serializer =
ProtoRestSerializer.create();
+ serializer.putQueryParam(
+ fields,
+ "ignoreDependentResources",
+ request.getIgnoreDependentResources());
serializer.putQueryParam(fields, "requestId", request.getRequestId());
serializer.putQueryParam(fields, "$alt", "json;enum-encoding=int");
return fields;
diff --git a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCaPoolRequest.java b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCaPoolRequest.java
index d1588a680092..ba2e6bb41e31 100644
--- a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCaPoolRequest.java
+++ b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCaPoolRequest.java
@@ -199,6 +199,27 @@ public com.google.protobuf.ByteString getRequestIdBytes() {
}
}
+ public static final int IGNORE_DEPENDENT_RESOURCES_FIELD_NUMBER = 4;
+ private boolean ignoreDependentResources_ = false;
+ /**
+ *
+ *
+ *
+ * Optional. This field allows this pool to be deleted even if it's being
+ * depended on by another resource. However, doing so may result in unintended
+ * and unrecoverable effects on any dependent resource(s) since the pool will
+ * no longer be able to issue certificates.
+ *
+ *
+ * bool ignore_dependent_resources = 4 [(.google.api.field_behavior) = OPTIONAL];
+ *
+ * @return The ignoreDependentResources.
+ */
+ @java.lang.Override
+ public boolean getIgnoreDependentResources() {
+ return ignoreDependentResources_;
+ }
+
private byte memoizedIsInitialized = -1;
@java.lang.Override
@@ -219,6 +240,9 @@ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(requestId_)) {
com.google.protobuf.GeneratedMessageV3.writeString(output, 2, requestId_);
}
+ if (ignoreDependentResources_ != false) {
+ output.writeBool(4, ignoreDependentResources_);
+ }
getUnknownFields().writeTo(output);
}
@@ -234,6 +258,9 @@ public int getSerializedSize() {
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(requestId_)) {
size += com.google.protobuf.GeneratedMessageV3.computeStringSize(2, requestId_);
}
+ if (ignoreDependentResources_ != false) {
+ size += com.google.protobuf.CodedOutputStream.computeBoolSize(4, ignoreDependentResources_);
+ }
size += getUnknownFields().getSerializedSize();
memoizedSize = size;
return size;
@@ -252,6 +279,7 @@ public boolean equals(final java.lang.Object obj) {
if (!getName().equals(other.getName())) return false;
if (!getRequestId().equals(other.getRequestId())) return false;
+ if (getIgnoreDependentResources() != other.getIgnoreDependentResources()) return false;
if (!getUnknownFields().equals(other.getUnknownFields())) return false;
return true;
}
@@ -267,6 +295,8 @@ public int hashCode() {
hash = (53 * hash) + getName().hashCode();
hash = (37 * hash) + REQUEST_ID_FIELD_NUMBER;
hash = (53 * hash) + getRequestId().hashCode();
+ hash = (37 * hash) + IGNORE_DEPENDENT_RESOURCES_FIELD_NUMBER;
+ hash = (53 * hash) + com.google.protobuf.Internal.hashBoolean(getIgnoreDependentResources());
hash = (29 * hash) + getUnknownFields().hashCode();
memoizedHashCode = hash;
return hash;
@@ -410,6 +440,7 @@ public Builder clear() {
bitField0_ = 0;
name_ = "";
requestId_ = "";
+ ignoreDependentResources_ = false;
return this;
}
@@ -452,6 +483,9 @@ private void buildPartial0(com.google.cloud.security.privateca.v1.DeleteCaPoolRe
if (((from_bitField0_ & 0x00000002) != 0)) {
result.requestId_ = requestId_;
}
+ if (((from_bitField0_ & 0x00000004) != 0)) {
+ result.ignoreDependentResources_ = ignoreDependentResources_;
+ }
}
@java.lang.Override
@@ -510,6 +544,9 @@ public Builder mergeFrom(com.google.cloud.security.privateca.v1.DeleteCaPoolRequ
bitField0_ |= 0x00000002;
onChanged();
}
+ if (other.getIgnoreDependentResources() != false) {
+ setIgnoreDependentResources(other.getIgnoreDependentResources());
+ }
this.mergeUnknownFields(other.getUnknownFields());
onChanged();
return this;
@@ -548,6 +585,12 @@ public Builder mergeFrom(
bitField0_ |= 0x00000002;
break;
} // case 18
+ case 32:
+ {
+ ignoreDependentResources_ = input.readBool();
+ bitField0_ |= 0x00000004;
+ break;
+ } // case 32
default:
{
if (!super.parseUnknownField(input, extensionRegistry, tag)) {
@@ -849,6 +892,68 @@ public Builder setRequestIdBytes(com.google.protobuf.ByteString value) {
return this;
}
+ private boolean ignoreDependentResources_;
+ /**
+ *
+ *
+ *
+ * Optional. This field allows this pool to be deleted even if it's being
+ * depended on by another resource. However, doing so may result in unintended
+ * and unrecoverable effects on any dependent resource(s) since the pool will
+ * no longer be able to issue certificates.
+ *
+ *
+ * bool ignore_dependent_resources = 4 [(.google.api.field_behavior) = OPTIONAL];
+ *
+ * @return The ignoreDependentResources.
+ */
+ @java.lang.Override
+ public boolean getIgnoreDependentResources() {
+ return ignoreDependentResources_;
+ }
+ /**
+ *
+ *
+ *
+ * Optional. This field allows this pool to be deleted even if it's being
+ * depended on by another resource. However, doing so may result in unintended
+ * and unrecoverable effects on any dependent resource(s) since the pool will
+ * no longer be able to issue certificates.
+ *
+ *
+ * bool ignore_dependent_resources = 4 [(.google.api.field_behavior) = OPTIONAL];
+ *
+ * @param value The ignoreDependentResources to set.
+ * @return This builder for chaining.
+ */
+ public Builder setIgnoreDependentResources(boolean value) {
+
+ ignoreDependentResources_ = value;
+ bitField0_ |= 0x00000004;
+ onChanged();
+ return this;
+ }
+ /**
+ *
+ *
+ *
+ * Optional. This field allows this pool to be deleted even if it's being
+ * depended on by another resource. However, doing so may result in unintended
+ * and unrecoverable effects on any dependent resource(s) since the pool will
+ * no longer be able to issue certificates.
+ *
+ *
+ * bool ignore_dependent_resources = 4 [(.google.api.field_behavior) = OPTIONAL];
+ *
+ * @return This builder for chaining.
+ */
+ public Builder clearIgnoreDependentResources() {
+ bitField0_ = (bitField0_ & ~0x00000004);
+ ignoreDependentResources_ = false;
+ onChanged();
+ return this;
+ }
+
@java.lang.Override
public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) {
return super.setUnknownFields(unknownFields);
diff --git a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCaPoolRequestOrBuilder.java b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCaPoolRequestOrBuilder.java
index 8f968b02ea2d..093e7a3153a9 100644
--- a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCaPoolRequestOrBuilder.java
+++ b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCaPoolRequestOrBuilder.java
@@ -100,4 +100,20 @@ public interface DeleteCaPoolRequestOrBuilder
* @return The bytes for requestId.
*/
com.google.protobuf.ByteString getRequestIdBytes();
+
+ /**
+ *
+ *
+ *
+ * Optional. This field allows this pool to be deleted even if it's being
+ * depended on by another resource. However, doing so may result in unintended
+ * and unrecoverable effects on any dependent resource(s) since the pool will
+ * no longer be able to issue certificates.
+ *
+ *
+ * bool ignore_dependent_resources = 4 [(.google.api.field_behavior) = OPTIONAL];
+ *
+ * @return The ignoreDependentResources.
+ */
+ boolean getIgnoreDependentResources();
}
diff --git a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCertificateAuthorityRequest.java b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCertificateAuthorityRequest.java
index 01d1c2e6cde9..4d3fd572a527 100644
--- a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCertificateAuthorityRequest.java
+++ b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCertificateAuthorityRequest.java
@@ -239,6 +239,27 @@ public boolean getSkipGracePeriod() {
return skipGracePeriod_;
}
+ public static final int IGNORE_DEPENDENT_RESOURCES_FIELD_NUMBER = 6;
+ private boolean ignoreDependentResources_ = false;
+ /**
+ *
+ *
+ *
+ * Optional. This field allows this ca to be deleted even if it's being
+ * depended on by another resource. However, doing so may result in unintended
+ * and unrecoverable effects on any dependent resource(s) since the CA will
+ * no longer be able to issue certificates.
+ *
+ *
+ * bool ignore_dependent_resources = 6 [(.google.api.field_behavior) = OPTIONAL];
+ *
+ * @return The ignoreDependentResources.
+ */
+ @java.lang.Override
+ public boolean getIgnoreDependentResources() {
+ return ignoreDependentResources_;
+ }
+
private byte memoizedIsInitialized = -1;
@java.lang.Override
@@ -265,6 +286,9 @@ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io
if (skipGracePeriod_ != false) {
output.writeBool(5, skipGracePeriod_);
}
+ if (ignoreDependentResources_ != false) {
+ output.writeBool(6, ignoreDependentResources_);
+ }
getUnknownFields().writeTo(output);
}
@@ -286,6 +310,9 @@ public int getSerializedSize() {
if (skipGracePeriod_ != false) {
size += com.google.protobuf.CodedOutputStream.computeBoolSize(5, skipGracePeriod_);
}
+ if (ignoreDependentResources_ != false) {
+ size += com.google.protobuf.CodedOutputStream.computeBoolSize(6, ignoreDependentResources_);
+ }
size += getUnknownFields().getSerializedSize();
memoizedSize = size;
return size;
@@ -307,6 +334,7 @@ public boolean equals(final java.lang.Object obj) {
if (!getRequestId().equals(other.getRequestId())) return false;
if (getIgnoreActiveCertificates() != other.getIgnoreActiveCertificates()) return false;
if (getSkipGracePeriod() != other.getSkipGracePeriod()) return false;
+ if (getIgnoreDependentResources() != other.getIgnoreDependentResources()) return false;
if (!getUnknownFields().equals(other.getUnknownFields())) return false;
return true;
}
@@ -326,6 +354,8 @@ public int hashCode() {
hash = (53 * hash) + com.google.protobuf.Internal.hashBoolean(getIgnoreActiveCertificates());
hash = (37 * hash) + SKIP_GRACE_PERIOD_FIELD_NUMBER;
hash = (53 * hash) + com.google.protobuf.Internal.hashBoolean(getSkipGracePeriod());
+ hash = (37 * hash) + IGNORE_DEPENDENT_RESOURCES_FIELD_NUMBER;
+ hash = (53 * hash) + com.google.protobuf.Internal.hashBoolean(getIgnoreDependentResources());
hash = (29 * hash) + getUnknownFields().hashCode();
memoizedHashCode = hash;
return hash;
@@ -474,6 +504,7 @@ public Builder clear() {
requestId_ = "";
ignoreActiveCertificates_ = false;
skipGracePeriod_ = false;
+ ignoreDependentResources_ = false;
return this;
}
@@ -526,6 +557,9 @@ private void buildPartial0(
if (((from_bitField0_ & 0x00000008) != 0)) {
result.skipGracePeriod_ = skipGracePeriod_;
}
+ if (((from_bitField0_ & 0x00000010) != 0)) {
+ result.ignoreDependentResources_ = ignoreDependentResources_;
+ }
}
@java.lang.Override
@@ -594,6 +628,9 @@ public Builder mergeFrom(
if (other.getSkipGracePeriod() != false) {
setSkipGracePeriod(other.getSkipGracePeriod());
}
+ if (other.getIgnoreDependentResources() != false) {
+ setIgnoreDependentResources(other.getIgnoreDependentResources());
+ }
this.mergeUnknownFields(other.getUnknownFields());
onChanged();
return this;
@@ -644,6 +681,12 @@ public Builder mergeFrom(
bitField0_ |= 0x00000008;
break;
} // case 40
+ case 48:
+ {
+ ignoreDependentResources_ = input.readBool();
+ bitField0_ |= 0x00000010;
+ break;
+ } // case 48
default:
{
if (!super.parseUnknownField(input, extensionRegistry, tag)) {
@@ -1060,6 +1103,68 @@ public Builder clearSkipGracePeriod() {
return this;
}
+ private boolean ignoreDependentResources_;
+ /**
+ *
+ *
+ *
+ * Optional. This field allows this ca to be deleted even if it's being
+ * depended on by another resource. However, doing so may result in unintended
+ * and unrecoverable effects on any dependent resource(s) since the CA will
+ * no longer be able to issue certificates.
