1// Code generated by protoc-gen-go. DO NOT EDIT. 2// source: google/cloud/secrets/v1beta1/service.proto 3 4package secretmanager 5 6import ( 7 context "context" 8 fmt "fmt" 9 math "math" 10 11 proto "github.com/golang/protobuf/proto" 12 empty "github.com/golang/protobuf/ptypes/empty" 13 _ "google.golang.org/genproto/googleapis/api/annotations" 14 v1 "google.golang.org/genproto/googleapis/iam/v1" 15 field_mask "google.golang.org/genproto/protobuf/field_mask" 16 grpc "google.golang.org/grpc" 17 codes "google.golang.org/grpc/codes" 18 status "google.golang.org/grpc/status" 19) 20 21// Reference imports to suppress errors if they are not otherwise used. 22var _ = proto.Marshal 23var _ = fmt.Errorf 24var _ = math.Inf 25 26// This is a compile-time assertion to ensure that this generated file 27// is compatible with the proto package it is being compiled against. 28// A compilation error at this line likely means your copy of the 29// proto package needs to be updated. 30const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package 31 32// Request message for [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets]. 33type ListSecretsRequest struct { 34 // Required. The resource name of the project associated with the 35 // [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`. 36 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 37 // Optional. The maximum number of results to be returned in a single page. If 38 // set to 0, the server decides the number of results to return. If the 39 // number is greater than 25000, it is capped at 25000. 40 PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"` 41 // Optional. Pagination token, returned earlier via 42 // [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token]. 43 PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"` 44 XXX_NoUnkeyedLiteral struct{} `json:"-"` 45 XXX_unrecognized []byte `json:"-"` 46 XXX_sizecache int32 `json:"-"` 47} 48 49func (m *ListSecretsRequest) Reset() { *m = ListSecretsRequest{} } 50func (m *ListSecretsRequest) String() string { return proto.CompactTextString(m) } 51func (*ListSecretsRequest) ProtoMessage() {} 52func (*ListSecretsRequest) Descriptor() ([]byte, []int) { 53 return fileDescriptor_67a0e1a61a378c59, []int{0} 54} 55 56func (m *ListSecretsRequest) XXX_Unmarshal(b []byte) error { 57 return xxx_messageInfo_ListSecretsRequest.Unmarshal(m, b) 58} 59func (m *ListSecretsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 60 return xxx_messageInfo_ListSecretsRequest.Marshal(b, m, deterministic) 61} 62func (m *ListSecretsRequest) XXX_Merge(src proto.Message) { 63 xxx_messageInfo_ListSecretsRequest.Merge(m, src) 64} 65func (m *ListSecretsRequest) XXX_Size() int { 66 return xxx_messageInfo_ListSecretsRequest.Size(m) 67} 68func (m *ListSecretsRequest) XXX_DiscardUnknown() { 69 xxx_messageInfo_ListSecretsRequest.DiscardUnknown(m) 70} 71 72var xxx_messageInfo_ListSecretsRequest proto.InternalMessageInfo 73 74func (m *ListSecretsRequest) GetParent() string { 75 if m != nil { 76 return m.Parent 77 } 78 return "" 79} 80 81func (m *ListSecretsRequest) GetPageSize() int32 { 82 if m != nil { 83 return m.PageSize 84 } 85 return 0 86} 87 88func (m *ListSecretsRequest) GetPageToken() string { 89 if m != nil { 90 return m.PageToken 91 } 92 return "" 93} 94 95// Response message for [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets]. 96type ListSecretsResponse struct { 97 // The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest 98 // first). 99 Secrets []*Secret `protobuf:"bytes,1,rep,name=secrets,proto3" json:"secrets,omitempty"` 100 // A token to retrieve the next page of results. Pass this value in 101 // [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page. 102 NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"` 103 // The total number of [Secrets][google.cloud.secrets.v1beta1.Secret]. 104 TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"` 105 XXX_NoUnkeyedLiteral struct{} `json:"-"` 106 XXX_unrecognized []byte `json:"-"` 107 XXX_sizecache int32 `json:"-"` 108} 109 110func (m *ListSecretsResponse) Reset() { *m = ListSecretsResponse{} } 111func (m *ListSecretsResponse) String() string { return proto.CompactTextString(m) } 112func (*ListSecretsResponse) ProtoMessage() {} 113func (*ListSecretsResponse) Descriptor() ([]byte, []int) { 114 return fileDescriptor_67a0e1a61a378c59, []int{1} 115} 116 117func (m *ListSecretsResponse) XXX_Unmarshal(b []byte) error { 118 return xxx_messageInfo_ListSecretsResponse.Unmarshal(m, b) 119} 120func (m *ListSecretsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 121 return xxx_messageInfo_ListSecretsResponse.Marshal(b, m, deterministic) 122} 123func (m *ListSecretsResponse) XXX_Merge(src proto.Message) { 124 xxx_messageInfo_ListSecretsResponse.Merge(m, src) 125} 126func (m *ListSecretsResponse) XXX_Size() int { 127 return xxx_messageInfo_ListSecretsResponse.Size(m) 128} 129func (m *ListSecretsResponse) XXX_DiscardUnknown() { 130 xxx_messageInfo_ListSecretsResponse.DiscardUnknown(m) 131} 132 133var xxx_messageInfo_ListSecretsResponse proto.InternalMessageInfo 134 135func (m *ListSecretsResponse) GetSecrets() []*Secret { 136 if m != nil { 137 return m.Secrets 138 } 139 return nil 140} 141 142func (m *ListSecretsResponse) GetNextPageToken() string { 143 if m != nil { 144 return m.NextPageToken 145 } 146 return "" 147} 148 149func (m *ListSecretsResponse) GetTotalSize() int32 { 150 if m != nil { 151 return m.TotalSize 152 } 153 return 0 154} 155 156// Request message for [SecretManagerService.CreateSecret][google.cloud.secrets.v1beta1.SecretManagerService.CreateSecret]. 157type CreateSecretRequest struct { 158 // Required. The resource name of the project to associate with the 159 // [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`. 160 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 161 // Required. This must be unique within the project. 162 SecretId string `protobuf:"bytes,2,opt,name=secret_id,json=secretId,proto3" json:"secret_id,omitempty"` 163 // A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values. 