationListRequest\032=.google.cloud.sec" + + "urity.privateca.v1.CertificateRevocation" + + "List\"p\202\323\344\223\002c\022a/v1/{name=projects/*/locat" + + "ions/*/caPools/*/certificateAuthorities/" + + "*/certificateRevocationLists/*}\332A\004name\022\253" + + "\002\n\036ListCertificateRevocationLists\022I.goog" + + "le.cloud.security.privateca.v1.ListCerti" + + "ficateRevocationListsRequest\032J.google.cl" + + "oud.security.privateca.v1.ListCertificat" + + "eRevocationListsResponse\"r\202\323\344\223\002c\022a/v1/{p" + + "arent=projects/*/locations/*/caPools/*/c" + + "ertificateAuthorities/*}/certificateRevo" + + "cationLists\332A\006parent\022\215\003\n\037UpdateCertifica" + + "teRevocationList\022J.google.cloud.security" + + ".privateca.v1.UpdateCertificateRevocatio" + + "nListRequest\032\035.google.longrunning.Operat" + + "ion\"\376\001\202\323\344\223\002\234\0012}/v1/{certificate_revocati" + + "on_list.name=projects/*/locations/*/caPo" + + "ols/*/certificateAuthorities/*/certifica" + + "teRevocationLists/*}:\033certificate_revoca" + + "tion_list\332A\'certificate_revocation_list," + + "update_mask\312A.\n\031CertificateRevocationLis" + + "t\022\021OperationMetadata\022\272\002\n\031CreateCertifica" + + "teTemplate\022D.google.cloud.security.priva" + + "teca.v1.CreateCertificateTemplateRequest" + + "\032\035.google.longrunning.Operation\"\267\001\202\323\344\223\002P" + + "\"8/v1/{parent=projects/*/locations/*}/ce" + + "rtificateTemplates:\024certificate_template" + + "\332A3parent,certificate_template,certifica" + + "te_template_id\312A(\n\023CertificateTemplate\022\021" + + "OperationMetadata\022\232\002\n\031DeleteCertificateT" + + "emplate\022D.google.cloud.security.privatec" + + "a.v1.DeleteCertificateTemplateRequest\032\035." + + "google.longrunning.Operation\"\227\001\202\323\344\223\002:*8/" + + "v1/{name=projects/*/locations/*/certific" + + "ateTemplates/*}\332A\004name\312AM\n\025google.protob" + + "uf.Empty\0224google.cloud.security.privatec" + + "a.v1.OperationMetadata\022\335\001\n\026GetCertificat" + + "eTemplate\022A.google.cloud.security.privat" + + "eca.v1.GetCertificateTemplateRequest\0327.g" + + "oogle.cloud.security.privateca.v1.Certif" + + "icateTemplate\"G\202\323\344\223\002:\0228/v1/{name=project" + + "s/*/locations/*/certificateTemplates/*}\332" + + "A\004name\022\360\001\n\030ListCertificateTemplates\022C.go" + "ogle.cloud.security.privateca.v1.ListCer" - + "tificateRevocationListsResponse\"r\202\323\344\223\002c\022" - + "a/v1/{parent=projects/*/locations/*/caPo" - + "ols/*/certificateAuthorities/*}/certific" - + "ateRevocationLists\332A\006parent\022\215\003\n\037UpdateCe" - + "rtificateRevocationList\022J.google.cloud.s" - + "ecurity.privateca.v1.UpdateCertificateRe" - + "vocationListRequest\032\035.google.longrunning" - + ".Operation\"\376\001\202\323\344\223\002\234\0012}/v1/{certificate_r" - + "evocation_list.name=projects/*/locations" - + "/*/caPools/*/certificateAuthorities/*/ce" - + "rtificateRevocationLists/*}:\033certificate" - + "_revocation_list\332A\'certificate_revocatio" - + "n_list,update_mask\312A.\n\031CertificateRevoca" - + "tionList\022\021OperationMetadata\022\272\002\n\031CreateCe" - + "rtificateTemplate\022D.google.cloud.securit" - + "y.privateca.v1.CreateCertificateTemplate" - + "Request\032\035.google.longrunning.Operation\"\267" - + "\001\202\323\344\223\002P\"8/v1/{parent=projects/*/location" - + "s/*}/certificateTemplates:\024certificate_t" - + "emplate\332A3parent,certificate_template,ce" - + "rtificate_template_id\312A(\n\023CertificateTem" - + "plate\022\021OperationMetadata\022\232\002\n\031DeleteCerti" - + "ficateTemplate\022D.google.cloud.security.p" - + "rivateca.v1.DeleteCertificateTemplateReq" - + "uest\032\035.google.longrunning.Operation\"\227\001\202\323" - + "\344\223\002:*8/v1/{name=projects/*/locations/*/c" - + "ertificateTemplates/*}\332A\004name\312AM\n\025google" - + ".protobuf.Empty\0224google.cloud.security.p" - + "rivateca.v1.OperationMetadata\022\335\001\n\026GetCer" - + "tificateTemplate\022A.google.cloud.security" - + ".privateca.v1.GetCertificateTemplateRequ" - + "est\0327.google.cloud.security.privateca.v1" - + ".CertificateTemplate\"G\202\323\344\223\002:\0228/v1/{name=" - + "projects/*/locations/*/certificateTempla" - + "tes/*}\332A\004name\022\360\001\n\030ListCertificateTemplat" - + "es\022C.google.cloud.security.privateca.v1." - + "ListCertificateTemplatesRequest\032D.google" - + ".cloud.security.privateca.v1.ListCertifi" - + "cateTemplatesResponse\"I\202\323\344\223\002:\0228/v1/{pare" - + "nt=projects/*/locations/*}/certificateTe" - + "mplates\332A\006parent\022\274\002\n\031UpdateCertificateTe" - + "mplate\022D.google.cloud.security.privateca" - + ".v1.UpdateCertificateTemplateRequest\032\035.g" - + "oogle.longrunning.Operation\"\271\001\202\323\344\223\002e2M/v" - + "1/{certificate_template.name=projects/*/" - + "locations/*/certificateTemplates/*}:\024cer" - + "tificate_template\332A certificate_template" - + ",update_mask\312A(\n\023CertificateTemplate\022\021Op" - + "erationMetadata\032L\312A\030privateca.googleapis" - + ".com\322A.https://www.googleapis.com/auth/c" - + "loud-platformB\366\001\n&com.google.cloud.secur" - + "ity.privateca.v1B\016PrivateCaProtoP\001ZDclou" - + "d.google.com/go/security/privateca/apiv1" - + "/privatecapb;privatecapb\370\001\001\252\002\"Google.Clo" - + "ud.Security.PrivateCA.V1\312\002\"Google\\Cloud\\" - + "Security\\PrivateCA\\V1\352\002&Google::Cloud::S" - + "ecurity::PrivateCA::V1b\006proto3" + + "tificateTemplatesRequest\032D.google.cloud." + + "security.privateca.v1.ListCertificateTem" + + "platesResponse\"I\202\323\344\223\002:\0228/v1/{parent=proj" + + "ects/*/locations/*}/certificateTemplates" + + "\332A\006parent\022\274\002\n\031UpdateCertificateTemplate\022" + + "D.google.cloud.security.privateca.v1.Upd" + + "ateCertificateTemplateRequest\032\035.google.l" + + "ongrunning.Operation\"\271\001\202\323\344\223\002e2M/v1/{cert" + + "ificate_template.name=projects/*/locatio" + + "ns/*/certificateTemplates/*}:\024certificat" + + "e_template\332A certificate_template,update" + + "_mask\312A(\n\023CertificateTemplate\022\021Operation" + + "Metadata\032L\312A\030privateca.googleapis.com\322A." + + "https://www.googleapis.com/auth/cloud-pl" + + "atformB\366\001\n&com.google.cloud.security.pri" + + "vateca.v1B\016PrivateCaProtoP\001ZDcloud.googl" + + "e.com/go/security/privateca/apiv1/privat" + + "ecapb;privatecapb\370\001\001\252\002\"Google.Cloud.Secu" + + "rity.PrivateCA.V1\312\002\"Google\\Cloud\\Securit" + + "y\\PrivateCA\\V1\352\002&Google::Cloud::Security" + + "::PrivateCA::V1b\006proto3" }; descriptor = com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom( @@ -561,6 +565,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() { com.google.api.ResourceProto.getDescriptor(), com.google.cloud.security.privateca.v1.PrivateCaResourcesProto.getDescriptor(), com.google.longrunning.OperationsProto.getDescriptor(), + com.google.protobuf.EmptyProto.getDescriptor(), com.google.protobuf.FieldMaskProto.getDescriptor(), com.google.protobuf.TimestampProto.getDescriptor(), }); @@ -639,7 +644,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() { new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( internal_static_google_cloud_security_privateca_v1_DisableCertificateAuthorityRequest_descriptor, new java.lang.String[] { - "Name", "RequestId", + "Name", "RequestId", "IgnoreDependentResources", }); internal_static_google_cloud_security_privateca_v1_EnableCertificateAuthorityRequest_descriptor = getDescriptor().getMessageTypes().get(9); @@ -703,7 +708,11 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() { new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( internal_static_google_cloud_security_privateca_v1_DeleteCertificateAuthorityRequest_descriptor, new java.lang.String[] { - "Name", "RequestId", "IgnoreActiveCertificates", "SkipGracePeriod", + "Name", + "RequestId", + "IgnoreActiveCertificates", + "SkipGracePeriod", + "IgnoreDependentResources", }); internal_static_google_cloud_security_privateca_v1_UpdateCertificateAuthorityRequest_descriptor = getDescriptor().getMessageTypes().get(17); @@ -735,7 +744,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() { new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( internal_static_google_cloud_security_privateca_v1_DeleteCaPoolRequest_descriptor, new java.lang.String[] { - "Name", "RequestId", + "Name", "RequestId", "IgnoreDependentResources", }); internal_static_google_cloud_security_privateca_v1_FetchCaCertsRequest_descriptor = getDescriptor().getMessageTypes().get(21); @@ -898,6 +907,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() { com.google.api.ResourceProto.getDescriptor(); com.google.cloud.security.privateca.v1.PrivateCaResourcesProto.getDescriptor(); com.google.longrunning.OperationsProto.getDescriptor(); + com.google.protobuf.EmptyProto.getDescriptor(); com.google.protobuf.FieldMaskProto.getDescriptor(); com.google.protobuf.TimestampProto.getDescriptor(); } diff --git a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/SubjectRequestMode.java b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/SubjectRequestMode.java index a29642c08498..ddd292581ae7 100644 --- a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/SubjectRequestMode.java +++ b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/SubjectRequestMode.java @@ -61,7 +61,7 @@ public enum SubjectRequestMode implements com.google.protobuf.ProtocolMessageEnu * *
    * A mode reserved for special cases. Indicates that the certificate should
-   * have one or more SPIFFE
+   * have one SPIFFE
    * [SubjectAltNames][google.cloud.security.privateca.v1.SubjectAltNames] set
    * by the service based on the caller's identity. This mode will ignore any
    * explicitly specified [Subject][google.cloud.security.privateca.v1.Subject]
@@ -106,7 +106,7 @@ public enum SubjectRequestMode implements com.google.protobuf.ProtocolMessageEnu
    *
    * 
    * A mode reserved for special cases. Indicates that the certificate should
-   * have one or more SPIFFE
+   * have one SPIFFE
    * [SubjectAltNames][google.cloud.security.privateca.v1.SubjectAltNames] set
    * by the service based on the caller's identity. This mode will ignore any
    * explicitly specified [Subject][google.cloud.security.privateca.v1.Subject]
diff --git a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/proto/google/cloud/security/privateca/v1/resources.proto b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/proto/google/cloud/security/privateca/v1/resources.proto
index 2e346af28ae8..b64be7bc73f0 100644
--- a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/proto/google/cloud/security/privateca/v1/resources.proto
+++ b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/proto/google/cloud/security/privateca/v1/resources.proto
@@ -1,4 +1,4 @@
-// Copyright 2022 Google LLC
+// Copyright 2023 Google LLC
 //
 // Licensed under the Apache License, Version 2.0 (the "License");
 // you may not use this file except in compliance with the License.
@@ -1431,7 +1431,7 @@ enum SubjectRequestMode {
   DEFAULT = 1;
 
   // A mode reserved for special cases. Indicates that the certificate should
-  // have one or more SPIFFE
+  // have one SPIFFE
   // [SubjectAltNames][google.cloud.security.privateca.v1.SubjectAltNames] set
   // by the service based on the caller's identity. This mode will ignore any
   // explicitly specified [Subject][google.cloud.security.privateca.v1.Subject]
diff --git a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/proto/google/cloud/security/privateca/v1/service.proto b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/proto/google/cloud/security/privateca/v1/service.proto
index 7ff8b8d248c3..b90a374d6e48 100644
--- a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/proto/google/cloud/security/privateca/v1/service.proto
+++ b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/proto/google/cloud/security/privateca/v1/service.proto
@@ -1,4 +1,4 @@
-// Copyright 2022 Google LLC
+// Copyright 2023 Google LLC
 //
 // Licensed under the Apache License, Version 2.0 (the "License");
 // you may not use this file except in compliance with the License.