+ *
+ *
+ * bool ignore_dependent_resources = 6 [(.google.api.field_behavior) = OPTIONAL];
+ *
+ * @return The ignoreDependentResources.
+ */
+ @java.lang.Override
+ public boolean getIgnoreDependentResources() {
+ return ignoreDependentResources_;
+ }
+ /**
+ *
+ *
+ *
+ * Optional. This field allows this ca to be deleted even if it's being
+ * depended on by another resource. However, doing so may result in unintended
+ * and unrecoverable effects on any dependent resource(s) since the CA will
+ * no longer be able to issue certificates.
+ *
+ *
+ * bool ignore_dependent_resources = 6 [(.google.api.field_behavior) = OPTIONAL];
+ *
+ * @param value The ignoreDependentResources to set.
+ * @return This builder for chaining.
+ */
+ public Builder setIgnoreDependentResources(boolean value) {
+
+ ignoreDependentResources_ = value;
+ bitField0_ |= 0x00000010;
+ onChanged();
+ return this;
+ }
+ /**
+ *
+ *
+ *
+ * Optional. This field allows this ca to be deleted even if it's being
+ * depended on by another resource. However, doing so may result in unintended
+ * and unrecoverable effects on any dependent resource(s) since the CA will
+ * no longer be able to issue certificates.
+ *
+ *
+ * bool ignore_dependent_resources = 6 [(.google.api.field_behavior) = OPTIONAL];
+ *
+ * @return This builder for chaining.
+ */
+ public Builder clearIgnoreDependentResources() {
+ bitField0_ = (bitField0_ & ~0x00000010);
+ ignoreDependentResources_ = false;
+ onChanged();
+ return this;
+ }
+
@java.lang.Override
public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) {
return super.setUnknownFields(unknownFields);
diff --git a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCertificateAuthorityRequestOrBuilder.java b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCertificateAuthorityRequestOrBuilder.java
index eba7ad201606..c333c2b63987 100644
--- a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCertificateAuthorityRequestOrBuilder.java
+++ b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DeleteCertificateAuthorityRequestOrBuilder.java
@@ -129,4 +129,20 @@ public interface DeleteCertificateAuthorityRequestOrBuilder
* @return The skipGracePeriod.
*/
boolean getSkipGracePeriod();
+
+ /**
+ *
+ *
+ *
+ * Optional. This field allows this ca to be deleted even if it's being
+ * depended on by another resource. However, doing so may result in unintended
+ * and unrecoverable effects on any dependent resource(s) since the CA will
+ * no longer be able to issue certificates.
+ *
+ *
+ * bool ignore_dependent_resources = 6 [(.google.api.field_behavior) = OPTIONAL];
+ *
+ * @return The ignoreDependentResources.
+ */
+ boolean getIgnoreDependentResources();
}
diff --git a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DisableCertificateAuthorityRequest.java b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DisableCertificateAuthorityRequest.java
index f99bad256d90..b5f647f93d12 100644
--- a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DisableCertificateAuthorityRequest.java
+++ b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DisableCertificateAuthorityRequest.java
@@ -201,6 +201,27 @@ public com.google.protobuf.ByteString getRequestIdBytes() {
}
}
+ public static final int IGNORE_DEPENDENT_RESOURCES_FIELD_NUMBER = 3;
+ private boolean ignoreDependentResources_ = false;
+ /**
+ *
+ *
+ *
+ * Optional. This field allows this CA to be disabled even if it's being
+ * depended on by another resource. However, doing so may result in unintended
+ * and unrecoverable effects on any dependent resource(s) since the CA will
+ * no longer be able to issue certificates.
+ *
+ *
+ * bool ignore_dependent_resources = 3 [(.google.api.field_behavior) = OPTIONAL];
+ *
+ * @return The ignoreDependentResources.
+ */
+ @java.lang.Override
+ public boolean getIgnoreDependentResources() {
+ return ignoreDependentResources_;
+ }
+
private byte memoizedIsInitialized = -1;
@java.lang.Override
@@ -221,6 +242,9 @@ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(requestId_)) {
com.google.protobuf.GeneratedMessageV3.writeString(output, 2, requestId_);
}
+ if (ignoreDependentResources_ != false) {
+ output.writeBool(3, ignoreDependentResources_);
+ }
getUnknownFields().writeTo(output);
}
@@ -236,6 +260,9 @@ public int getSerializedSize() {
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(requestId_)) {
size += com.google.protobuf.GeneratedMessageV3.computeStringSize(2, requestId_);
}
+ if (ignoreDependentResources_ != false) {
+ size += com.google.protobuf.CodedOutputStream.computeBoolSize(3, ignoreDependentResources_);
+ }
size += getUnknownFields().getSerializedSize();
memoizedSize = size;
return size;
@@ -255,6 +282,7 @@ public boolean equals(final java.lang.Object obj) {
if (!getName().equals(other.getName())) return false;
if (!getRequestId().equals(other.getRequestId())) return false;
+ if (getIgnoreDependentResources() != other.getIgnoreDependentResources()) return false;
if (!getUnknownFields().equals(other.getUnknownFields())) return false;
return true;
}
@@ -270,6 +298,8 @@ public int hashCode() {
hash = (53 * hash) + getName().hashCode();
hash = (37 * hash) + REQUEST_ID_FIELD_NUMBER;
hash = (53 * hash) + getRequestId().hashCode();
+ hash = (37 * hash) + IGNORE_DEPENDENT_RESOURCES_FIELD_NUMBER;
+ hash = (53 * hash) + com.google.protobuf.Internal.hashBoolean(getIgnoreDependentResources());
hash = (29 * hash) + getUnknownFields().hashCode();
memoizedHashCode = hash;
return hash;
@@ -416,6 +446,7 @@ public Builder clear() {
bitField0_ = 0;
name_ = "";
requestId_ = "";
+ ignoreDependentResources_ = false;
return this;
}
@@ -463,6 +494,9 @@ private void buildPartial0(
if (((from_bitField0_ & 0x00000002) != 0)) {
result.requestId_ = requestId_;
}
+ if (((from_bitField0_ & 0x00000004) != 0)) {
+ result.ignoreDependentResources_ = ignoreDependentResources_;
+ }
}
@java.lang.Override
@@ -525,6 +559,9 @@ public Builder mergeFrom(
bitField0_ |= 0x00000002;
onChanged();
}
+ if (other.getIgnoreDependentResources() != false) {
+ setIgnoreDependentResources(other.getIgnoreDependentResources());
+ }
this.mergeUnknownFields(other.getUnknownFields());
onChanged();
return this;
@@ -563,6 +600,12 @@ public Builder mergeFrom(
bitField0_ |= 0x00000002;
break;
} // case 18
+ case 24:
+ {
+ ignoreDependentResources_ = input.readBool();
+ bitField0_ |= 0x00000004;
+ break;
+ } // case 24
default:
{
if (!super.parseUnknownField(input, extensionRegistry, tag)) {
@@ -864,6 +907,68 @@ public Builder setRequestIdBytes(com.google.protobuf.ByteString value) {
return this;
}
+ private boolean ignoreDependentResources_;
+ /**
+ *
+ *
+ *
+ * Optional. This field allows this CA to be disabled even if it's being
+ * depended on by another resource. However, doing so may result in unintended
+ * and unrecoverable effects on any dependent resource(s) since the CA will
+ * no longer be able to issue certificates.
+ *
+ *
+ * bool ignore_dependent_resources = 3 [(.google.api.field_behavior) = OPTIONAL];
+ *
+ * @return The ignoreDependentResources.
+ */
+ @java.lang.Override
+ public boolean getIgnoreDependentResources() {
+ return ignoreDependentResources_;
+ }
+ /**
+ *
+ *
+ *
+ * Optional. This field allows this CA to be disabled even if it's being
+ * depended on by another resource. However, doing so may result in unintended
+ * and unrecoverable effects on any dependent resource(s) since the CA will
+ * no longer be able to issue certificates.
+ *
+ *
+ * bool ignore_dependent_resources = 3 [(.google.api.field_behavior) = OPTIONAL];
+ *
+ * @param value The ignoreDependentResources to set.
+ * @return This builder for chaining.
+ */
+ public Builder setIgnoreDependentResources(boolean value) {
+
+ ignoreDependentResources_ = value;
+ bitField0_ |= 0x00000004;
+ onChanged();
+ return this;
+ }
+ /**
+ *
+ *
+ *
+ * Optional. This field allows this CA to be disabled even if it's being
+ * depended on by another resource. However, doing so may result in unintended
+ * and unrecoverable effects on any dependent resource(s) since the CA will
+ * no longer be able to issue certificates.
+ *
+ *
+ * bool ignore_dependent_resources = 3 [(.google.api.field_behavior) = OPTIONAL];
+ *
+ * @return This builder for chaining.
+ */
+ public Builder clearIgnoreDependentResources() {
+ bitField0_ = (bitField0_ & ~0x00000004);
+ ignoreDependentResources_ = false;
+ onChanged();
+ return this;
+ }
+
@java.lang.Override
public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) {
return super.setUnknownFields(unknownFields);
diff --git a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DisableCertificateAuthorityRequestOrBuilder.java b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DisableCertificateAuthorityRequestOrBuilder.java
index bda9c6fdfbff..10653c2cf5b5 100644
--- a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DisableCertificateAuthorityRequestOrBuilder.java
+++ b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/DisableCertificateAuthorityRequestOrBuilder.java
@@ -100,4 +100,20 @@ public interface DisableCertificateAuthorityRequestOrBuilder
* @return The bytes for requestId.
*/
com.google.protobuf.ByteString getRequestIdBytes();
+
+ /**
+ *
+ *
+ *
+ * Optional. This field allows this CA to be disabled even if it's being
+ * depended on by another resource. However, doing so may result in unintended
+ * and unrecoverable effects on any dependent resource(s) since the CA will
+ * no longer be able to issue certificates.
+ *
+ *
+ * bool ignore_dependent_resources = 3 [(.google.api.field_behavior) = OPTIONAL];
+ *
+ * @return The ignoreDependentResources.
+ */
+ boolean getIgnoreDependentResources();
}
diff --git a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/PrivateCaProto.java b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/PrivateCaProto.java
index c3bb0b0b77f4..40e7fac178e7 100644
--- a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/PrivateCaProto.java
+++ b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/PrivateCaProto.java
@@ -195,361 +195,365 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
+ "behavior.proto\032\031google/api/resource.prot"
+ "o\0322google/cloud/security/privateca/v1/re"
+ "sources.proto\032#google/longrunning/operat"
- + "ions.proto\032 google/protobuf/field_mask.p"
- + "roto\032\037google/protobuf/timestamp.proto\"\237\002"
- + "\n\030CreateCertificateRequest\0227\n\006parent\030\001 \001"
- + "(\tB\'\340A\002\372A!\n\037privateca.googleapis.com/CaP"
- + "ool\022\033\n\016certificate_id\030\002 \001(\tB\003\340A\001\022I\n\013cert"
- + "ificate\030\003 \001(\0132/.google.cloud.security.pr"
- + "ivateca.v1.CertificateB\003\340A\002\022\027\n\nrequest_i"
- + "d\030\004 \001(\tB\003\340A\001\022\032\n\rvalidate_only\030\005 \001(\010B\003\340A\001"
- + "\022-\n issuing_certificate_authority_id\030\006 \001"
- + "(\tB\003\340A\001\"S\n\025GetCertificateRequest\022:\n\004name"
- + "\030\001 \001(\tB,\340A\002\372A&\n$privateca.googleapis.com"
- + "/Certificate\"\257\001\n\027ListCertificatesRequest"
- + "\0227\n\006parent\030\001 \001(\tB\'\340A\002\372A!\n\037privateca.goog"
- + "leapis.com/CaPool\022\026\n\tpage_size\030\002 \001(\005B\003\340A"
- + "\001\022\027\n\npage_token\030\003 \001(\tB\003\340A\001\022\023\n\006filter\030\004 \001"
- + "(\tB\003\340A\001\022\025\n\010order_by\030\005 \001(\tB\003\340A\001\"\217\001\n\030ListC"
- + "ertificatesResponse\022E\n\014certificates\030\001 \003("
- + "\0132/.google.cloud.security.privateca.v1.C"
- + "ertificate\022\027\n\017next_page_token\030\002 \001(\t\022\023\n\013u"
- + "nreachable\030\003 \003(\t\"\272\001\n\030RevokeCertificateRe"
- + "quest\022:\n\004name\030\001 \001(\tB,\340A\002\372A&\n$privateca.g"
- + "oogleapis.com/Certificate\022I\n\006reason\030\002 \001("
- + "\01624.google.cloud.security.privateca.v1.R"
- + "evocationReasonB\003\340A\002\022\027\n\nrequest_id\030\003 \001(\t"
- + "B\003\340A\001\"\264\001\n\030UpdateCertificateRequest\022I\n\013ce"
- + "rtificate\030\001 \001(\0132/.google.cloud.security."
- + "privateca.v1.CertificateB\003\340A\002\0224\n\013update_"
- + "mask\030\002 \001(\0132\032.google.protobuf.FieldMaskB\003"
- + "\340A\002\022\027\n\nrequest_id\030\003 \001(\tB\003\340A\001\"\374\001\n#Activat"
+ + "ions.proto\032\033google/protobuf/empty.proto\032"
+ + " google/protobuf/field_mask.proto\032\037googl"
+ + "e/protobuf/timestamp.proto\"\237\002\n\030CreateCer"
+ + "tificateRequest\0227\n\006parent\030\001 \001(\tB\'\340A\002\372A!\n"
+ + "\037privateca.googleapis.com/CaPool\022\033\n\016cert"
+ + "ificate_id\030\002 \001(\tB\003\340A\001\022I\n\013certificate\030\003 \001"
+ + "(\0132/.google.cloud.security.privateca.v1."
+ + "CertificateB\003\340A\002\022\027\n\nrequest_id\030\004 \001(\tB\003\340A"
+ + "\001\022\032\n\rvalidate_only\030\005 \001(\010B\003\340A\001\022-\n issuing"
+ + "_certificate_authority_id\030\006 \001(\tB\003\340A\001\"S\n\025"
+ + "GetCertificateRequest\022:\n\004name\030\001 \001(\tB,\340A\002"
+ + "\372A&\n$privateca.googleapis.com/Certificat"
+ + "e\"\257\001\n\027ListCertificatesRequest\0227\n\006parent\030"
+ + "\001 \001(\tB\'\340A\002\372A!\n\037privateca.googleapis.com/"
+ + "CaPool\022\026\n\tpage_size\030\002 \001(\005B\003\340A\001\022\027\n\npage_t"
+ + "oken\030\003 \001(\tB\003\340A\001\022\023\n\006filter\030\004 \001(\tB\003\340A\001\022\025\n\010"
+ + "order_by\030\005 \001(\tB\003\340A\001\"\217\001\n\030ListCertificates"
+ + "Response\022E\n\014certificates\030\001 \003(\0132/.google."
+ + "cloud.security.privateca.v1.Certificate\022"
+ + "\027\n\017next_page_token\030\002 \001(\t\022\023\n\013unreachable\030"
+ + "\003 \003(\t\"\272\001\n\030RevokeCertificateRequest\022:\n\004na"
+ + "me\030\001 \001(\tB,\340A\002\372A&\n$privateca.googleapis.c"
+ + "om/Certificate\022I\n\006reason\030\002 \001(\01624.google."
+ + "cloud.security.privateca.v1.RevocationRe"
+ + "asonB\003\340A\002\022\027\n\nrequest_id\030\003 \001(\tB\003\340A\001\"\264\001\n\030U"
+ + "pdateCertificateRequest\022I\n\013certificate\030\001"
+ + " \001(\0132/.google.cloud.security.privateca.v"
+ + "1.CertificateB\003\340A\002\0224\n\013update_mask\030\002 \001(\0132"
+ + "\032.google.protobuf.FieldMaskB\003\340A\002\022\027\n\nrequ"
+ + "est_id\030\003 \001(\tB\003\340A\001\"\374\001\n#ActivateCertificat"
+ + "eAuthorityRequest\022C\n\004name\030\001 \001(\tB5\340A\002\372A/\n"
+ + "-privateca.googleapis.com/CertificateAut"
+ + "hority\022\037\n\022pem_ca_certificate\030\002 \001(\tB\003\340A\002\022"
+ + "V\n\022subordinate_config\030\003 \001(\01325.google.clo"
+ + "ud.security.privateca.v1.SubordinateConf"
+ + "igB\003\340A\002\022\027\n\nrequest_id\030\004 \001(\tB\003\340A\001\"\372\001\n!Cre"
+ + "ateCertificateAuthorityRequest\0227\n\006parent"
+ + "\030\001 \001(\tB\'\340A\002\372A!\n\037privateca.googleapis.com"
+ + "/CaPool\022%\n\030certificate_authority_id\030\002 \001("
+ + "\tB\003\340A\002\022\\\n\025certificate_authority\030\003 \001(\01328."
+ + "google.cloud.security.privateca.v1.Certi"
+ + "ficateAuthorityB\003\340A\002\022\027\n\nrequest_id\030\004 \001(\t"
+ + "B\003\340A\001\"\253\001\n\"DisableCertificateAuthorityReq"
+ + "uest\022C\n\004name\030\001 \001(\tB5\340A\002\372A/\n-privateca.go"
+ + "ogleapis.com/CertificateAuthority\022\027\n\nreq"
+ + "uest_id\030\002 \001(\tB\003\340A\001\022\'\n\032ignore_dependent_r"
+ + "esources\030\003 \001(\010B\003\340A\001\"\201\001\n!EnableCertificat"
+ + "eAuthorityRequest\022C\n\004name\030\001 \001(\tB5\340A\002\372A/\n"
+ + "-privateca.googleapis.com/CertificateAut"
+ + "hority\022\027\n\nrequest_id\030\002 \001(\tB\003\340A\001\"j\n#Fetch"
+ + "CertificateAuthorityCsrRequest\022C\n\004name\030\001"
+ + " \001(\tB5\340A\002\372A/\n-privateca.googleapis.com/C"
+ + "ertificateAuthority\"<\n$FetchCertificateA"
+ + "uthorityCsrResponse\022\024\n\007pem_csr\030\001 \001(\tB\003\340A"
+ + "\003\"e\n\036GetCertificateAuthorityRequest\022C\n\004n"
+ + "ame\030\001 \001(\tB5\340A\002\372A/\n-privateca.googleapis."
+ + "com/CertificateAuthority\"\271\001\n!ListCertifi"
+ + "cateAuthoritiesRequest\0227\n\006parent\030\001 \001(\tB\'"
+ + "\340A\002\372A!\n\037privateca.googleapis.com/CaPool\022"
+ + "\026\n\tpage_size\030\002 \001(\005B\003\340A\001\022\027\n\npage_token\030\003 "
+ + "\001(\tB\003\340A\001\022\023\n\006filter\030\004 \001(\tB\003\340A\001\022\025\n\010order_b"
+ + "y\030\005 \001(\tB\003\340A\001\"\255\001\n\"ListCertificateAuthorit"
+ + "iesResponse\022Y\n\027certificate_authorities\030\001"
+ + " \003(\01328.google.cloud.security.privateca.v"
+ + "1.CertificateAuthority\022\027\n\017next_page_toke"
+ + "n\030\002 \001(\t\022\023\n\013unreachable\030\003 \003(\t\"\203\001\n#Undelet"
+ "eCertificateAuthorityRequest\022C\n\004name\030\001 \001"
+ "(\tB5\340A\002\372A/\n-privateca.googleapis.com/Cer"
- + "tificateAuthority\022\037\n\022pem_ca_certificate\030"
- + "\002 \001(\tB\003\340A\002\022V\n\022subordinate_config\030\003 \001(\01325"
- + ".google.cloud.security.privateca.v1.Subo"
- + "rdinateConfigB\003\340A\002\022\027\n\nrequest_id\030\004 \001(\tB\003"
- + "\340A\001\"\372\001\n!CreateCertificateAuthorityReques"
- + "t\0227\n\006parent\030\001 \001(\tB\'\340A\002\372A!\n\037privateca.goo"
- + "gleapis.com/CaPool\022%\n\030certificate_author"
- + "ity_id\030\002 \001(\tB\003\340A\002\022\\\n\025certificate_authori"
- + "ty\030\003 \001(\01328.google.cloud.security.private"
- + "ca.v1.CertificateAuthorityB\003\340A\002\022\027\n\nreque"
- + "st_id\030\004 \001(\tB\003\340A\001\"\202\001\n\"DisableCertificateA"
- + "uthorityRequest\022C\n\004name\030\001 \001(\tB5\340A\002\372A/\n-p"
- + "rivateca.googleapis.com/CertificateAutho"
- + "rity\022\027\n\nrequest_id\030\002 \001(\tB\003\340A\001\"\201\001\n!Enable"
- + "CertificateAuthorityRequest\022C\n\004name\030\001 \001("
- + "\tB5\340A\002\372A/\n-privateca.googleapis.com/Cert"
- + "ificateAuthority\022\027\n\nrequest_id\030\002 \001(\tB\003\340A"
- + "\001\"j\n#FetchCertificateAuthorityCsrRequest"
+ + "tificateAuthority\022\027\n\nrequest_id\030\002 \001(\tB\003\340"
+ + "A\001\"\363\001\n!DeleteCertificateAuthorityRequest"
+ "\022C\n\004name\030\001 \001(\tB5\340A\002\372A/\n-privateca.google"
- + "apis.com/CertificateAuthority\"<\n$FetchCe"
- + "rtificateAuthorityCsrResponse\022\024\n\007pem_csr"
- + "\030\001 \001(\tB\003\340A\003\"e\n\036GetCertificateAuthorityRe"
- + "quest\022C\n\004name\030\001 \001(\tB5\340A\002\372A/\n-privateca.g"
- + "oogleapis.com/CertificateAuthority\"\271\001\n!L"
- + "istCertificateAuthoritiesRequest\0227\n\006pare"
- + "nt\030\001 \001(\tB\'\340A\002\372A!\n\037privateca.googleapis.c"
- + "om/CaPool\022\026\n\tpage_size\030\002 \001(\005B\003\340A\001\022\027\n\npag"
- + "e_token\030\003 \001(\tB\003\340A\001\022\023\n\006filter\030\004 \001(\tB\003\340A\001\022"
- + "\025\n\010order_by\030\005 \001(\tB\003\340A\001\"\255\001\n\"ListCertifica"
- + "teAuthoritiesResponse\022Y\n\027certificate_aut"
- + "horities\030\001 \003(\01328.google.cloud.security.p"
- + "rivateca.v1.CertificateAuthority\022\027\n\017next"
- + "_page_token\030\002 \001(\t\022\023\n\013unreachable\030\003 \003(\t\"\203"
- + "\001\n#UndeleteCertificateAuthorityRequest\022C"
- + "\n\004name\030\001 \001(\tB5\340A\002\372A/\n-privateca.googleap"
- + "is.com/CertificateAuthority\022\027\n\nrequest_i"
- + "d\030\002 \001(\tB\003\340A\001\"\312\001\n!DeleteCertificateAuthor"
- + "ityRequest\022C\n\004name\030\001 \001(\tB5\340A\002\372A/\n-privat"
- + "eca.googleapis.com/CertificateAuthority\022"
- + "\027\n\nrequest_id\030\002 \001(\tB\003\340A\001\022\'\n\032ignore_activ"
- + "e_certificates\030\004 \001(\010B\003\340A\001\022\036\n\021skip_grace_"
- + "period\030\005 \001(\010B\003\340A\001\"\320\001\n!UpdateCertificateA"
- + "uthorityRequest\022\\\n\025certificate_authority"
- + "\030\001 \001(\01328.google.cloud.security.privateca"
- + ".v1.CertificateAuthorityB\003\340A\002\0224\n\013update_"
- + "mask\030\002 \001(\0132\032.google.protobuf.FieldMaskB\003"
- + "\340A\002\022\027\n\nrequest_id\030\003 \001(\tB\003\340A\001\"\304\001\n\023CreateC"
- + "aPoolRequest\0229\n\006parent\030\001 \001(\tB)\340A\002\372A#\n!lo"
- + "cations.googleapis.com/Location\022\027\n\nca_po"
- + "ol_id\030\002 \001(\tB\003\340A\002\022@\n\007ca_pool\030\003 \001(\0132*.goog"
- + "le.cloud.security.privateca.v1.CaPoolB\003\340"
- + "A\002\022\027\n\nrequest_id\030\004 \001(\tB\003\340A\001\"\246\001\n\023UpdateCa"
- + "PoolRequest\022@\n\007ca_pool\030\001 \001(\0132*.google.cl"
- + "oud.security.privateca.v1.CaPoolB\003\340A\002\0224\n"
- + "\013update_mask\030\002 \001(\0132\032.google.protobuf.Fie"
- + "ldMaskB\003\340A\002\022\027\n\nrequest_id\030\003 \001(\tB\003\340A\001\"e\n\023"
- + "DeleteCaPoolRequest\0225\n\004name\030\001 \001(\tB\'\340A\002\372A"
- + "!\n\037privateca.googleapis.com/CaPool\022\027\n\nre"
- + "quest_id\030\002 \001(\tB\003\340A\001\"h\n\023FetchCaCertsReque"
- + "st\0228\n\007ca_pool\030\001 \001(\tB\'\340A\002\372A!\n\037privateca.g"
- + "oogleapis.com/CaPool\022\027\n\nrequest_id\030\002 \001(\t"
- + "B\003\340A\001\"\217\001\n\024FetchCaCertsResponse\022T\n\010ca_cer"
- + "ts\030\001 \003(\0132B.google.cloud.security.private"
- + "ca.v1.FetchCaCertsResponse.CertChain\032!\n\t"
- + "CertChain\022\024\n\014certificates\030\001 \003(\t\"I\n\020GetCa"
+ + "apis.com/CertificateAuthority\022\027\n\nrequest"
+ + "_id\030\002 \001(\tB\003\340A\001\022\'\n\032ignore_active_certific"
+ + "ates\030\004 \001(\010B\003\340A\001\022\036\n\021skip_grace_period\030\005 \001"
+ + "(\010B\003\340A\001\022\'\n\032ignore_dependent_resources\030\006 "
+ + "\001(\010B\003\340A\001\"\320\001\n!UpdateCertificateAuthorityR"
+ + "equest\022\\\n\025certificate_authority\030\001 \001(\01328."