164 Secret *Secret `protobuf:"bytes,3,opt,name=secret,proto3" json:"secret,omitempty"` 165 XXX_NoUnkeyedLiteral struct{} `json:"-"` 166 XXX_unrecognized []byte `json:"-"` 167 XXX_sizecache int32 `json:"-"` 168} 169 170func (m *CreateSecretRequest) Reset() { *m = CreateSecretRequest{} } 171func (m *CreateSecretRequest) String() string { return proto.CompactTextString(m) } 172func (*CreateSecretRequest) ProtoMessage() {} 173func (*CreateSecretRequest) Descriptor() ([]byte, []int) { 174 return fileDescriptor_67a0e1a61a378c59, []int{2} 175} 176 177func (m *CreateSecretRequest) XXX_Unmarshal(b []byte) error { 178 return xxx_messageInfo_CreateSecretRequest.Unmarshal(m, b) 179} 180func (m *CreateSecretRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 181 return xxx_messageInfo_CreateSecretRequest.Marshal(b, m, deterministic) 182} 183func (m *CreateSecretRequest) XXX_Merge(src proto.Message) { 184 xxx_messageInfo_CreateSecretRequest.Merge(m, src) 185} 186func (m *CreateSecretRequest) XXX_Size() int { 187 return xxx_messageInfo_CreateSecretRequest.Size(m) 188} 189func (m *CreateSecretRequest) XXX_DiscardUnknown() { 190 xxx_messageInfo_CreateSecretRequest.DiscardUnknown(m) 191} 192 193var xxx_messageInfo_CreateSecretRequest proto.InternalMessageInfo 194 195func (m *CreateSecretRequest) GetParent() string { 196 if m != nil { 197 return m.Parent 198 } 199 return "" 200} 201 202func (m *CreateSecretRequest) GetSecretId() string { 203 if m != nil { 204 return m.SecretId 205 } 206 return "" 207} 208 209func (m *CreateSecretRequest) GetSecret() *Secret { 210 if m != nil { 211 return m.Secret 212 } 213 return nil 214} 215 216// Request message for [SecretManagerService.AddSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AddSecretVersion]. 217type AddSecretVersionRequest struct { 218 // Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the 219 // [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`. 220 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 221 // Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 222 Payload *SecretPayload `protobuf:"bytes,2,opt,name=payload,proto3" json:"payload,omitempty"` 223 XXX_NoUnkeyedLiteral struct{} `json:"-"` 224 XXX_unrecognized []byte `json:"-"` 225 XXX_sizecache int32 `json:"-"` 226} 227 228func (m *AddSecretVersionRequest) Reset() { *m = AddSecretVersionRequest{} } 229func (m *AddSecretVersionRequest) String() string { return proto.CompactTextString(m) } 230func (*AddSecretVersionRequest) ProtoMessage() {} 231func (*AddSecretVersionRequest) Descriptor() ([]byte, []int) { 232 return fileDescriptor_67a0e1a61a378c59, []int{3} 233} 234 235func (m *AddSecretVersionRequest) XXX_Unmarshal(b []byte) error { 236 return xxx_messageInfo_AddSecretVersionRequest.Unmarshal(m, b) 237} 238func (m *AddSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 239 return xxx_messageInfo_AddSecretVersionRequest.Marshal(b, m, deterministic) 240} 241func (m *AddSecretVersionRequest) XXX_Merge(src proto.Message) { 242 xxx_messageInfo_AddSecretVersionRequest.Merge(m, src) 243} 244func (m *AddSecretVersionRequest) XXX_Size() int { 245 return xxx_messageInfo_AddSecretVersionRequest.Size(m) 246} 247func (m *AddSecretVersionRequest) XXX_DiscardUnknown() { 248 xxx_messageInfo_AddSecretVersionRequest.DiscardUnknown(m) 249} 250 251var xxx_messageInfo_AddSecretVersionRequest proto.InternalMessageInfo 252 253func (m *AddSecretVersionRequest) GetParent() string { 254 if m != nil { 255 return m.Parent 256 } 257 return "" 258} 259 260func (m *AddSecretVersionRequest) GetPayload() *SecretPayload { 261 if m != nil { 262 return m.Payload 263 } 264 return nil 265} 266 267// Request message for [SecretManagerService.GetSecret][google.cloud.secrets.v1beta1.SecretManagerService.GetSecret]. 268type GetSecretRequest struct { 269 // Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`. 270 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 271 XXX_NoUnkeyedLiteral struct{} `json:"-"` 272 XXX_unrecognized []byte `json:"-"` 273 XXX_sizecache int32 `json:"-"` 274} 275 276func (m *GetSecretRequest) Reset() { *m = GetSecretRequest{} } 277func (m *GetSecretRequest) String() string { return proto.CompactTextString(m) } 278func (*GetSecretRequest) ProtoMessage() {} 279func (*GetSecretRequest) Descriptor() ([]byte, []int) { 280 return fileDescriptor_67a0e1a61a378c59, []int{4} 281} 282 283func (m *GetSecretRequest) XXX_Unmarshal(b []byte) error { 284 return xxx_messageInfo_GetSecretRequest.Unmarshal(m, b) 285} 286func (m *GetSecretRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 287 return xxx_messageInfo_GetSecretRequest.Marshal(b, m, deterministic) 288} 289func (m *GetSecretRequest) XXX_Merge(src proto.Message) { 290 xxx_messageInfo_GetSecretRequest.Merge(m, src) 291} 292func (m *GetSecretRequest) XXX_Size() int { 293 return xxx_messageInfo_GetSecretRequest.Size(m) 294} 295func (m *GetSecretRequest) XXX_DiscardUnknown() { 296 xxx_messageInfo_GetSecretRequest.DiscardUnknown(m) 297} 298 299var xxx_messageInfo_GetSecretRequest proto.InternalMessageInfo 300 301func (m *GetSecretRequest) GetName() string { 302 if m != nil { 303 return m.Name 304 } 305 return "" 306} 307 308// Request message for [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions]. 309type ListSecretVersionsRequest struct { 310 // Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the 311 // [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format 312 // `projects/*/secrets/*`. 313 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 314 // Optional. The maximum number of results to be returned in a single page. If 315 // set to 0, the server decides the number of results to return. If the 316 // number is greater than 25000, it is capped at 25000. 317 PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"` 318 // Optional. Pagination token, returned earlier via 319 // ListSecretVersionsResponse.next_page_token][]. 