@@ -22,6 +22,7 @@ import "google/api/field_behavior.proto";
 import "google/api/resource.proto";
 import "google/cloud/security/privateca/v1/resources.proto";
 import "google/longrunning/operations.proto";
+import "google/protobuf/empty.proto";
 import "google/protobuf/field_mask.proto";
 import "google/protobuf/timestamp.proto";
 
@@ -720,6 +721,12 @@ message DisableCertificateAuthorityRequest {
   // The request ID must be a valid UUID with the exception that zero UUID is
   // not supported (00000000-0000-0000-0000-000000000000).
   string request_id = 2 [(google.api.field_behavior) = OPTIONAL];
+
+  // Optional. This field allows this CA to be disabled even if it's being
+  // depended on by another resource. However, doing so may result in unintended
+  // and unrecoverable effects on any dependent resource(s) since the CA will
+  // no longer be able to issue certificates.
+  bool ignore_dependent_resources = 3 [(google.api.field_behavior) = OPTIONAL];
 }
 
 // Request message for
@@ -903,6 +910,12 @@ message DeleteCertificateAuthorityRequest {
   // soon as possible without a 30-day grace period where undeletion would have
   // been allowed. If you proceed, there will be no way to recover this CA.
   bool skip_grace_period = 5 [(google.api.field_behavior) = OPTIONAL];
+
+  // Optional. This field allows this ca to be deleted even if it's being
+  // depended on by another resource. However, doing so may result in unintended
+  // and unrecoverable effects on any dependent resource(s) since the CA will
+  // no longer be able to issue certificates.
+  bool ignore_dependent_resources = 6 [(google.api.field_behavior) = OPTIONAL];
 }
 
 // Request message for
@@ -1025,6 +1038,12 @@ message DeleteCaPoolRequest {
   // The request ID must be a valid UUID with the exception that zero UUID is
   // not supported (00000000-0000-0000-0000-000000000000).
   string request_id = 2 [(google.api.field_behavior) = OPTIONAL];
+
+  // Optional. This field allows this pool to be deleted even if it's being
+  // depended on by another resource. However, doing so may result in unintended
+  // and unrecoverable effects on any dependent resource(s) since the pool will
+  // no longer be able to issue certificates.
+  bool ignore_dependent_resources = 4 [(google.api.field_behavior) = OPTIONAL];
 }
 
 // Request message for
diff --git a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/AsyncDeleteCaPool.java b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/AsyncDeleteCaPool.java
index 098892447fb1..6b6a28cd4bec 100644
--- a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/AsyncDeleteCaPool.java
+++ b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/AsyncDeleteCaPool.java
@@ -41,6 +41,7 @@ public static void asyncDeleteCaPool() throws Exception {
           DeleteCaPoolRequest.newBuilder()
               .setName(CaPoolName.of("[PROJECT]", "[LOCATION]", "[CA_POOL]").toString())
               .setRequestId("requestId693933066")
+              .setIgnoreDependentResources(true)
               .build();
       ApiFuture future =
           certificateAuthorityServiceClient.deleteCaPoolCallable().futureCall(request);
diff --git a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/AsyncDeleteCaPoolLRO.java b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/AsyncDeleteCaPoolLRO.java
index dbddcce98644..1b0e591cd281 100644
--- a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/AsyncDeleteCaPoolLRO.java
+++ b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/AsyncDeleteCaPoolLRO.java
@@ -42,6 +42,7 @@ public static void asyncDeleteCaPoolLRO() throws Exception {
           DeleteCaPoolRequest.newBuilder()
               .setName(CaPoolName.of("[PROJECT]", "[LOCATION]", "[CA_POOL]").toString())
               .setRequestId("requestId693933066")
+              .setIgnoreDependentResources(true)
               .build();
       OperationFuture future =
           certificateAuthorityServiceClient.deleteCaPoolOperationCallable().futureCall(request);
diff --git a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/SyncDeleteCaPool.java b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/SyncDeleteCaPool.java
index 01c19c3de855..7a9cb79b1ff6 100644
--- a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/SyncDeleteCaPool.java
+++ b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/SyncDeleteCaPool.java
@@ -40,6 +40,7 @@ public static void syncDeleteCaPool() throws Exception {
           DeleteCaPoolRequest.newBuilder()
               .setName(CaPoolName.of("[PROJECT]", "[LOCATION]", "[CA_POOL]").toString())
               .setRequestId("requestId693933066")
+              .setIgnoreDependentResources(true)
               .build();
       certificateAuthorityServiceClient.deleteCaPoolAsync(request).get();
     }
diff --git a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/AsyncDeleteCertificateAuthority.java b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/AsyncDeleteCertificateAuthority.java