+ + "google.cloud.security.privateca.v1.Certi"
+ + "ficateAuthorityB\003\340A\002\0224\n\013update_mask\030\002 \001("
+ + "\0132\032.google.protobuf.FieldMaskB\003\340A\002\022\027\n\nre"
+ + "quest_id\030\003 \001(\tB\003\340A\001\"\304\001\n\023CreateCaPoolRequ"
+ + "est\0229\n\006parent\030\001 \001(\tB)\340A\002\372A#\n!locations.g"
+ + "oogleapis.com/Location\022\027\n\nca_pool_id\030\002 \001"
+ + "(\tB\003\340A\002\022@\n\007ca_pool\030\003 \001(\0132*.google.cloud."
+ + "security.privateca.v1.CaPoolB\003\340A\002\022\027\n\nreq"
+ + "uest_id\030\004 \001(\tB\003\340A\001\"\246\001\n\023UpdateCaPoolReque"
+ + "st\022@\n\007ca_pool\030\001 \001(\0132*.google.cloud.secur"
+ + "ity.privateca.v1.CaPoolB\003\340A\002\0224\n\013update_m"
+ + "ask\030\002 \001(\0132\032.google.protobuf.FieldMaskB\003\340"
+ + "A\002\022\027\n\nrequest_id\030\003 \001(\tB\003\340A\001\"\216\001\n\023DeleteCa"
+ "PoolRequest\0225\n\004name\030\001 \001(\tB\'\340A\002\372A!\n\037priva"
- + "teca.googleapis.com/CaPool\"\254\001\n\022ListCaPoo"
- + "lsRequest\0229\n\006parent\030\001 \001(\tB)\340A\002\372A#\n!locat"
- + "ions.googleapis.com/Location\022\026\n\tpage_siz"
- + "e\030\002 \001(\005B\003\340A\001\022\027\n\npage_token\030\003 \001(\tB\003\340A\001\022\023\n"
- + "\006filter\030\004 \001(\tB\003\340A\001\022\025\n\010order_by\030\005 \001(\tB\003\340A"
- + "\001\"\201\001\n\023ListCaPoolsResponse\022<\n\010ca_pools\030\001 "
- + "\003(\0132*.google.cloud.security.privateca.v1"
- + ".CaPool\022\027\n\017next_page_token\030\002 \001(\t\022\023\n\013unre"
- + "achable\030\003 \003(\t\"o\n#GetCertificateRevocatio"
- + "nListRequest\022H\n\004name\030\001 \001(\tB:\340A\002\372A4\n2priv"
- + "ateca.googleapis.com/CertificateRevocati"
- + "onList\"\313\001\n%ListCertificateRevocationList"
- + "sRequest\022E\n\006parent\030\001 \001(\tB5\340A\002\372A/\n-privat"
- + "eca.googleapis.com/CertificateAuthority\022"
- + "\026\n\tpage_size\030\002 \001(\005B\003\340A\001\022\027\n\npage_token\030\003 "
- + "\001(\tB\003\340A\001\022\023\n\006filter\030\004 \001(\tB\003\340A\001\022\025\n\010order_b"
- + "y\030\005 \001(\tB\003\340A\001\"\273\001\n&ListCertificateRevocati"
- + "onListsResponse\022c\n\034certificate_revocatio"
- + "n_lists\030\001 \003(\0132=.google.cloud.security.pr"
- + "ivateca.v1.CertificateRevocationList\022\027\n\017"
- + "next_page_token\030\002 \001(\t\022\023\n\013unreachable\030\003 \003"
- + "(\t\"\340\001\n&UpdateCertificateRevocationListRe"
- + "quest\022g\n\033certificate_revocation_list\030\001 \001"
- + "(\0132=.google.cloud.security.privateca.v1."
- + "CertificateRevocationListB\003\340A\002\0224\n\013update"
- + "_mask\030\002 \001(\0132\032.google.protobuf.FieldMaskB"
- + "\003\340A\002\022\027\n\nrequest_id\030\003 \001(\tB\003\340A\001\"\370\001\n Create"
- + "CertificateTemplateRequest\0229\n\006parent\030\001 \001"
- + "(\tB)\340A\002\372A#\n!locations.googleapis.com/Loc"
- + "ation\022$\n\027certificate_template_id\030\002 \001(\tB\003"
- + "\340A\002\022Z\n\024certificate_template\030\003 \001(\01327.goog"
- + "le.cloud.security.privateca.v1.Certifica"
- + "teTemplateB\003\340A\002\022\027\n\nrequest_id\030\004 \001(\tB\003\340A\001"
- + "\"\177\n DeleteCertificateTemplateRequest\022B\n\004"
- + "name\030\001 \001(\tB4\340A\002\372A.\n,privateca.googleapis"
- + ".com/CertificateTemplate\022\027\n\nrequest_id\030\002"
- + " \001(\tB\003\340A\001\"c\n\035GetCertificateTemplateReque"
- + "st\022B\n\004name\030\001 \001(\tB4\340A\002\372A.\n,privateca.goog"
- + "leapis.com/CertificateTemplate\"\271\001\n\037ListC"
- + "ertificateTemplatesRequest\0229\n\006parent\030\001 \001"
- + "(\tB)\340A\002\372A#\n!locations.googleapis.com/Loc"
- + "ation\022\026\n\tpage_size\030\002 \001(\005B\003\340A\001\022\027\n\npage_to"
- + "ken\030\003 \001(\tB\003\340A\001\022\023\n\006filter\030\004 \001(\tB\003\340A\001\022\025\n\010o"
- + "rder_by\030\005 \001(\tB\003\340A\001\"\250\001\n ListCertificateTe"
- + "mplatesResponse\022V\n\025certificate_templates"
- + "\030\001 \003(\01327.google.cloud.security.privateca"
- + ".v1.CertificateTemplate\022\027\n\017next_page_tok"
- + "en\030\002 \001(\t\022\023\n\013unreachable\030\003 \003(\t\"\315\001\n Update"
- + "CertificateTemplateRequest\022Z\n\024certificat"
- + "e_template\030\001 \001(\01327.google.cloud.security"
- + ".privateca.v1.CertificateTemplateB\003\340A\002\0224"
- + "\n\013update_mask\030\002 \001(\0132\032.google.protobuf.Fi"
- + "eldMaskB\003\340A\002\022\027\n\nrequest_id\030\003 \001(\tB\003\340A\001\"\200\002"
- + "\n\021OperationMetadata\0224\n\013create_time\030\001 \001(\013"
- + "2\032.google.protobuf.TimestampB\003\340A\003\0221\n\010end"
- + "_time\030\002 \001(\0132\032.google.protobuf.TimestampB"
- + "\003\340A\003\022\023\n\006target\030\003 \001(\tB\003\340A\003\022\021\n\004verb\030\004 \001(\tB"
- + "\003\340A\003\022\033\n\016status_message\030\005 \001(\tB\003\340A\003\022#\n\026req"
- + "uested_cancellation\030\006 \001(\010B\003\340A\003\022\030\n\013api_ve"
- + "rsion\030\007 \001(\tB\003\340A\0032\372;\n\033CertificateAuthorit"
- + "yService\022\367\001\n\021CreateCertificate\022<.google."
- + "cloud.security.privateca.v1.CreateCertif"
- + "icateRequest\032/.google.cloud.security.pri"
- + "vateca.v1.Certificate\"s\202\323\344\223\002I\":/v1/{pare"
- + "nt=projects/*/locations/*/caPools/*}/cer"
- + "tificates:\013certificate\332A!parent,certific"
- + "ate,certificate_id\022\307\001\n\016GetCertificate\0229."