320 PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"` 321 XXX_NoUnkeyedLiteral struct{} `json:"-"` 322 XXX_unrecognized []byte `json:"-"` 323 XXX_sizecache int32 `json:"-"` 324} 325 326func (m *ListSecretVersionsRequest) Reset() { *m = ListSecretVersionsRequest{} } 327func (m *ListSecretVersionsRequest) String() string { return proto.CompactTextString(m) } 328func (*ListSecretVersionsRequest) ProtoMessage() {} 329func (*ListSecretVersionsRequest) Descriptor() ([]byte, []int) { 330 return fileDescriptor_67a0e1a61a378c59, []int{5} 331} 332 333func (m *ListSecretVersionsRequest) XXX_Unmarshal(b []byte) error { 334 return xxx_messageInfo_ListSecretVersionsRequest.Unmarshal(m, b) 335} 336func (m *ListSecretVersionsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 337 return xxx_messageInfo_ListSecretVersionsRequest.Marshal(b, m, deterministic) 338} 339func (m *ListSecretVersionsRequest) XXX_Merge(src proto.Message) { 340 xxx_messageInfo_ListSecretVersionsRequest.Merge(m, src) 341} 342func (m *ListSecretVersionsRequest) XXX_Size() int { 343 return xxx_messageInfo_ListSecretVersionsRequest.Size(m) 344} 345func (m *ListSecretVersionsRequest) XXX_DiscardUnknown() { 346 xxx_messageInfo_ListSecretVersionsRequest.DiscardUnknown(m) 347} 348 349var xxx_messageInfo_ListSecretVersionsRequest proto.InternalMessageInfo 350 351func (m *ListSecretVersionsRequest) GetParent() string { 352 if m != nil { 353 return m.Parent 354 } 355 return "" 356} 357 358func (m *ListSecretVersionsRequest) GetPageSize() int32 { 359 if m != nil { 360 return m.PageSize 361 } 362 return 0 363} 364 365func (m *ListSecretVersionsRequest) GetPageToken() string { 366 if m != nil { 367 return m.PageToken 368 } 369 return "" 370} 371 372// Response message for [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions]. 373type ListSecretVersionsResponse struct { 374 // The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by 375 // create_time (newest first). 376 Versions []*SecretVersion `protobuf:"bytes,1,rep,name=versions,proto3" json:"versions,omitempty"` 377 // A token to retrieve the next page of results. Pass this value in 378 // [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page. 379 NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"` 380 // The total number of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. 381 TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"` 382 XXX_NoUnkeyedLiteral struct{} `json:"-"` 383 XXX_unrecognized []byte `json:"-"` 384 XXX_sizecache int32 `json:"-"` 385} 386 387func (m *ListSecretVersionsResponse) Reset() { *m = ListSecretVersionsResponse{} } 388func (m *ListSecretVersionsResponse) String() string { return proto.CompactTextString(m) } 389func (*ListSecretVersionsResponse) ProtoMessage() {} 390func (*ListSecretVersionsResponse) Descriptor() ([]byte, []int) { 391 return fileDescriptor_67a0e1a61a378c59, []int{6} 392} 393 394func (m *ListSecretVersionsResponse) XXX_Unmarshal(b []byte) error { 395 return xxx_messageInfo_ListSecretVersionsResponse.Unmarshal(m, b) 396} 397func (m *ListSecretVersionsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 398 return xxx_messageInfo_ListSecretVersionsResponse.Marshal(b, m, deterministic) 399} 400func (m *ListSecretVersionsResponse) XXX_Merge(src proto.Message) { 401 xxx_messageInfo_ListSecretVersionsResponse.Merge(m, src) 402} 403func (m *ListSecretVersionsResponse) XXX_Size() int { 404 return xxx_messageInfo_ListSecretVersionsResponse.Size(m) 405} 406func (m *ListSecretVersionsResponse) XXX_DiscardUnknown() { 407 xxx_messageInfo_ListSecretVersionsResponse.DiscardUnknown(m) 408} 409 410var xxx_messageInfo_ListSecretVersionsResponse proto.InternalMessageInfo 411 412func (m *ListSecretVersionsResponse) GetVersions() []*SecretVersion { 413 if m != nil { 414 return m.Versions 415 } 416 return nil 417} 418 419func (m *ListSecretVersionsResponse) GetNextPageToken() string { 420 if m != nil { 421 return m.NextPageToken 422 } 423 return "" 424} 425 426func (m *ListSecretVersionsResponse) GetTotalSize() int32 { 427 if m != nil { 428 return m.TotalSize 429 } 430 return 0 431} 432 433// Request message for [SecretManagerService.GetSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.GetSecretVersion]. 434type GetSecretVersionRequest struct { 435 // Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format 436 // `projects/*/secrets/*/versions/*`. 437 // `projects/*/secrets/*/versions/latest` is an alias to the `latest` 438 // [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 439 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 440 XXX_NoUnkeyedLiteral struct{} `json:"-"` 441 XXX_unrecognized []byte `json:"-"` 442 XXX_sizecache int32 `json:"-"` 443} 444 445func (m *GetSecretVersionRequest) Reset() { *m = GetSecretVersionRequest{} } 446func (m *GetSecretVersionRequest) String() string { return proto.CompactTextString(m) } 447func (*GetSecretVersionRequest) ProtoMessage() {} 448func (*GetSecretVersionRequest) Descriptor() ([]byte, []int) { 449 return fileDescriptor_67a0e1a61a378c59, []int{7} 450} 451 452func (m *GetSecretVersionRequest) XXX_Unmarshal(b []byte) error { 453 return xxx_messageInfo_GetSecretVersionRequest.Unmarshal(m, b) 454} 455func (m *GetSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 456 return xxx_messageInfo_GetSecretVersionRequest.Marshal(b, m, deterministic) 457} 458func (m *GetSecretVersionRequest) XXX_Merge(src proto.Message) { 459 xxx_messageInfo_GetSecretVersionRequest.Merge(m, src) 460} 461func (m *GetSecretVersionRequest) XXX_Size() int { 462 return xxx_messageInfo_GetSecretVersionRequest.Size(m) 463} 464func (m *GetSecretVersionRequest) XXX_DiscardUnknown() { 465 xxx_messageInfo_GetSecretVersionRequest.DiscardUnknown(m) 466} 467 468var xxx_messageInfo_GetSecretVersionRequest proto.InternalMessageInfo 469 470func (m *GetSecretVersionRequest) GetName() string { 471 if m != nil { 472 return m.Name 473 } 474 return "" 475} 476 477// Request message for [SecretManagerService.UpdateSecret][google.cloud.secrets.v1beta1.SecretManagerService.UpdateSecret]. 478type UpdateSecretRequest struct { 479 // Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values. 480 Secret *Secret `protobuf:"bytes,1,opt,name=secret,proto3" json:"secret,omitempty"` 481 // Required. Specifies the fields to be updated. 