index 6d2c376cd6de..449836254616 100644
--- a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/AsyncDeleteCertificateAuthority.java
+++ b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/AsyncDeleteCertificateAuthority.java
@@ -46,6 +46,7 @@ public static void asyncDeleteCertificateAuthority() throws Exception {
               .setRequestId("requestId693933066")
               .setIgnoreActiveCertificates(true)
               .setSkipGracePeriod(true)
+              .setIgnoreDependentResources(true)
               .build();
       ApiFuture future =
           certificateAuthorityServiceClient
diff --git a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/AsyncDeleteCertificateAuthorityLRO.java b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/AsyncDeleteCertificateAuthorityLRO.java
index 7856aa434c4a..5a3723866576 100644
--- a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/AsyncDeleteCertificateAuthorityLRO.java
+++ b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/AsyncDeleteCertificateAuthorityLRO.java
@@ -47,6 +47,7 @@ public static void asyncDeleteCertificateAuthorityLRO() throws Exception {
               .setRequestId("requestId693933066")
               .setIgnoreActiveCertificates(true)
               .setSkipGracePeriod(true)
+              .setIgnoreDependentResources(true)
               .build();
       OperationFuture future =
           certificateAuthorityServiceClient
diff --git a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/SyncDeleteCertificateAuthority.java b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/SyncDeleteCertificateAuthority.java
index c1b2d484608a..3d8d10e168c0 100644
--- a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/SyncDeleteCertificateAuthority.java
+++ b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/SyncDeleteCertificateAuthority.java
@@ -45,6 +45,7 @@ public static void syncDeleteCertificateAuthority() throws Exception {
               .setRequestId("requestId693933066")
               .setIgnoreActiveCertificates(true)
               .setSkipGracePeriod(true)
+              .setIgnoreDependentResources(true)
               .build();
       CertificateAuthority response =
           certificateAuthorityServiceClient.deleteCertificateAuthorityAsync(request).get();
diff --git a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/AsyncDisableCertificateAuthority.java b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/AsyncDisableCertificateAuthority.java
index c4202562a825..595559490136 100644
--- a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/AsyncDisableCertificateAuthority.java
+++ b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/AsyncDisableCertificateAuthority.java
@@ -44,6 +44,7 @@ public static void asyncDisableCertificateAuthority() throws Exception {
                           "[PROJECT]", "[LOCATION]", "[CA_POOL]", "[CERTIFICATE_AUTHORITY]")
                       .toString())
               .setRequestId("requestId693933066")
+              .setIgnoreDependentResources(true)
               .build();
       ApiFuture future =
           certificateAuthorityServiceClient
diff --git a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/AsyncDisableCertificateAuthorityLRO.java b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/AsyncDisableCertificateAuthorityLRO.java
index c1b44231fd7f..88f08ef7480d 100644
--- a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/AsyncDisableCertificateAuthorityLRO.java
+++ b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/AsyncDisableCertificateAuthorityLRO.java
@@ -45,6 +45,7 @@ public static void asyncDisableCertificateAuthorityLRO() throws Exception {
                           "[PROJECT]", "[LOCATION]", "[CA_POOL]", "[CERTIFICATE_AUTHORITY]")
                       .toString())
               .setRequestId("requestId693933066")
+              .setIgnoreDependentResources(true)
               .build();
       OperationFuture future =
           certificateAuthorityServiceClient
diff --git a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/SyncDisableCertificateAuthority.java b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/SyncDisableCertificateAuthority.java
index c505e114d912..da9d922c0747 100644
--- a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/SyncDisableCertificateAuthority.java
+++ b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/SyncDisableCertificateAuthority.java
@@ -43,6 +43,7 @@ public static void syncDisableCertificateAuthority() throws Exception {
                           "[PROJECT]", "[LOCATION]", "[CA_POOL]", "[CERTIFICATE_AUTHORITY]")
                       .toString())
               .setRequestId("requestId693933066")
+              .setIgnoreDependentResources(true)
               .build();
       CertificateAuthority response =
           certificateAuthorityServiceClient.disableCertificateAuthorityAsync(request).get();