- + "google.cloud.security.privateca.v1.GetCe"
- + "rtificateRequest\032/.google.cloud.security"
- + ".privateca.v1.Certificate\"I\202\323\344\223\002<\022:/v1/{"
- + "name=projects/*/locations/*/caPools/*/ce"
- + "rtificates/*}\332A\004name\022\332\001\n\020ListCertificate"
- + "s\022;.google.cloud.security.privateca.v1.L"
- + "istCertificatesRequest\032<.google.cloud.se"
- + "curity.privateca.v1.ListCertificatesResp"
- + "onse\"K\202\323\344\223\002<\022:/v1/{parent=projects/*/loc"
- + "ations/*/caPools/*}/certificates\332A\006paren"
- + "t\022\327\001\n\021RevokeCertificate\022<.google.cloud.s"
- + "ecurity.privateca.v1.RevokeCertificateRe"
+ + "teca.googleapis.com/CaPool\022\027\n\nrequest_id"
+ + "\030\002 \001(\tB\003\340A\001\022\'\n\032ignore_dependent_resource"
+ + "s\030\004 \001(\010B\003\340A\001\"h\n\023FetchCaCertsRequest\0228\n\007c"
+ + "a_pool\030\001 \001(\tB\'\340A\002\372A!\n\037privateca.googleap"
+ + "is.com/CaPool\022\027\n\nrequest_id\030\002 \001(\tB\003\340A\001\"\217"
+ + "\001\n\024FetchCaCertsResponse\022T\n\010ca_certs\030\001 \003("
+ + "\0132B.google.cloud.security.privateca.v1.F"
+ + "etchCaCertsResponse.CertChain\032!\n\tCertCha"
+ + "in\022\024\n\014certificates\030\001 \003(\t\"I\n\020GetCaPoolReq"
+ + "uest\0225\n\004name\030\001 \001(\tB\'\340A\002\372A!\n\037privateca.go"
+ + "ogleapis.com/CaPool\"\254\001\n\022ListCaPoolsReque"
+ + "st\0229\n\006parent\030\001 \001(\tB)\340A\002\372A#\n!locations.go"
+ + "ogleapis.com/Location\022\026\n\tpage_size\030\002 \001(\005"
+ + "B\003\340A\001\022\027\n\npage_token\030\003 \001(\tB\003\340A\001\022\023\n\006filter"
+ + "\030\004 \001(\tB\003\340A\001\022\025\n\010order_by\030\005 \001(\tB\003\340A\001\"\201\001\n\023L"
+ + "istCaPoolsResponse\022<\n\010ca_pools\030\001 \003(\0132*.g"
+ + "oogle.cloud.security.privateca.v1.CaPool"
+ + "\022\027\n\017next_page_token\030\002 \001(\t\022\023\n\013unreachable"
+ + "\030\003 \003(\t\"o\n#GetCertificateRevocationListRe"
+ + "quest\022H\n\004name\030\001 \001(\tB:\340A\002\372A4\n2privateca.g"
+ + "oogleapis.com/CertificateRevocationList\""
+ + "\313\001\n%ListCertificateRevocationListsReques"
+ + "t\022E\n\006parent\030\001 \001(\tB5\340A\002\372A/\n-privateca.goo"
+ + "gleapis.com/CertificateAuthority\022\026\n\tpage"
+ + "_size\030\002 \001(\005B\003\340A\001\022\027\n\npage_token\030\003 \001(\tB\003\340A"
+ + "\001\022\023\n\006filter\030\004 \001(\tB\003\340A\001\022\025\n\010order_by\030\005 \001(\t"
+ + "B\003\340A\001\"\273\001\n&ListCertificateRevocationLists"
+ + "Response\022c\n\034certificate_revocation_lists"
+ + "\030\001 \003(\0132=.google.cloud.security.privateca"
+ + ".v1.CertificateRevocationList\022\027\n\017next_pa"
+ + "ge_token\030\002 \001(\t\022\023\n\013unreachable\030\003 \003(\t\"\340\001\n&"
+ + "UpdateCertificateRevocationListRequest\022g"
+ + "\n\033certificate_revocation_list\030\001 \001(\0132=.go"
+ + "ogle.cloud.security.privateca.v1.Certifi"
+ + "cateRevocationListB\003\340A\002\0224\n\013update_mask\030\002"
+ + " \001(\0132\032.google.protobuf.FieldMaskB\003\340A\002\022\027\n"
+ + "\nrequest_id\030\003 \001(\tB\003\340A\001\"\370\001\n CreateCertifi"
+ + "cateTemplateRequest\0229\n\006parent\030\001 \001(\tB)\340A\002"
+ + "\372A#\n!locations.googleapis.com/Location\022$"
+ + "\n\027certificate_template_id\030\002 \001(\tB\003\340A\002\022Z\n\024"
+ + "certificate_template\030\003 \001(\01327.google.clou"
+ + "d.security.privateca.v1.CertificateTempl"
+ + "ateB\003\340A\002\022\027\n\nrequest_id\030\004 \001(\tB\003\340A\001\"\177\n Del"
+ + "eteCertificateTemplateRequest\022B\n\004name\030\001 "
+ + "\001(\tB4\340A\002\372A.\n,privateca.googleapis.com/Ce"
+ + "rtificateTemplate\022\027\n\nrequest_id\030\002 \001(\tB\003\340"
+ + "A\001\"c\n\035GetCertificateTemplateRequest\022B\n\004n"
+ + "ame\030\001 \001(\tB4\340A\002\372A.\n,privateca.googleapis."
+ + "com/CertificateTemplate\"\271\001\n\037ListCertific"
+ + "ateTemplatesRequest\0229\n\006parent\030\001 \001(\tB)\340A\002"
+ + "\372A#\n!locations.googleapis.com/Location\022\026"
+ + "\n\tpage_size\030\002 \001(\005B\003\340A\001\022\027\n\npage_token\030\003 \001"
+ + "(\tB\003\340A\001\022\023\n\006filter\030\004 \001(\tB\003\340A\001\022\025\n\010order_by"
+ + "\030\005 \001(\tB\003\340A\001\"\250\001\n ListCertificateTemplates"
+ + "Response\022V\n\025certificate_templates\030\001 \003(\0132"
+ + "7.google.cloud.security.privateca.v1.Cer"
+ + "tificateTemplate\022\027\n\017next_page_token\030\002 \001("
+ + "\t\022\023\n\013unreachable\030\003 \003(\t\"\315\001\n UpdateCertifi"
+ + "cateTemplateRequest\022Z\n\024certificate_templ"
+ + "ate\030\001 \001(\01327.google.cloud.security.privat"
+ + "eca.v1.CertificateTemplateB\003\340A\002\0224\n\013updat"
+ + "e_mask\030\002 \001(\0132\032.google.protobuf.FieldMask"
+ + "B\003\340A\002\022\027\n\nrequest_id\030\003 \001(\tB\003\340A\001\"\200\002\n\021Opera"
+ + "tionMetadata\0224\n\013create_time\030\001 \001(\0132\032.goog"
+ + "le.protobuf.TimestampB\003\340A\003\0221\n\010end_time\030\002"
+ + " \001(\0132\032.google.protobuf.TimestampB\003\340A\003\022\023\n"
+ + "\006target\030\003 \001(\tB\003\340A\003\022\021\n\004verb\030\004 \001(\tB\003\340A\003\022\033\n"
+ + "\016status_message\030\005 \001(\tB\003\340A\003\022#\n\026requested_"
+ + "cancellation\030\006 \001(\010B\003\340A\003\022\030\n\013api_version\030\007"
+ + " \001(\tB\003\340A\0032\372;\n\033CertificateAuthorityServic"
+ + "e\022\367\001\n\021CreateCertificate\022<.google.cloud.s"
+ + "ecurity.privateca.v1.CreateCertificateRe"
+ "quest\032/.google.cloud.security.privateca."
- + "v1.Certificate\"S\202\323\344\223\002F\"A/v1/{name=projec"
- + "ts/*/locations/*/caPools/*/certificates/"
- + "*}:revoke:\001*\332A\004name\022\371\001\n\021UpdateCertificat"
- + "e\022<.google.cloud.security.privateca.v1.U"
- + "pdateCertificateRequest\032/.google.cloud.s"
- + "ecurity.privateca.v1.Certificate\"u\202\323\344\223\002U"
- + "2F/v1/{certificate.name=projects/*/locat"
- + "ions/*/caPools/*/certificates/*}:\013certif"
- + "icate\332A\027certificate,update_mask\022\224\002\n\034Acti"
- + "vateCertificateAuthority\022G.google.cloud."
- + "security.privateca.v1.ActivateCertificat"
- + "eAuthorityRequest\032\035.google.longrunning.O"
- + "peration\"\213\001\202\323\344\223\002R\"M/v1/{name=projects/*/"
- + "locations/*/caPools/*/certificateAuthori"
- + "ties/*}:activate:\001*\332A\004name\312A)\n\024Certifica"
- + "teAuthority\022\021OperationMetadata\022\314\002\n\032Creat"
- + "eCertificateAuthority\022E.google.cloud.sec"
- + "urity.privateca.v1.CreateCertificateAuth"
- + "orityRequest\032\035.google.longrunning.Operat"
- + "ion\"\307\001\202\323\344\223\002]\"D/v1/{parent=projects/*/loc"
- + "ations/*/caPools/*}/certificateAuthoriti"
- + "es:\025certificate_authority\332A5parent,certi"
- + "ficate_authority,certificate_authority_i"
- + "d\312A)\n\024CertificateAuthority\022\021OperationMet"
- + "adata\022\221\002\n\033DisableCertificateAuthority\022F."
- + "google.cloud.security.privateca.v1.Disab"
- + "leCertificateAuthorityRequest\032\035.google.l"
- + "ongrunning.Operation\"\212\001\202\323\344\223\002Q\"L/v1/{name"
- + "=projects/*/locations/*/caPools/*/certif"
- + "icateAuthorities/*}:disable:\001*\332A\004name\312A)"
- + "\n\024CertificateAuthority\022\021OperationMetadat"
- + "a\022\216\002\n\032EnableCertificateAuthority\022E.googl"
- + "e.cloud.security.privateca.v1.EnableCert"
- + "ificateAuthorityRequest\032\035.google.longrun"
- + "ning.Operation\"\211\001\202\323\344\223\002P\"K/v1/{name=proje"
- + "cts/*/locations/*/caPools/*/certificateA"
- + "uthorities/*}:enable:\001*\332A\004name\312A)\n\024Certi"
- + "ficateAuthority\022\021OperationMetadata\022\214\002\n\034F"
- + "etchCertificateAuthorityCsr\022G.google.clo"
- + "ud.security.privateca.v1.FetchCertificat"
- + "eAuthorityCsrRequest\032H.google.cloud.secu"
- + "rity.privateca.v1.FetchCertificateAuthor"
- + "ityCsrResponse\"Y\202\323\344\223\002L\022J/v1/{name=projec"
+ + "v1.Certificate\"s\202\323\344\223\002I\":/v1/{parent=proj"
+ + "ects/*/locations/*/caPools/*}/certificat"
+ + "es:\013certificate\332A!parent,certificate,cer"
+ + "tificate_id\022\307\001\n\016GetCertificate\0229.google."
+ + "cloud.security.privateca.v1.GetCertifica"
+ + "teRequest\032/.google.cloud.security.privat"
+ + "eca.v1.Certificate\"I\202\323\344\223\002<\022:/v1/{name=pr"
+ + "ojects/*/locations/*/caPools/*/certifica"
+ + "tes/*}\332A\004name\022\332\001\n\020ListCertificates\022;.goo"
+ + "gle.cloud.security.privateca.v1.ListCert"
+ + "ificatesRequest\032<.google.cloud.security."