482 UpdateMask *field_mask.FieldMask `protobuf:"bytes,2,opt,name=update_mask,json=updateMask,proto3" json:"update_mask,omitempty"` 483 XXX_NoUnkeyedLiteral struct{} `json:"-"` 484 XXX_unrecognized []byte `json:"-"` 485 XXX_sizecache int32 `json:"-"` 486} 487 488func (m *UpdateSecretRequest) Reset() { *m = UpdateSecretRequest{} } 489func (m *UpdateSecretRequest) String() string { return proto.CompactTextString(m) } 490func (*UpdateSecretRequest) ProtoMessage() {} 491func (*UpdateSecretRequest) Descriptor() ([]byte, []int) { 492 return fileDescriptor_67a0e1a61a378c59, []int{8} 493} 494 495func (m *UpdateSecretRequest) XXX_Unmarshal(b []byte) error { 496 return xxx_messageInfo_UpdateSecretRequest.Unmarshal(m, b) 497} 498func (m *UpdateSecretRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 499 return xxx_messageInfo_UpdateSecretRequest.Marshal(b, m, deterministic) 500} 501func (m *UpdateSecretRequest) XXX_Merge(src proto.Message) { 502 xxx_messageInfo_UpdateSecretRequest.Merge(m, src) 503} 504func (m *UpdateSecretRequest) XXX_Size() int { 505 return xxx_messageInfo_UpdateSecretRequest.Size(m) 506} 507func (m *UpdateSecretRequest) XXX_DiscardUnknown() { 508 xxx_messageInfo_UpdateSecretRequest.DiscardUnknown(m) 509} 510 511var xxx_messageInfo_UpdateSecretRequest proto.InternalMessageInfo 512 513func (m *UpdateSecretRequest) GetSecret() *Secret { 514 if m != nil { 515 return m.Secret 516 } 517 return nil 518} 519 520func (m *UpdateSecretRequest) GetUpdateMask() *field_mask.FieldMask { 521 if m != nil { 522 return m.UpdateMask 523 } 524 return nil 525} 526 527// Request message for [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion]. 528type AccessSecretVersionRequest struct { 529 // Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format 530 // `projects/*/secrets/*/versions/*`. 531 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 532 XXX_NoUnkeyedLiteral struct{} `json:"-"` 533 XXX_unrecognized []byte `json:"-"` 534 XXX_sizecache int32 `json:"-"` 535} 536 537func (m *AccessSecretVersionRequest) Reset() { *m = AccessSecretVersionRequest{} } 538func (m *AccessSecretVersionRequest) String() string { return proto.CompactTextString(m) } 539func (*AccessSecretVersionRequest) ProtoMessage() {} 540func (*AccessSecretVersionRequest) Descriptor() ([]byte, []int) { 541 return fileDescriptor_67a0e1a61a378c59, []int{9} 542} 543 544func (m *AccessSecretVersionRequest) XXX_Unmarshal(b []byte) error { 545 return xxx_messageInfo_AccessSecretVersionRequest.Unmarshal(m, b) 546} 547func (m *AccessSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 548 return xxx_messageInfo_AccessSecretVersionRequest.Marshal(b, m, deterministic) 549} 550func (m *AccessSecretVersionRequest) XXX_Merge(src proto.Message) { 551 xxx_messageInfo_AccessSecretVersionRequest.Merge(m, src) 552} 553func (m *AccessSecretVersionRequest) XXX_Size() int { 554 return xxx_messageInfo_AccessSecretVersionRequest.Size(m) 555} 556func (m *AccessSecretVersionRequest) XXX_DiscardUnknown() { 557 xxx_messageInfo_AccessSecretVersionRequest.DiscardUnknown(m) 558} 559 560var xxx_messageInfo_AccessSecretVersionRequest proto.InternalMessageInfo 561 562func (m *AccessSecretVersionRequest) GetName() string { 563 if m != nil { 564 return m.Name 565 } 566 return "" 567} 568 569// Response message for [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion]. 570type AccessSecretVersionResponse struct { 571 // The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format 572 // `projects/*/secrets/*/versions/*`. 573 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 574 // Secret payload 575 Payload *SecretPayload `protobuf:"bytes,2,opt,name=payload,proto3" json:"payload,omitempty"` 576 XXX_NoUnkeyedLiteral struct{} `json:"-"` 577 XXX_unrecognized []byte `json:"-"` 578 XXX_sizecache int32 `json:"-"` 579} 580 581func (m *AccessSecretVersionResponse) Reset() { *m = AccessSecretVersionResponse{} } 582func (m *AccessSecretVersionResponse) String() string { return proto.CompactTextString(m) } 583func (*AccessSecretVersionResponse) ProtoMessage() {} 584func (*AccessSecretVersionResponse) Descriptor() ([]byte, []int) { 585 return fileDescriptor_67a0e1a61a378c59, []int{10} 586} 587 588func (m *AccessSecretVersionResponse) XXX_Unmarshal(b []byte) error { 589 return xxx_messageInfo_AccessSecretVersionResponse.Unmarshal(m, b) 590} 591func (m *AccessSecretVersionResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 592 return xxx_messageInfo_AccessSecretVersionResponse.Marshal(b, m, deterministic) 593} 594func (m *AccessSecretVersionResponse) XXX_Merge(src proto.Message) { 595 xxx_messageInfo_AccessSecretVersionResponse.Merge(m, src) 596} 597func (m *AccessSecretVersionResponse) XXX_Size() int { 598 return xxx_messageInfo_AccessSecretVersionResponse.Size(m) 599} 600func (m *AccessSecretVersionResponse) XXX_DiscardUnknown() { 601 xxx_messageInfo_AccessSecretVersionResponse.DiscardUnknown(m) 602} 603 604var xxx_messageInfo_AccessSecretVersionResponse proto.InternalMessageInfo 605 606func (m *AccessSecretVersionResponse) GetName() string { 607 if m != nil { 608 return m.Name 609 } 610 return "" 611} 612 613func (m *AccessSecretVersionResponse) GetPayload() *SecretPayload { 614 if m != nil { 615 return m.Payload 616 } 617 return nil 618} 619 620// Request message for [SecretManagerService.DeleteSecret][google.cloud.secrets.v1beta1.SecretManagerService.DeleteSecret]. 621type DeleteSecretRequest struct { 622 // Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format 623 // `projects/*/secrets/*`. 624 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 625 XXX_NoUnkeyedLiteral struct{} `json:"-"` 626 XXX_unrecognized []byte `json:"-"` 627 XXX_sizecache int32 `json:"-"` 628} 629 630func (m *DeleteSecretRequest) Reset() { *m = DeleteSecretRequest{} } 631func (m *DeleteSecretRequest) String() string { return proto.CompactTextString(m) } 632func (*DeleteSecretRequest) ProtoMessage() {} 633func (*DeleteSecretRequest) Descriptor() ([]byte, []int) { 634 return fileDescriptor_67a0e1a61a378c59, []int{11} 635} 636 637func (m *DeleteSecretRequest) XXX_Unmarshal(b []byte) error { 638 return xxx_messageInfo_DeleteSecretRequest.Unmarshal(m, b) 639} 640func (m *DeleteSecretRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 641 return xxx_messageInfo_DeleteSecretRequest.Marshal(b, m, deterministic) 642} 643func (m *DeleteSecretRequest) XXX_Merge(src proto.Message) { 644 xxx_messageInfo_DeleteSecretRequest.Merge(m, src) 645} 646func (m *DeleteSecretRequest) XXX_Size() int { 647 return xxx_messageInfo_DeleteSecretRequest.Size(m) 648} 649func (m *DeleteSecretRequest) XXX_DiscardUnknown() { 650 xxx_messageInfo_DeleteSecretRequest.DiscardUnknown(m) 651} 652 653var xxx_messageInfo_DeleteSecretRequest proto.InternalMessageInfo 654 655func (m *DeleteSecretRequest) GetName() string { 656 if m != nil { 657 return m.Name 658 } 659 return "" 660} 661 662// Request message for [SecretManagerService.DisableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DisableSecretVersion]. 