+ + "privateca.v1.ListCertificatesResponse\"K\202"
+ + "\323\344\223\002<\022:/v1/{parent=projects/*/locations/"
+ + "*/caPools/*}/certificates\332A\006parent\022\327\001\n\021R"
+ + "evokeCertificate\022<.google.cloud.security"
+ + ".privateca.v1.RevokeCertificateRequest\032/"
+ + ".google.cloud.security.privateca.v1.Cert"
+ + "ificate\"S\202\323\344\223\002F\"A/v1/{name=projects/*/lo"
+ + "cations/*/caPools/*/certificates/*}:revo"
+ + "ke:\001*\332A\004name\022\371\001\n\021UpdateCertificate\022<.goo"
+ + "gle.cloud.security.privateca.v1.UpdateCe"
+ + "rtificateRequest\032/.google.cloud.security"
+ + ".privateca.v1.Certificate\"u\202\323\344\223\002U2F/v1/{"
+ + "certificate.name=projects/*/locations/*/"
+ + "caPools/*/certificates/*}:\013certificate\332A"
+ + "\027certificate,update_mask\022\224\002\n\034ActivateCer"
+ + "tificateAuthority\022G.google.cloud.securit"
+ + "y.privateca.v1.ActivateCertificateAuthor"
+ + "ityRequest\032\035.google.longrunning.Operatio"
+ + "n\"\213\001\202\323\344\223\002R\"M/v1/{name=projects/*/locatio"
+ + "ns/*/caPools/*/certificateAuthorities/*}"
+ + ":activate:\001*\332A\004name\312A)\n\024CertificateAutho"
+ + "rity\022\021OperationMetadata\022\314\002\n\032CreateCertif"
+ + "icateAuthority\022E.google.cloud.security.p"
+ + "rivateca.v1.CreateCertificateAuthorityRe"
+ + "quest\032\035.google.longrunning.Operation\"\307\001\202"
+ + "\323\344\223\002]\"D/v1/{parent=projects/*/locations/"
+ + "*/caPools/*}/certificateAuthorities:\025cer"
+ + "tificate_authority\332A5parent,certificate_"
+ + "authority,certificate_authority_id\312A)\n\024C"
+ + "ertificateAuthority\022\021OperationMetadata\022\221"
+ + "\002\n\033DisableCertificateAuthority\022F.google."
+ + "cloud.security.privateca.v1.DisableCerti"
+ + "ficateAuthorityRequest\032\035.google.longrunn"
+ + "ing.Operation\"\212\001\202\323\344\223\002Q\"L/v1/{name=projec"
+ "ts/*/locations/*/caPools/*/certificateAu"
- + "thorities/*}:fetch\332A\004name\022\354\001\n\027GetCertifi"
- + "cateAuthority\022B.google.cloud.security.pr"
- + "ivateca.v1.GetCertificateAuthorityReques"
- + "t\0328.google.cloud.security.privateca.v1.C"
- + "ertificateAuthority\"S\202\323\344\223\002F\022D/v1/{name=p"
- + "rojects/*/locations/*/caPools/*/certific"
- + "ateAuthorities/*}\332A\004name\022\202\002\n\032ListCertifi"
- + "cateAuthorities\022E.google.cloud.security."
- + "privateca.v1.ListCertificateAuthoritiesR"
- + "equest\032F.google.cloud.security.privateca"
- + ".v1.ListCertificateAuthoritiesResponse\"U"
- + "\202\323\344\223\002F\022D/v1/{parent=projects/*/locations"
- + "/*/caPools/*}/certificateAuthorities\332A\006p"
- + "arent\022\224\002\n\034UndeleteCertificateAuthority\022G"
- + ".google.cloud.security.privateca.v1.Unde"
- + "leteCertificateAuthorityRequest\032\035.google"
- + ".longrunning.Operation\"\213\001\202\323\344\223\002R\"M/v1/{na"
- + "me=projects/*/locations/*/caPools/*/cert"
- + "ificateAuthorities/*}:undelete:\001*\332A\004name"
- + "\312A)\n\024CertificateAuthority\022\021OperationMeta"
- + "data\022\203\002\n\032DeleteCertificateAuthority\022E.go"
- + "ogle.cloud.security.privateca.v1.DeleteC"
- + "ertificateAuthorityRequest\032\035.google.long"
- + "running.Operation\"\177\202\323\344\223\002F*D/v1/{name=pro"
- + "jects/*/locations/*/caPools/*/certificat"
- + "eAuthorities/*}\332A\004name\312A)\n\024CertificateAu"
- + "thority\022\021OperationMetadata\022\316\002\n\032UpdateCer"
- + "tificateAuthority\022E.google.cloud.securit"
- + "y.privateca.v1.UpdateCertificateAuthorit"
- + "yRequest\032\035.google.longrunning.Operation\""
- + "\311\001\202\323\344\223\002s2Z/v1/{certificate_authority.nam"
- + "e=projects/*/locations/*/caPools/*/certi"
- + "ficateAuthorities/*}:\025certificate_author"
- + "ity\332A!certificate_authority,update_mask\312"
- + "A)\n\024CertificateAuthority\022\021OperationMetad"
- + "ata\022\336\001\n\014CreateCaPool\0227.google.cloud.secu"
- + "rity.privateca.v1.CreateCaPoolRequest\032\035."
- + "google.longrunning.Operation\"v\202\323\344\223\0026\"+/v"
- + "1/{parent=projects/*/locations/*}/caPool"
- + "s:\007ca_pool\332A\031parent,ca_pool,ca_pool_id\312A"
- + "\033\n\006CaPool\022\021OperationMetadata\022\340\001\n\014UpdateC"
- + "aPool\0227.google.cloud.security.privateca."
- + "v1.UpdateCaPoolRequest\032\035.google.longrunn"
- + "ing.Operation\"x\202\323\344\223\002>23/v1/{ca_pool.name"
- + "=projects/*/locations/*/caPools/*}:\007ca_p"
- + "ool\332A\023ca_pool,update_mask\312A\033\n\006CaPool\022\021Op"
- + "erationMetadata\022\251\001\n\tGetCaPool\0224.google.c"
- + "loud.security.privateca.v1.GetCaPoolRequ"
- + "est\032*.google.cloud.security.privateca.v1"
- + ".CaPool\":\202\323\344\223\002-\022+/v1/{name=projects/*/lo"
- + "cations/*/caPools/*}\332A\004name\022\274\001\n\013ListCaPo"
- + "ols\0226.google.cloud.security.privateca.v1"
- + ".ListCaPoolsRequest\0327.google.cloud.secur"
- + "ity.privateca.v1.ListCaPoolsResponse\"<\202\323"
- + "\344\223\002-\022+/v1/{parent=projects/*/locations/*"
- + "}/caPools\332A\006parent\022\317\001\n\014DeleteCaPool\0227.go"
- + "ogle.cloud.security.privateca.v1.DeleteC"
- + "aPoolRequest\032\035.google.longrunning.Operat"
- + "ion\"g\202\323\344\223\002-*+/v1/{name=projects/*/locati"
- + "ons/*/caPools/*}\332A\004name\312A*\n\025google.proto"
- + "buf.Empty\022\021OperationMetadata\022\323\001\n\014FetchCa"
- + "Certs\0227.google.cloud.security.privateca."
- + "v1.FetchCaCertsRequest\0328.google.cloud.se"
- + "curity.privateca.v1.FetchCaCertsResponse"
- + "\"P\202\323\344\223\002@\";/v1/{ca_pool=projects/*/locati"
- + "ons/*/caPools/*}:fetchCaCerts:\001*\332A\007ca_po"
- + "ol\022\230\002\n\034GetCertificateRevocationList\022G.go"
- + "ogle.cloud.security.privateca.v1.GetCert"
- + "ificateRevocationListRequest\032=.google.cl"
- + "oud.security.privateca.v1.CertificateRev"
- + "ocationList\"p\202\323\344\223\002c\022a/v1/{name=projects/"
- + "*/locations/*/caPools/*/certificateAutho"
- + "rities/*/certificateRevocationLists/*}\332A"
- + "\004name\022\253\002\n\036ListCertificateRevocationLists"
- + "\022I.google.cloud.security.privateca.v1.Li"
- + "stCertificateRevocationListsRequest\032J.go"
+ + "thorities/*}:disable:\001*\332A\004name\312A)\n\024Certi"
+ + "ficateAuthority\022\021OperationMetadata\022\216\002\n\032E"
+ + "nableCertificateAuthority\022E.google.cloud"
+ + ".security.privateca.v1.EnableCertificate"
+ + "AuthorityRequest\032\035.google.longrunning.Op"
+ + "eration\"\211\001\202\323\344\223\002P\"K/v1/{name=projects/*/l"
+ + "ocations/*/caPools/*/certificateAuthorit"
+ + "ies/*}:enable:\001*\332A\004name\312A)\n\024CertificateA"
+ + "uthority\022\021OperationMetadata\022\214\002\n\034FetchCer"
+ + "tificateAuthorityCsr\022G.google.cloud.secu"
+ + "rity.privateca.v1.FetchCertificateAuthor"
+ + "ityCsrRequest\032H.google.cloud.security.pr"
+ + "ivateca.v1.FetchCertificateAuthorityCsrR"
+ + "esponse\"Y\202\323\344\223\002L\022J/v1/{name=projects/*/lo"
+ + "cations/*/caPools/*/certificateAuthoriti"
+ + "es/*}:fetch\332A\004name\022\354\001\n\027GetCertificateAut"
+ + "hority\022B.google.cloud.security.privateca"
+ + ".v1.GetCertificateAuthorityRequest\0328.goo"
+ + "gle.cloud.security.privateca.v1.Certific"
+ + "ateAuthority\"S\202\323\344\223\002F\022D/v1/{name=projects"
+ + "/*/locations/*/caPools/*/certificateAuth"
+ + "orities/*}\332A\004name\022\202\002\n\032ListCertificateAut"
+ + "horities\022E.google.cloud.security.private"
+ + "ca.v1.ListCertificateAuthoritiesRequest\032"
+ + "F.google.cloud.security.privateca.v1.Lis"
+ + "tCertificateAuthoritiesResponse\"U\202\323\344\223\002F\022"
+ + "D/v1/{parent=projects/*/locations/*/caPo"
+ + "ols/*}/certificateAuthorities\332A\006parent\022\224"
+ + "\002\n\034UndeleteCertificateAuthority\022G.google"
+ + ".cloud.security.privateca.v1.UndeleteCer"
+ + "tificateAuthorityRequest\032\035.google.longru"
+ + "nning.Operation\"\213\001\202\323\344\223\002R\"M/v1/{name=proj"
+ + "ects/*/locations/*/caPools/*/certificate"
+ + "Authorities/*}:undelete:\001*\332A\004name\312A)\n\024Ce"
+ + "rtificateAuthority\022\021OperationMetadata\022\203\002"
+ + "\n\032DeleteCertificateAuthority\022E.google.cl"
+ + "oud.security.privateca.v1.DeleteCertific"
+ + "ateAuthorityRequest\032\035.google.longrunning"
+ + ".Operation\"\177\202\323\344\223\002F*D/v1/{name=projects/*"
+ + "/locations/*/caPools/*/certificateAuthor"
+ + "ities/*}\332A\004name\312A)\n\024CertificateAuthority"
+ + "\022\021OperationMetadata\022\316\002\n\032UpdateCertificat"
+ + "eAuthority\022E.google.cloud.security.priva"
+ + "teca.v1.UpdateCertificateAuthorityReques"
+ + "t\032\035.google.longrunning.Operation\"\311\001\202\323\344\223\002"
+ + "s2Z/v1/{certificate_authority.name=proje"
+ + "cts/*/locations/*/caPools/*/certificateA"
+ + "uthorities/*}:\025certificate_authority\332A!c"
+ + "ertificate_authority,update_mask\312A)\n\024Cer"
+ + "tificateAuthority\022\021OperationMetadata\022\336\001\n"
+ + "\014CreateCaPool\0227.google.cloud.security.pr"
+ + "ivateca.v1.CreateCaPoolRequest\032\035.google."
+ + "longrunning.Operation\"v\202\323\344\223\0026\"+/v1/{pare"
+ + "nt=projects/*/locations/*}/caPools:\007ca_p"
+ + "ool\332A\031parent,ca_pool,ca_pool_id\312A\033\n\006CaPo"
+ + "ol\022\021OperationMetadata\022\340\001\n\014UpdateCaPool\0227"
+ + ".google.cloud.security.privateca.v1.Upda"
+ + "teCaPoolRequest\032\035.google.longrunning.Ope"
+ + "ration\"x\202\323\344\223\002>23/v1/{ca_pool.name=projec"
+ + "ts/*/locations/*/caPools/*}:\007ca_pool\332A\023c"
+ + "a_pool,update_mask\312A\033\n\006CaPool\022\021Operation"
+ + "Metadata\022\251\001\n\tGetCaPool\0224.google.cloud.se"
+ + "curity.privateca.v1.GetCaPoolRequest\032*.g"
+ + "oogle.cloud.security.privateca.v1.CaPool"
+ + "\":\202\323\344\223\002-\022+/v1/{name=projects/*/locations"
+ + "/*/caPools/*}\332A\004name\022\274\001\n\013ListCaPools\0226.g"
+ + "oogle.cloud.security.privateca.v1.ListCa"
+ + "PoolsRequest\0327.google.cloud.security.pri"
+ + "vateca.v1.ListCaPoolsResponse\"<\202\323\344\223\002-\022+/"
+ + "v1/{parent=projects/*/locations/*}/caPoo"
+ + "ls\332A\006parent\022\317\001\n\014DeleteCaPool\0227.google.cl"
+ + "oud.security.privateca.v1.DeleteCaPoolRe"
+ + "quest\032\035.google.longrunning.Operation\"g\202\323"
+ + "\344\223\002-*+/v1/{name=projects/*/locations/*/c"
+ + "aPools/*}\332A\004name\312A*\n\025google.protobuf.Emp"
+ + "ty\022\021OperationMetadata\022\323\001\n\014FetchCaCerts\0227"
+ + ".google.cloud.security.privateca.v1.Fetc"
+ + "hCaCertsRequest\0328.google.cloud.security."
+ + "privateca.v1.FetchCaCertsResponse\"P\202\323\344\223\002"
+ + "@\";/v1/{ca_pool=projects/*/locations/*/c"
+ + "aPools/*}:fetchCaCerts:\001*\332A\007ca_pool\022\230\002\n\034"
+ + "GetCertificateRevocationList\022G.google.cl"
+ + "oud.security.privateca.v1.GetCertificate"
+ + "RevocationListRequest\032=.google.cloud.sec"
+ + "urity.privateca.v1.CertificateRevocation"
+ + "List\"p\202\323\344\223\002c\022a/v1/{name=projects/*/locat"
+ + "ions/*/caPools/*/certificateAuthorities/"
+ + "*/certificateRevocationLists/*}\332A\004name\022\253"
+ + "\002\n\036ListCertificateRevocationLists\022I.goog"
+ + "le.cloud.security.privateca.v1.ListCerti"
+ + "ficateRevocationListsRequest\032J.google.cl"
+ + "oud.security.privateca.v1.ListCertificat"
+ + "eRevocationListsResponse\"r\202\323\344\223\002c\022a/v1/{p"
+ + "arent=projects/*/locations/*/caPools/*/c"
+ + "ertificateAuthorities/*}/certificateRevo"
+ + "cationLists\332A\006parent\022\215\003\n\037UpdateCertifica"
+ + "teRevocationList\022J.google.cloud.security"
+ + ".privateca.v1.UpdateCertificateRevocatio"
+ + "nListRequest\032\035.google.longrunning.Operat"
+ + "ion\"\376\001\202\323\344\223\002\234\0012}/v1/{certificate_revocati"
+ + "on_list.name=projects/*/locations/*/caPo"
+ + "ols/*/certificateAuthorities/*/certifica"
+ + "teRevocationLists/*}:\033certificate_revoca"
+ + "tion_list\332A\'certificate_revocation_list,"
+ + "update_mask\312A.\n\031CertificateRevocationLis"
+ + "t\022\021OperationMetadata\022\272\002\n\031CreateCertifica"
+ + "teTemplate\022D.google.cloud.security.priva"
+ + "teca.v1.CreateCertificateTemplateRequest"
+ + "\032\035.google.longrunning.Operation\"\267\001\202\323\344\223\002P"
+ + "\"8/v1/{parent=projects/*/locations/*}/ce"
+ + "rtificateTemplates:\024certificate_template"
+ + "\332A3parent,certificate_template,certifica"
+ + "te_template_id\312A(\n\023CertificateTemplate\022\021"
+ + "OperationMetadata\022\232\002\n\031DeleteCertificateT"
+ + "emplate\022D.google.cloud.security.privatec"
+ + "a.v1.DeleteCertificateTemplateRequest\032\035."
+ + "google.longrunning.Operation\"\227\001\202\323\344\223\002:*8/"
+ + "v1/{name=projects/*/locations/*/certific"
+ + "ateTemplates/*}\332A\004name\312AM\n\025google.protob"
+ + "uf.Empty\0224google.cloud.security.privatec"
+ + "a.v1.OperationMetadata\022\335\001\n\026GetCertificat"
+ + "eTemplate\022A.google.cloud.security.privat"
+ + "eca.v1.GetCertificateTemplateRequest\0327.g"
+ + "oogle.cloud.security.privateca.v1.Certif"
+ + "icateTemplate\"G\202\323\344\223\002:\0228/v1/{name=project"
+ + "s/*/locations/*/certificateTemplates/*}\332"
+ + "A\004name\022\360\001\n\030ListCertificateTemplates\022C.go"
+ "ogle.cloud.security.privateca.v1.ListCer"
- + "tificateRevocationListsResponse\"r\202\323\344\223\002c\022"
- + "a/v1/{parent=projects/*/locations/*/caPo"
- + "ols/*/certificateAuthorities/*}/certific"
- + "ateRevocationLists\332A\006parent\022\215\003\n\037UpdateCe"
- + "rtificateRevocationList\022J.google.cloud.s"
- + "ecurity.privateca.v1.UpdateCertificateRe"
- + "vocationListRequest\032\035.google.longrunning"
- + ".Operation\"\376\001\202\323\344\223\002\234\0012}/v1/{certificate_r"
- + "evocation_list.name=projects/*/locations"
- + "/*/caPools/*/certificateAuthorities/*/ce"
- + "rtificateRevocationLists/*}:\033certificate"
- + "_revocation_list\332A\'certificate_revocatio"
- + "n_list,update_mask\312A.\n\031CertificateRevoca"
- + "tionList\022\021OperationMetadata\022\272\002\n\031CreateCe"
- + "rtificateTemplate\022D.google.cloud.securit"
- + "y.privateca.v1.CreateCertificateTemplate"
- + "Request\032\035.google.longrunning.Operation\"\267"
- + "\001\202\323\344\223\002P\"8/v1/{parent=projects/*/location"
- + "s/*}/certificateTemplates:\024certificate_t"
- + "emplate\332A3parent,certificate_template,ce"
- + "rtificate_template_id\312A(\n\023CertificateTem"
- + "plate\022\021OperationMetadata\022\232\002\n\031DeleteCerti"
- + "ficateTemplate\022D.google.cloud.security.p"
- + "rivateca.v1.DeleteCertificateTemplateReq"
- + "uest\032\035.google.longrunning.Operation\"\227\001\202\323"
- + "\344\223\002:*8/v1/{name=projects/*/locations/*/c"
- + "ertificateTemplates/*}\332A\004name\312AM\n\025google"
- + ".protobuf.Empty\0224google.cloud.security.p"
- + "rivateca.v1.OperationMetadata\022\335\001\n\026GetCer"
- + "tificateTemplate\022A.google.cloud.security"
- + ".privateca.v1.GetCertificateTemplateRequ"
- + "est\0327.google.cloud.security.privateca.v1"
- + ".CertificateTemplate\"G\202\323\344\223\002:\0228/v1/{name="
- + "projects/*/locations/*/certificateTempla"
- + "tes/*}\332A\004name\022\360\001\n\030ListCertificateTemplat"
- + "es\022C.google.cloud.security.privateca.v1."
- + "ListCertificateTemplatesRequest\032D.google"
- + ".cloud.security.privateca.v1.ListCertifi"
- + "cateTemplatesResponse\"I\202\323\344\223\002:\0228/v1/{pare"
- + "nt=projects/*/locations/*}/certificateTe"
- + "mplates\332A\006parent\022\274\002\n\031UpdateCertificateTe"
- + "mplate\022D.google.cloud.security.privateca"
- + ".v1.UpdateCertificateTemplateRequest\032\035.g"
- + "oogle.longrunning.Operation\"\271\001\202\323\344\223\002e2M/v"
- + "1/{certificate_template.name=projects/*/"
- + "locations/*/certificateTemplates/*}:\024cer"
- + "tificate_template\332A certificate_template"
- + ",update_mask\312A(\n\023CertificateTemplate\022\021Op"
- + "erationMetadata\032L\312A\030privateca.googleapis"
- + ".com\322A.https://www.googleapis.com/auth/c"
- + "loud-platformB\366\001\n&com.google.cloud.secur"
- + "ity.privateca.v1B\016PrivateCaProtoP\001ZDclou"
- + "d.google.com/go/security/privateca/apiv1"
- + "/privatecapb;privatecapb\370\001\001\252\002\"Google.Clo"
- + "ud.Security.PrivateCA.V1\312\002\"Google\\Cloud\\"
- + "Security\\PrivateCA\\V1\352\002&Google::Cloud::S"
- + "ecurity::PrivateCA::V1b\006proto3"
+ + "tificateTemplatesRequest\032D.google.cloud."
+ + "security.privateca.v1.ListCertificateTem"
+ + "platesResponse\"I\202\323\344\223\002:\0228/v1/{parent=proj"
+ + "ects/*/locations/*}/certificateTemplates"
+ + "\332A\006parent\022\274\002\n\031UpdateCertificateTemplate\022"
+ + "D.google.cloud.security.privateca.v1.Upd"
+ + "ateCertificateTemplateRequest\032\035.google.l"
+ + "ongrunning.Operation\"\271\001\202\323\344\223\002e2M/v1/{cert"
+ + "ificate_template.name=projects/*/locatio"
+ + "ns/*/certificateTemplates/*}:\024certificat"
+ + "e_template\332A certificate_template,update"
+ + "_mask\312A(\n\023CertificateTemplate\022\021Operation"
+ + "Metadata\032L\312A\030privateca.googleapis.com\322A."