663type DisableSecretVersionRequest struct { 664 // Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format 665 // `projects/*/secrets/*/versions/*`. 666 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 667 XXX_NoUnkeyedLiteral struct{} `json:"-"` 668 XXX_unrecognized []byte `json:"-"` 669 XXX_sizecache int32 `json:"-"` 670} 671 672func (m *DisableSecretVersionRequest) Reset() { *m = DisableSecretVersionRequest{} } 673func (m *DisableSecretVersionRequest) String() string { return proto.CompactTextString(m) } 674func (*DisableSecretVersionRequest) ProtoMessage() {} 675func (*DisableSecretVersionRequest) Descriptor() ([]byte, []int) { 676 return fileDescriptor_67a0e1a61a378c59, []int{12} 677} 678 679func (m *DisableSecretVersionRequest) XXX_Unmarshal(b []byte) error { 680 return xxx_messageInfo_DisableSecretVersionRequest.Unmarshal(m, b) 681} 682func (m *DisableSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 683 return xxx_messageInfo_DisableSecretVersionRequest.Marshal(b, m, deterministic) 684} 685func (m *DisableSecretVersionRequest) XXX_Merge(src proto.Message) { 686 xxx_messageInfo_DisableSecretVersionRequest.Merge(m, src) 687} 688func (m *DisableSecretVersionRequest) XXX_Size() int { 689 return xxx_messageInfo_DisableSecretVersionRequest.Size(m) 690} 691func (m *DisableSecretVersionRequest) XXX_DiscardUnknown() { 692 xxx_messageInfo_DisableSecretVersionRequest.DiscardUnknown(m) 693} 694 695var xxx_messageInfo_DisableSecretVersionRequest proto.InternalMessageInfo 696 697func (m *DisableSecretVersionRequest) GetName() string { 698 if m != nil { 699 return m.Name 700 } 701 return "" 702} 703 704// Request message for [SecretManagerService.EnableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.EnableSecretVersion]. 705type EnableSecretVersionRequest struct { 706 // Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format 707 // `projects/*/secrets/*/versions/*`. 708 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 709 XXX_NoUnkeyedLiteral struct{} `json:"-"` 710 XXX_unrecognized []byte `json:"-"` 711 XXX_sizecache int32 `json:"-"` 712} 713 714func (m *EnableSecretVersionRequest) Reset() { *m = EnableSecretVersionRequest{} } 715func (m *EnableSecretVersionRequest) String() string { return proto.CompactTextString(m) } 716func (*EnableSecretVersionRequest) ProtoMessage() {} 717func (*EnableSecretVersionRequest) Descriptor() ([]byte, []int) { 718 return fileDescriptor_67a0e1a61a378c59, []int{13} 719} 720 721func (m *EnableSecretVersionRequest) XXX_Unmarshal(b []byte) error { 722 return xxx_messageInfo_EnableSecretVersionRequest.Unmarshal(m, b) 723} 724func (m *EnableSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 725 return xxx_messageInfo_EnableSecretVersionRequest.Marshal(b, m, deterministic) 726} 727func (m *EnableSecretVersionRequest) XXX_Merge(src proto.Message) { 728 xxx_messageInfo_EnableSecretVersionRequest.Merge(m, src) 729} 730func (m *EnableSecretVersionRequest) XXX_Size() int { 731 return xxx_messageInfo_EnableSecretVersionRequest.Size(m) 732} 733func (m *EnableSecretVersionRequest) XXX_DiscardUnknown() { 734 xxx_messageInfo_EnableSecretVersionRequest.DiscardUnknown(m) 735} 736 737var xxx_messageInfo_EnableSecretVersionRequest proto.InternalMessageInfo 738 739func (m *EnableSecretVersionRequest) GetName() string { 740 if m != nil { 741 return m.Name 742 } 743 return "" 744} 745 746// Request message for [SecretManagerService.DestroySecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DestroySecretVersion]. 747type DestroySecretVersionRequest struct { 748 // Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format 749 // `projects/*/secrets/*/versions/*`. 750 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 751 XXX_NoUnkeyedLiteral struct{} `json:"-"` 752 XXX_unrecognized []byte `json:"-"` 753 XXX_sizecache int32 `json:"-"` 754} 755 756func (m *DestroySecretVersionRequest) Reset() { *m = DestroySecretVersionRequest{} } 757func (m *DestroySecretVersionRequest) String() string { return proto.CompactTextString(m) } 758func (*DestroySecretVersionRequest) ProtoMessage() {} 759func (*DestroySecretVersionRequest) Descriptor() ([]byte, []int) { 760 return fileDescriptor_67a0e1a61a378c59, []int{14} 761} 762 763func (m *DestroySecretVersionRequest) XXX_Unmarshal(b []byte) error { 764 return xxx_messageInfo_DestroySecretVersionRequest.Unmarshal(m, b) 765} 766func (m *DestroySecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 767 return xxx_messageInfo_DestroySecretVersionRequest.Marshal(b, m, deterministic) 768} 769func (m *DestroySecretVersionRequest) XXX_Merge(src proto.Message) { 770 xxx_messageInfo_DestroySecretVersionRequest.Merge(m, src) 771} 772func (m *DestroySecretVersionRequest) XXX_Size() int { 773 return xxx_messageInfo_DestroySecretVersionRequest.Size(m) 774} 775func (m *DestroySecretVersionRequest) XXX_DiscardUnknown() { 776 xxx_messageInfo_DestroySecretVersionRequest.DiscardUnknown(m) 777} 778 779var xxx_messageInfo_DestroySecretVersionRequest proto.InternalMessageInfo 780 781func (m *DestroySecretVersionRequest) GetName() string { 782 if m != nil { 783 return m.Name 784 } 785 return "" 786} 787 788func init() { 789 proto.RegisterType((*ListSecretsRequest)(nil), "google.cloud.secrets.v1beta1.ListSecretsRequest") 790 proto.RegisterType((*ListSecretsResponse)(nil), "google.cloud.secrets.v1beta1.ListSecretsResponse") 791 proto.RegisterType((*CreateSecretRequest)(nil), "google.cloud.secrets.v1beta1.CreateSecretRequest") 792 proto.RegisterType((*AddSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.AddSecretVersionRequest") 793 proto.RegisterType((*GetSecretRequest)(nil), "google.cloud.secrets.v1beta1.GetSecretRequest") 794 proto.RegisterType((*ListSecretVersionsRequest)(nil), "google.cloud.secrets.v1beta1.ListSecretVersionsRequest") 795 proto.RegisterType((*ListSecretVersionsResponse)(nil), "google.cloud.secrets.v1beta1.ListSecretVersionsResponse") 796 proto.RegisterType((*GetSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.GetSecretVersionRequest") 797 proto.RegisterType((*UpdateSecretRequest)(nil), "google.cloud.secrets.v1beta1.UpdateSecretRequest") 798 proto.RegisterType((*AccessSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.AccessSecretVersionRequest") 799 proto.RegisterType((*AccessSecretVersionResponse)(nil), "google.cloud.secrets.v1beta1.AccessSecretVersionResponse") 800 proto.RegisterType((*DeleteSecretRequest)(nil), "google.cloud.secrets.v1beta1.DeleteSecretRequest") 801 proto.RegisterType((*DisableSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.DisableSecretVersionRequest") 802 proto.RegisterType((*EnableSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.EnableSecretVersionRequest") 803 proto.RegisterType((*DestroySecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.DestroySecretVersionRequest") 804} 805 806func init() { 807 proto.RegisterFile("google/cloud/secrets/v1beta1/service.proto", fileDescriptor_67a0e1a61a378c59) 808} 809 810var fileDescriptor_67a0e1a61a378c59 = []byte{ 811 // 1369 bytes of a gzipped FileDescriptorProto 812 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xbc, 0x58, 0xcb, 0x6f, 0x1b, 0x45, 813 0x18, 0xd7, 0x38, 0xf4, 0x91, 0x89, 0x81, 0x6a, 0x5c, 0x9a, 0x74, 0x5b, 0x20, 0x5a, 0xda, 0x2a, 814 0x38, 0xe9, 0x2e, 0x4e, 0x95, 0xb6, 0x6c, 0x1f, 0x64, 0x93, 0xa6, 0xa6, 0x40, 0xc0, 0xb2, 0x4b, 815 0x0e, 0xa8, 0x52, 0x34, 0xf1, 0x4e, 0xdd, 0xa5, 0xf6, 0xee, 0xb2, 0x33, 0x76, 0x69, 0x51, 0x2f, 816 0xc0, 0x01, 0x09, 0x89, 0x0b, 0x12, 0x07, 0xc4, 0x89, 0x03, 0xa8, 0x15, 0x17, 0x2e, 0x20, 0xae, 817 0x48, 0x20, 0xd1, 0x1b, 0x70, 0xcb, 0xa9, 0x07, 0x4e, 0xfc, 0x05, 0x88, 0x13, 0xda, 0x79, 0xd8, 818 0xbb, 0x7e, 0xae, 0xdb, 0x84, 0x53, 0x9c, 0xef, 0x31, 0xdf, 0xef, 0x7b, 0x7f, 0x36, 0xcc, 0xd7, 819 0x7c, 0xbf, 0x56, 0x27, 0x66, 0xb5, 0xee, 0x37, 0x1d, 0x93, 0x92, 0x6a, 0x48, 0x18, 0x35, 0x5b, 820 0x85, 0x2d, 0xc2, 0x70, 0xc1, 0xa4, 0x24, 0x6c, 0xb9, 0x55, 0x62, 0x04, 0xa1, 0xcf, 0x7c, 0x74, 821 0x54, 0xc8, 0x1a, 0x5c, 0xd6, 0x90, 0xb2, 0x86, 0x94, 0xd5, 0x24, 0xd7, 0xc4, 0x81, 0x6b, 0x62, 822 0xcf, 0xf3, 0x19, 0x66, 0xae, 0xef, 0x51, 0xa1, 0xab, 0x4d, 0xc7, 0xb8, 0xd5, 0xba, 0x4b, 0x3c, 823 0x26, 0x19, 0xcf, 0xc7, 0x18, 0xd7, 0x5d, 0x52, 0x77, 0x36, 0xb7, 0xc8, 0x0d, 0xdc, 0x72, 0xfd, 824 0x50, 0x0a, 0x1c, 0x8e, 0x09, 0x84, 0x84, 0xfa, 0xcd, 0x50, 0x01, 0xd2, 0x16, 0x86, 0x82, 0x57, 825 0xc2, 0x0a, 0xc2, 0x73, 0x52, 0xda, 0xc5, 0x0d, 0xb3, 0x55, 0x88, 0xfe, 0x6c, 0x06, 0x7e, 0xdd, 826 0xad, 0xde, 0x96, 0x7c, 0x2d, 0xc9, 0x4f, 0xf0, 0x8e, 0x48, 0x1e, 0xff, 0x6f, 0xab, 0x79, 0xdd, 827 0x24, 0x8d, 0x80, 0x29, 0xe6, 0x6c, 0x37, 0x53, 0xf8, 0xd1, 0xc0, 0xf4, 0xa6, 0x90, 0xd0, 0xbf, 828 0x05, 0x10, 0xbd, 0xe1, 0x52, 0x56, 0x11, 0x10, 0xcb, 0xe4, 0xbd, 0x26, 0xa1, 0x0c, 0xbd, 0x0e, 829 0xf7, 0x06, 0x38, 0x24, 0x1e, 0x9b, 0x01, 0xb3, 0x60, 0x6e, 0x72, 0xe5, 0xd4, 0x43, 0x3b, 0xf3, 830 0xaf, 0x7d, 0x12, 0xce, 0x73, 0x87, 0x14, 0xfe, 0x06, 0xf6, 0x70, 0x8d, 0x84, 0x86, 0xb0, 0x82, 831 0x03, 0x97, 0x1a, 0x55, 0xbf, 0x61, 0x96, 0x42, 0xff, 0x5d, 0x52, 0x65, 0x65, 0xf9, 0x04, 0x9a, 832 0x85, 0x93, 0x01, 0xae, 0x91, 0x4d, 0xea, 0xde, 0x21, 0x33, 0x99, 0x59, 0x30, 0xb7, 0x67, 0x65, 833 0xe2, 0xa1, 0x0d, 0xca, 0xfb, 0x23, 0x6a, 0xc5, 0xbd, 0x43, 0x90, 0x0e, 0x21, 0x97, 0x60, 0xfe, 834 0x4d, 0xe2, 0xcd, 0x4c, 0x70, 0x93, 0x5c, 0x84, 0x2b, 0x5e, 0x8d, 0xa8, 0xfa, 0x57, 0x00, 0xe6, 835 0x12, 0x48, 0x69, 0xe0, 0x7b, 0x94, 0xa0, 0x8b, 0x70, 0x9f, 0x8c, 0xef, 0x0c, 0x98, 0x9d, 0x98, 836 0x9b, 0x5a, 0x3c, 0x66, 0x0c, 0xab, 0x06, 0x43, 0xe8, 0x97, 0x95, 0x12, 0x3a, 0x01, 0x9f, 0xf6, 837 0xc8, 0xfb, 0x6c, 0x33, 0x06, 0x20, 0xc2, 0x38, 0x59, 0x7e, 0x32, 0x22, 0x97, 0x94, 0x7d, 0xf4, 838 0x2c, 0x84, 0xcc, 0x67, 0xb8, 0x2e, 0xdc, 0x88, 0x30, 0xee, 0x29, 0x4f, 0x72, 0x4a, 0xe4, 0x82, 839 0xfe, 0x33, 0x80, 0xb9, 0xd5, 0x90, 0x60, 0x46, 0xa4, 0x81, 0x5d, 0x8a, 0xa4, 0x80, 0xbd, 0xe9, 840 0x3a, 0x02, 0x65, 0x14, 0xa6, 0x4c, 0x79, 0xbf, 0xa0, 0x5e, 0x71, 0xd0, 0x79, 0xb8, 0x57, 0x7c, 841 0xe6, 0x08, 0xd3, 0x06, 0x43, 0xea, 0xe8, 0xf7, 0x01, 0x9c, 0xb6, 0x1d, 0x47, 0x50, 0x37, 0x48, 842 0x48, 0x5d, 0xdf, 0x53, 0x8e, 0xac, 0x76, 0x39, 0x32, 0xcf, 0x1d, 0x39, 0x0e, 0x5f, 0x10, 0xba, 843 0x03, 0x3c, 0x50, 0x06, 0xa4, 0x03, 0xaf, 0xc1, 0x7d, 0x01, 0xbe, 0x5d, 0xf7, 0xb1, 0x80, 0x3f, 844 0xb5, 0x38, 0x9f, 0x06, 0x5f, 0x49, 0xa8, 0x08, 0x5f, 0xd5, 0x03, 0x7a, 0x05, 0x1e, 0x28, 0x12, 845 0x96, 0x8c, 0xf6, 0x2b, 0xf0, 0x09, 0x0f, 0x37, 0xc8, 0xa3, 0x40, 0xe4, 0x8a, 0xfa, 0x37, 0x00, 846 0x1e, 0xee, 0x54, 0x99, 0x0c, 0x01, 0xdd, 0xd1, 0x18, 0xec, 0x4c, 0x3b, 0x7c, 0x07, 0xa0, 0xd6, 847 0x0f, 0xa8, 0xec, 0x8a, 0x22, 0xdc, 0xdf, 0x92, 0x34, 0xd9, 0x16, 0xa9, 0x22, 0xad, 0x72, 0xde, 848 0x56, 0xde, 0xa9, 0xf6, 0xc0, 0x70, 0xba, 0x9d, 0xac, 0xae, 0xc2, 0xba, 0x9c, 0xc8, 0xd9, 0x22, 849 0x0f, 0xe9, 0x02, 0xcc, 0xa7, 0x08, 0xa9, 0x7a, 0x48, 0xa4, 0xee, 0x4b, 0x00, 0x73, 0x6f, 0x07, 850 0x4e, 0x4f, 0x07, 0xda, 0xed, 0x96, 0x00, 0xe9, 0x5b, 0x42, 0xd4, 0x9a, 0x54, 0x44, 0xcb, 0x70, 851 0xaa, 0xc9, 0x5f, 0xe6, 0xa3, 0x53, 0x96, 0xae, 0xa6, 0xde, 0x51, 0xd3, 0xd5, 0xb8, 0x1c, 0x4d, 852 0xd7, 0x75, 0x4c, 0x6f, 0x0a, 0x6d, 0x28, 0x74, 0x22, 0x82, 0xee, 0x40, 0xcd, 0xae, 0x56, 0x09, 853 0xa5, 0xbb, 0x1a, 0x82, 0x7b, 0x00, 0x1e, 0xe9, 0x6b, 0x46, 0x56, 0xc5, 0x6a, 0xc2, 0x8e, 0xf9, 854 0x48, 0x46, 0xd0, 0xda, 0xe3, 0xf4, 0x70, 0xa7, 0x7d, 0x37, 0x60, 0xee, 0x12, 0xa9, 0x93, 0xee, 855 0x6c, 0x3d, 0x76, 0x07, 0x13, 0x78, 0xe4, 0x92, 0x4b, 0xf1, 0x56, 0x9d, 0xec, 0x6a, 0xa8, 0x1d, 856 0xa8, 0xad, 0x79, 0xbb, 0x6e, 0x25, 0x72, 0x86, 0x50, 0x16, 0xfa, 0xb7, 0x77, 0xd3, 0xcc, 0xe2, 857 0x47, 0x87, 0xe0, 0x41, 0x41, 0x5f, 0x17, 0x4a, 0x15, 0x71, 0x5e, 0xa1, 0x7b, 0x00, 0x4e, 0xc5, 858 0x96, 0x2e, 0x7a, 0x69, 0x78, 0xaa, 0x7b, 0x2f, 0x09, 0xad, 0x30, 0x86, 0x86, 0xa8, 0x52, 0x7d, 859 0x69, 0xdb, 0x96, 0xb3, 0xf2, 0xc3, 0x3f, 0xff, 0xfa, 0x3c, 0x73, 0x02, 0x1d, 0x6b, 0x5f, 0x4e, 860 0x1f, 0x08, 0xfa, 0x85, 0x40, 0x2c, 0x46, 0x6a, 0xe6, 0xef, 0xaa, 0xeb, 0x0a, 0xfd, 0x08, 0x60, 861 0x36, 0xbe, 0x81, 0xd1, 0x08, 0xd3, 0x7d, 0xb6, 0xb5, 0x96, 0x6a, 0x36, 0xe8, 0x6f, 0x6e, 0xdb, 862 0xd3, 0x02, 0xc8, 0x42, 0x7b, 0x1d, 0xcb, 0x4f, 0x1c, 0xb1, 0xa1, 0xa7, 0x42, 0x6c, 0xa9, 0xf1, 863 0xf2, 0x0b, 0x80, 0x07, 0xba, 0xd7, 0x2e, 0x5a, 0x1a, 0x0e, 0x65, 0xc0, 0x9a, 0xd6, 0xc6, 0x19, 864 0xf3, 0xfa, 0xfa, 0xb6, 0xfd, 0x94, 0x74, 0x44, 0xb6, 0x25, 0xc7, 0x7f, 0x5a, 0x2f, 0x0c, 0xc1, 865 0xdf, 0x3e, 0x67, 0xf3, 0x77, 0x2d, 0xec, 0x38, 0xf2, 0x2d, 0x0b, 0xe4, 0xd1, 0x17, 0x00, 0x4e, 866 0xb6, 0xa7, 0x3c, 0x32, 0x86, 0x23, 0xe9, 0xde, 0xdd, 0x29, 0x63, 0x7f, 0x6a, 0xdb, 0xe6, 0x35, 867 0xdb, 0x5b, 0x1a, 0x11, 0xb5, 0x3f, 0x4c, 