+ + "https://www.googleapis.com/auth/cloud-pl"
+ + "atformB\366\001\n&com.google.cloud.security.pri"
+ + "vateca.v1B\016PrivateCaProtoP\001ZDcloud.googl"
+ + "e.com/go/security/privateca/apiv1/privat"
+ + "ecapb;privatecapb\370\001\001\252\002\"Google.Cloud.Secu"
+ + "rity.PrivateCA.V1\312\002\"Google\\Cloud\\Securit"
+ + "y\\PrivateCA\\V1\352\002&Google::Cloud::Security"
+ + "::PrivateCA::V1b\006proto3"
};
descriptor =
com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom(
@@ -561,6 +565,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
com.google.api.ResourceProto.getDescriptor(),
com.google.cloud.security.privateca.v1.PrivateCaResourcesProto.getDescriptor(),
com.google.longrunning.OperationsProto.getDescriptor(),
+ com.google.protobuf.EmptyProto.getDescriptor(),
com.google.protobuf.FieldMaskProto.getDescriptor(),
com.google.protobuf.TimestampProto.getDescriptor(),
});
@@ -639,7 +644,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable(
internal_static_google_cloud_security_privateca_v1_DisableCertificateAuthorityRequest_descriptor,
new java.lang.String[] {
- "Name", "RequestId",
+ "Name", "RequestId", "IgnoreDependentResources",
});
internal_static_google_cloud_security_privateca_v1_EnableCertificateAuthorityRequest_descriptor =
getDescriptor().getMessageTypes().get(9);
@@ -703,7 +708,11 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable(
internal_static_google_cloud_security_privateca_v1_DeleteCertificateAuthorityRequest_descriptor,
new java.lang.String[] {
- "Name", "RequestId", "IgnoreActiveCertificates", "SkipGracePeriod",
+ "Name",
+ "RequestId",
+ "IgnoreActiveCertificates",
+ "SkipGracePeriod",
+ "IgnoreDependentResources",
});
internal_static_google_cloud_security_privateca_v1_UpdateCertificateAuthorityRequest_descriptor =
getDescriptor().getMessageTypes().get(17);
@@ -735,7 +744,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable(
internal_static_google_cloud_security_privateca_v1_DeleteCaPoolRequest_descriptor,
new java.lang.String[] {
- "Name", "RequestId",
+ "Name", "RequestId", "IgnoreDependentResources",
});
internal_static_google_cloud_security_privateca_v1_FetchCaCertsRequest_descriptor =
getDescriptor().getMessageTypes().get(21);
@@ -898,6 +907,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
com.google.api.ResourceProto.getDescriptor();
com.google.cloud.security.privateca.v1.PrivateCaResourcesProto.getDescriptor();
com.google.longrunning.OperationsProto.getDescriptor();
+ com.google.protobuf.EmptyProto.getDescriptor();
com.google.protobuf.FieldMaskProto.getDescriptor();
com.google.protobuf.TimestampProto.getDescriptor();
}
diff --git a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/SubjectRequestMode.java b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/SubjectRequestMode.java
index a29642c08498..ddd292581ae7 100644
--- a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/SubjectRequestMode.java
+++ b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/SubjectRequestMode.java
@@ -61,7 +61,7 @@ public enum SubjectRequestMode implements com.google.protobuf.ProtocolMessageEnu
*
*
* A mode reserved for special cases. Indicates that the certificate should
- * have one or more SPIFFE
+ * have one SPIFFE
* [SubjectAltNames][google.cloud.security.privateca.v1.SubjectAltNames] set
* by the service based on the caller's identity. This mode will ignore any
* explicitly specified [Subject][google.cloud.security.privateca.v1.Subject]
@@ -106,7 +106,7 @@ public enum SubjectRequestMode implements com.google.protobuf.ProtocolMessageEnu
*
*
* A mode reserved for special cases. Indicates that the certificate should
- * have one or more SPIFFE
+ * have one SPIFFE
* [SubjectAltNames][google.cloud.security.privateca.v1.SubjectAltNames] set
* by the service based on the caller's identity. This mode will ignore any
* explicitly specified [Subject][google.cloud.security.privateca.v1.Subject]
diff --git a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/proto/google/cloud/security/privateca/v1/resources.proto b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/proto/google/cloud/security/privateca/v1/resources.proto
index 2e346af28ae8..b64be7bc73f0 100644
--- a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/proto/google/cloud/security/privateca/v1/resources.proto
+++ b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/proto/google/cloud/security/privateca/v1/resources.proto
@@ -1,4 +1,4 @@
-// Copyright 2022 Google LLC
+// Copyright 2023 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
@@ -1431,7 +1431,7 @@ enum SubjectRequestMode {
DEFAULT = 1;
// A mode reserved for special cases. Indicates that the certificate should
- // have one or more SPIFFE
+ // have one SPIFFE
// [SubjectAltNames][google.cloud.security.privateca.v1.SubjectAltNames] set
// by the service based on the caller's identity. This mode will ignore any
// explicitly specified [Subject][google.cloud.security.privateca.v1.Subject]
diff --git a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/proto/google/cloud/security/privateca/v1/service.proto b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/proto/google/cloud/security/privateca/v1/service.proto
index 7ff8b8d248c3..b90a374d6e48 100644
--- a/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/proto/google/cloud/security/privateca/v1/service.proto
+++ b/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/proto/google/cloud/security/privateca/v1/service.proto
@@ -1,4 +1,4 @@
-// Copyright 2022 Google LLC
+// Copyright 2023 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
@@ -22,6 +22,7 @@ import "google/api/field_behavior.proto";
import "google/api/resource.proto";
import "google/cloud/security/privateca/v1/resources.proto";
import "google/longrunning/operations.proto";
+import "google/protobuf/empty.proto";
import "google/protobuf/field_mask.proto";
import "google/protobuf/timestamp.proto";
@@ -720,6 +721,12 @@ message DisableCertificateAuthorityRequest {
// The request ID must be a valid UUID with the exception that zero UUID is
// not supported (00000000-0000-0000-0000-000000000000).
string request_id = 2 [(google.api.field_behavior) = OPTIONAL];
+
+ // Optional. This field allows this CA to be disabled even if it's being
+ // depended on by another resource. However, doing so may result in unintended
+ // and unrecoverable effects on any dependent resource(s) since the CA will
+ // no longer be able to issue certificates.
+ bool ignore_dependent_resources = 3 [(google.api.field_behavior) = OPTIONAL];
}
// Request message for
@@ -903,6 +910,12 @@ message DeleteCertificateAuthorityRequest {
// soon as possible without a 30-day grace period where undeletion would have
// been allowed. If you proceed, there will be no way to recover this CA.
bool skip_grace_period = 5 [(google.api.field_behavior) = OPTIONAL];
+
+ // Optional. This field allows this ca to be deleted even if it's being
+ // depended on by another resource. However, doing so may result in unintended
+ // and unrecoverable effects on any dependent resource(s) since the CA will
+ // no longer be able to issue certificates.
+ bool ignore_dependent_resources = 6 [(google.api.field_behavior) = OPTIONAL];
}
// Request message for
@@ -1025,6 +1038,12 @@ message DeleteCaPoolRequest {
// The request ID must be a valid UUID with the exception that zero UUID is
// not supported (00000000-0000-0000-0000-000000000000).
string request_id = 2 [(google.api.field_behavior) = OPTIONAL];
+
+ // Optional. This field allows this pool to be deleted even if it's being
+ // depended on by another resource. However, doing so may result in unintended
+ // and unrecoverable effects on any dependent resource(s) since the pool will
+ // no longer be able to issue certificates.
+ bool ignore_dependent_resources = 4 [(google.api.field_behavior) = OPTIONAL];
}
// Request message for
diff --git a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/AsyncDeleteCaPool.java b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/AsyncDeleteCaPool.java
index 098892447fb1..6b6a28cd4bec 100644
--- a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/AsyncDeleteCaPool.java
+++ b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/AsyncDeleteCaPool.java
@@ -41,6 +41,7 @@ public static void asyncDeleteCaPool() throws Exception {
DeleteCaPoolRequest.newBuilder()
.setName(CaPoolName.of("[PROJECT]", "[LOCATION]", "[CA_POOL]").toString())
.setRequestId("requestId693933066")
+ .setIgnoreDependentResources(true)
.build();
ApiFuture future =
certificateAuthorityServiceClient.deleteCaPoolCallable().futureCall(request);
diff --git a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/AsyncDeleteCaPoolLRO.java b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/AsyncDeleteCaPoolLRO.java
index dbddcce98644..1b0e591cd281 100644
--- a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/AsyncDeleteCaPoolLRO.java
+++ b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/AsyncDeleteCaPoolLRO.java
@@ -42,6 +42,7 @@ public static void asyncDeleteCaPoolLRO() throws Exception {
DeleteCaPoolRequest.newBuilder()
.setName(CaPoolName.of("[PROJECT]", "[LOCATION]", "[CA_POOL]").toString())
.setRequestId("requestId693933066")
+ .setIgnoreDependentResources(true)
.build();
OperationFuture future =
certificateAuthorityServiceClient.deleteCaPoolOperationCallable().futureCall(request);
diff --git a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/SyncDeleteCaPool.java b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/SyncDeleteCaPool.java
index 01c19c3de855..7a9cb79b1ff6 100644
--- a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/SyncDeleteCaPool.java
+++ b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecapool/SyncDeleteCaPool.java
@@ -40,6 +40,7 @@ public static void syncDeleteCaPool() throws Exception {
DeleteCaPoolRequest.newBuilder()
.setName(CaPoolName.of("[PROJECT]", "[LOCATION]", "[CA_POOL]").toString())
.setRequestId("requestId693933066")
+ .setIgnoreDependentResources(true)
.build();
certificateAuthorityServiceClient.deleteCaPoolAsync(request).get();
}
diff --git a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/AsyncDeleteCertificateAuthority.java b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/AsyncDeleteCertificateAuthority.java
index 6d2c376cd6de..449836254616 100644
--- a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/AsyncDeleteCertificateAuthority.java
+++ b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/AsyncDeleteCertificateAuthority.java
@@ -46,6 +46,7 @@ public static void asyncDeleteCertificateAuthority() throws Exception {
.setRequestId("requestId693933066")
.setIgnoreActiveCertificates(true)
.setSkipGracePeriod(true)
+ .setIgnoreDependentResources(true)
.build();
ApiFuture future =
certificateAuthorityServiceClient
diff --git a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/AsyncDeleteCertificateAuthorityLRO.java b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/AsyncDeleteCertificateAuthorityLRO.java
index 7856aa434c4a..5a3723866576 100644
--- a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/AsyncDeleteCertificateAuthorityLRO.java
+++ b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/AsyncDeleteCertificateAuthorityLRO.java
@@ -47,6 +47,7 @@ public static void asyncDeleteCertificateAuthorityLRO() throws Exception {
.setRequestId("requestId693933066")
.setIgnoreActiveCertificates(true)
.setSkipGracePeriod(true)
+ .setIgnoreDependentResources(true)
.build();
OperationFuture future =
certificateAuthorityServiceClient
diff --git a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/SyncDeleteCertificateAuthority.java b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/SyncDeleteCertificateAuthority.java
index c1b2d484608a..3d8d10e168c0 100644
--- a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/SyncDeleteCertificateAuthority.java
+++ b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/deletecertificateauthority/SyncDeleteCertificateAuthority.java
@@ -45,6 +45,7 @@ public static void syncDeleteCertificateAuthority() throws Exception {
.setRequestId("requestId693933066")
.setIgnoreActiveCertificates(true)
.setSkipGracePeriod(true)
+ .setIgnoreDependentResources(true)
.build();
CertificateAuthority response =
certificateAuthorityServiceClient.deleteCertificateAuthorityAsync(request).get();
diff --git a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/AsyncDisableCertificateAuthority.java b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/AsyncDisableCertificateAuthority.java
index c4202562a825..595559490136 100644
--- a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/AsyncDisableCertificateAuthority.java
+++ b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/AsyncDisableCertificateAuthority.java
@@ -44,6 +44,7 @@ public static void asyncDisableCertificateAuthority() throws Exception {
"[PROJECT]", "[LOCATION]", "[CA_POOL]", "[CERTIFICATE_AUTHORITY]")
.toString())
.setRequestId("requestId693933066")
+ .setIgnoreDependentResources(true)
.build();
ApiFuture future =
certificateAuthorityServiceClient
diff --git a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/AsyncDisableCertificateAuthorityLRO.java b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/AsyncDisableCertificateAuthorityLRO.java
index c1b44231fd7f..88f08ef7480d 100644
--- a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/AsyncDisableCertificateAuthorityLRO.java
+++ b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/AsyncDisableCertificateAuthorityLRO.java
@@ -45,6 +45,7 @@ public static void asyncDisableCertificateAuthorityLRO() throws Exception {
"[PROJECT]", "[LOCATION]", "[CA_POOL]", "[CERTIFICATE_AUTHORITY]")
.toString())
.setRequestId("requestId693933066")
+ .setIgnoreDependentResources(true)
.build();
OperationFuture future =
certificateAuthorityServiceClient
diff --git a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/SyncDisableCertificateAuthority.java b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/SyncDisableCertificateAuthority.java
index c505e114d912..da9d922c0747 100644
--- a/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/SyncDisableCertificateAuthority.java
+++ b/java-security-private-ca/samples/snippets/generated/com/google/cloud/security/privateca/v1/certificateauthorityservice/disablecertificateauthority/SyncDisableCertificateAuthority.java
@@ -43,6 +43,7 @@ public static void syncDisableCertificateAuthority() throws Exception {
"[PROJECT]", "[LOCATION]", "[CA_POOL]", "[CERTIFICATE_AUTHORITY]")
.toString())
.setRequestId("requestId693933066")
+ .setIgnoreDependentResources(true)
.build();
CertificateAuthority response =
certificateAuthorityServiceClient.disableCertificateAuthorityAsync(request).get();