0xf4, 0x13, 0x80, 0xd9, 0xf8, 0x6a, 0x18, 0x55, 0x1a, 868 0x7d, 0xd6, 0x48, 0x4a, 0x78, 0xa5, 0x6d, 0x1b, 0x09, 0xd6, 0x42, 0x6c, 0x63, 0x70, 0xb0, 0x4b, 869 0x8b, 0xf3, 0x1d, 0xb0, 0x42, 0xc6, 0x18, 0x8c, 0xb9, 0x5d, 0x1c, 0x9f, 0x01, 0x98, 0x8d, 0x0f, 870 0xca, 0x51, 0xd8, 0xfb, 0x0c, 0x55, 0xed, 0x50, 0xcf, 0xaa, 0x5a, 0x8b, 0xbe, 0x25, 0x74, 0x05, 871 0x33, 0x9f, 0x2e, 0x98, 0xbf, 0x25, 0xbe, 0x32, 0xa8, 0xcb, 0x03, 0x9d, 0x49, 0xdb, 0xe8, 0x5d, 872 0x47, 0x95, 0x76, 0x76, 0x7c, 0x45, 0x39, 0x28, 0x96, 0x93, 0x83, 0xa2, 0x80, 0xcc, 0x74, 0x65, 873 0x6b, 0xb6, 0xaf, 0x9b, 0x1f, 0x40, 0xec, 0x88, 0x4c, 0xd9, 0x79, 0x03, 0xee, 0x98, 0xf1, 0x3a, 874 0xef, 0x62, 0x3c, 0xf2, 0x09, 0xe0, 0x03, 0x23, 0xdf, 0x46, 0x1d, 0x25, 0xe1, 0x77, 0x00, 0x73, 875 0x7d, 0x36, 0x3d, 0x1a, 0x11, 0xcc, 0xc1, 0x37, 0x88, 0xf6, 0xf2, 0x23, 0x68, 0xca, 0x3c, 0xac, 876 0xc5, 0x9d, 0x39, 0x8b, 0x4e, 0x8f, 0xe9, 0x8c, 0x85, 0xf9, 0xdb, 0x51, 0x61, 0x1d, 0xec, 0xb7, 877 0xba, 0xd1, 0x08, 0x68, 0x43, 0xd6, 0xfd, 0x78, 0x49, 0xb9, 0x12, 0xf7, 0xe3, 0xbc, 0x7e, 0x66, 878 0x5c, 0x3f, 0x1c, 0x01, 0x24, 0x1a, 0x85, 0xbf, 0x02, 0x98, 0xeb, 0x73, 0x1f, 0x8c, 0xca, 0xcf, 879 0xe0, 0x93, 0x62, 0x3c, 0x4f, 0x5e, 0x8d, 0x7b, 0x72, 0x4e, 0x1f, 0x3b, 0x23, 0xc4, 0x53, 0x8e, 880 0xf0, 0xa4, 0xf4, 0x39, 0x41, 0x46, 0x26, 0x65, 0xf0, 0xd9, 0xf2, 0x3f, 0x27, 0x45, 0x00, 0x89, 881 0x7c, 0xf9, 0x14, 0xc0, 0x6c, 0x85, 0xb0, 0x2b, 0xb8, 0x51, 0xe2, 0x3f, 0xa1, 0x20, 0x5d, 0x01, 882 0x71, 0x71, 0xc3, 0x68, 0x45, 0x96, 0x3b, 0x4c, 0x05, 0xf6, 0x99, 0x2e, 0x19, 0xc1, 0xd5, 0x97, 883 0x39, 0x1e, 0x4b, 0x5f, 0xea, 0xe0, 0x51, 0x5f, 0xe6, 0x07, 0x0c, 0x74, 0x1a, 0x7b, 0x3c, 0x42, 884 0xf3, 0x09, 0x80, 0xd9, 0xe2, 0x30, 0x34, 0xc5, 0xf4, 0x68, 0x2e, 0x70, 0x34, 0x67, 0x50, 0x7a, 885 0x34, 0xb5, 0xb8, 0xe5, 0xef, 0x01, 0x44, 0x57, 0x09, 0xe5, 0x14, 0x12, 0x36, 0x5c, 0x2a, 0xa6, 886 0xe3, 0x5c, 0x97, 0xb1, 0x5e, 0x11, 0x05, 0xeb, 0xc5, 0x14, 0x92, 0x72, 0x58, 0x5c, 0xe6, 0x50, 887 0x97, 0xf5, 0x73, 0xa9, 0xa1, 0xb2, 0x9e, 0xc7, 0x2c, 0x90, 0xd7, 0x4a, 0x0f, 0xec, 0xa3, 0xc3, 888 0x0e, 0xdd, 0x3f, 0x6c, 0xe3, 0x06, 0x63, 0x01, 0xb5, 0x4c, 0xf3, 0xd6, 0xad, 0x5b, 0xdd, 0x57, 889 0x30, 0x6e, 0xb2, 0x1b, 0xe2, 0xd7, 0xb9, 0x93, 0x41, 0x1d, 0xb3, 0xeb, 0x7e, 0xd8, 0x58, 0xf9, 890 0x38, 0x03, 0x4f, 0x54, 0xfd, 0x46, 0xbf, 0xe2, 0x54, 0x26, 0x24, 0xe4, 0x95, 0xac, 0x3c, 0x90, 891 0x4b, 0xd1, 0x3e, 0x2d, 0x81, 0x77, 0xde, 0x92, 0x3a, 0x35, 0xbf, 0x8e, 0xbd, 0x9a, 0xe1, 0x87, 892 0x35, 0xb3, 0x46, 0x3c, 0xbe, 0x6d, 0xcd, 0x8e, 0xe5, 0xc4, 0xcf, 0x81, 0xf2, 0x49, 0x15, 0x85, 893 0x73, 0x09, 0xea, 0x3f, 0x00, 0x7c, 0x9d, 0x99, 0x28, 0x56, 0xd6, 0xef, 0x67, 0xf4, 0xa2, 0x78, 894 0x7a, 0x95, 0xc3, 0x49, 0x5c, 0xe9, 0xc6, 0x46, 0x61, 0x25, 0xd2, 0x7d, 0xa0, 0x84, 0xae, 0x71, 895 0xa1, 0x6b, 0x09, 0xa1, 0x6b, 0x1b, 0xc2, 0xc0, 0xdf, 0x99, 0xe3, 0x42, 0xc8, 0xb2, 0xb8, 0x94, 896 0x65, 0x25, 0xc4, 0x2c, 0x4b, 0xca, 0x6d, 0xed, 0xe5, 0xb0, 0x4f, 0xfd, 0x17, 0x00, 0x00, 0xff, 897 0xff, 0xdd, 0x02, 0x7b, 0x01, 0x81, 0x15, 0x00, 0x00, 898} 899 900// Reference imports to suppress errors if they are not otherwise used. 901var _ context.Context 902var _ grpc.ClientConnInterface 903 904// This is a compile-time assertion to ensure that this generated file 905// is compatible with the grpc package it is being compiled against. 906const _ = grpc.SupportPackageIsVersion6 907 908// SecretManagerServiceClient is the client API for SecretManagerService service. 909// 910// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream. 911type SecretManagerServiceClient interface { 912 // Lists [Secrets][google.cloud.secrets.v1beta1.Secret]. 913 ListSecrets(ctx context.Context, in *ListSecretsRequest, opts ...grpc.CallOption) (*ListSecretsResponse, error) 914 // Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. 915 CreateSecret(ctx context.Context, in *CreateSecretRequest, opts ...grpc.CallOption) (*Secret, error) 916 // Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret data and attaches 917 // it to an existing [Secret][google.cloud.secrets.v1beta1.Secret]. 918 AddSecretVersion(ctx context.Context, in *AddSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) 919 // Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret]. 920 GetSecret(ctx context.Context, in *GetSecretRequest, opts ...grpc.CallOption) (*Secret, error) 921 // Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret]. 922 UpdateSecret(ctx context.Context, in *UpdateSecretRequest, opts ...grpc.CallOption) (*Secret, error) 923 // Deletes a [Secret][google.cloud.secrets.v1beta1.Secret]. 924 DeleteSecret(ctx context.Context, in *DeleteSecretRequest, opts ...grpc.CallOption) (*empty.Empty, error) 925 // Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return secret 926 // data. 927 ListSecretVersions(ctx context.Context, in *ListSecretVersionsRequest, opts ...grpc.CallOption) (*ListSecretVersionsResponse, error) 928 // Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 929 // 930 // `projects/*/secrets/*/versions/latest` is an alias to the `latest` 931 // [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 932 GetSecretVersion(ctx context.Context, in *GetSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) 933 // Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the secret data. 934 // 935 // `projects/*/secrets/*/versions/latest` is an alias to the `latest` 936 // [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 937 AccessSecretVersion(ctx context.Context, in *AccessSecretVersionRequest, opts ...grpc.CallOption) (*AccessSecretVersionResponse, error) 938 // Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 939 // 940 // Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to 941 // [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED]. 942 DisableSecretVersion(ctx context.Context, in *DisableSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) 943 // Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 944 // 945 // Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to 946 // [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED]. 947 EnableSecretVersion(ctx context.Context, in *EnableSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) 948 // Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 949 // 950 // Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to 951 // [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably destroys the 952 // secret data. 953 DestroySecretVersion(ctx context.Context, in *DestroySecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) 954 // Sets the access control policy on the specified secret. Replaces any 955 // existing policy. 956 // 957 // Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced according 958 // to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret]. 959 SetIamPolicy(ctx context.Context, in *v1.SetIamPolicyRequest, opts ...grpc.CallOption) (*v1.Policy, error) 960 // Gets the access control policy for a secret. 961 // Returns empty policy if the secret exists and does not have a policy set. 962 GetIamPolicy(ctx context.Context, in *v1.GetIamPolicyRequest, opts ...grpc.CallOption) (*v1.Policy, error) 963 // Returns permissions that a caller has for the specified secret. 964 // If the secret does not exist, this call returns an empty set of 965 // permissions, not a NOT_FOUND error. 966 // 967 // Note: This operation is designed to be used for building permission-aware 968 // UIs and command-line tools, not for authorization checking. This operation 969 // may "fail open" without warning. 970 TestIamPermissions(ctx context.Context, in *v1.TestIamPermissionsRequest, opts ...grpc.CallOption) (*v1.TestIamPermissionsResponse, error) 971} 972 973type secretManagerServiceClient struct { 974 cc grpc.ClientConnInterface 975} 976 977func NewSecretManagerServiceClient(cc grpc.ClientConnInterface) SecretManagerServiceClient { 978 return &secretManagerServiceClient{cc} 979} 980 981func (c *secretManagerServiceClient) ListSecrets(ctx context.Context, in *ListSecretsRequest, opts ...grpc.CallOption) (*ListSecretsResponse, error) { 982 out := new(ListSecretsResponse) 983 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/ListSecrets", in, out, opts...) 984 if err != nil { 985 return nil, err 986 } 987 return out, nil 988} 989 990func (c *secretManagerServiceClient) CreateSecret(ctx context.Context, in *CreateSecretRequest, opts ...grpc.CallOption) (*Secret, error) { 991 out := new(Secret) 992 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/CreateSecret", in, out, opts...) 993 if err != nil { 994 return nil, err 995 } 996 return out, nil 997} 998 999func (c *secretManagerServiceClient) AddSecretVersion(ctx context.Context, in *AddSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) { 1000 out := new(SecretVersion) 1001 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/AddSecretVersion", in, out, opts...) 1002 if err != nil { 1003 return nil, err 1004 } 1005 return out, nil 1006} 1007 1008func (c *secretManagerServiceClient) GetSecret(ctx context.Context, in *GetSecretRequest, opts ...grpc.CallOption) (*Secret, error) { 1009 out := new(Secret) 1010 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/GetSecret", in, out, opts...) 1011 if err != nil { 1012 return nil, err 1013 } 1014 return out, nil 1015} 1016 1017func (c *secretManagerServiceClient) UpdateSecret(ctx context.Context, in *UpdateSecretRequest, opts ...grpc.CallOption) (*Secret, error) { 1018 out := new(Secret) 1019 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/UpdateSecret", in, out, opts...) 1020 if err != nil { 1021 return nil, err 1022 } 1023 return out, nil 1024} 1025 1026func (c *secretManagerServiceClient) DeleteSecret(ctx context.Context, in *DeleteSecretRequest, opts ...grpc.CallOption) (*empty.Empty, error) { 1027 out := new(empty.Empty) 1028 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/DeleteSecret", in, out, opts...) 1029 if err != nil { 1030 return nil, err 1031 } 1032 return out, nil 1033} 1034 1035func (c *secretManagerServiceClient) ListSecretVersions(ctx context.Context, in *ListSecretVersionsRequest, opts ...grpc.CallOption) (*ListSecretVersionsResponse, error) { 1036 out := new(ListSecretVersionsResponse) 1037 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/ListSecretVersions", in, out, opts...) 1038 if err != nil { 1039 return nil, err 1040 } 1041 return out, nil 1042} 1043 1044func (c *secretManagerServiceClient) GetSecretVersion(ctx context.Context, in *GetSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) { 1045 out := new(SecretVersion) 1046 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/GetSecretVersion", in, out, opts...) 1047 if err != nil { 1048 return nil, err 1049 } 1050 return out, nil 1051} 1052 1053func (c *secretManagerServiceClient) AccessSecretVersion(ctx context.Context, in *AccessSecretVersionRequest, opts ...grpc.CallOption) (*AccessSecretVersionResponse, error) { 1054 out := new(AccessSecretVersionResponse) 1055 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/AccessSecretVersion", in, out, opts...) 1056 if err != nil { 1057 return nil, err 1058 } 1059 return out, nil 1060} 1061 1062func (c *secretManagerServiceClient) DisableSecretVersion(ctx context.Context, in *DisableSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) { 1063 out := new(SecretVersion) 1064 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/DisableSecretVersion", in, out, opts...) 1065 if err != nil { 1066 return nil, err 1067 } 1068 return out, nil 1069} 1070 1071func (c *secretManagerServiceClient) EnableSecretVersion(ctx context.Context, in *EnableSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) { 1072 out := new(SecretVersion) 1073 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/EnableSecretVersion", in, out, opts...) 1074 if err != nil { 1075 return nil, err 1076 } 1077 return out, nil 1078} 1079 1080func (c *secretManagerServiceClient) DestroySecretVersion(ctx context.Context, in *DestroySecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) { 1081 out := new(SecretVersion) 1082 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/DestroySecretVersion", in, out, opts...) 1083 if err != nil { 1084 return nil, err 1085 } 1086 return out, nil 1087} 1088 1089func (c *secretManagerServiceClient) SetIamPolicy(ctx context.Context, in *v1.SetIamPolicyRequest, opts ...grpc.CallOption) (*v1.Policy, error) { 1090 out := new(v1.Policy) 1091 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/SetIamPolicy", in, out, opts...) 1092 if err != nil { 1093 return nil, err 1094 } 1095 return out, nil 1096} 1097 1098func (c *secretManagerServiceClient) GetIamPolicy(ctx context.Context, in *v1.GetIamPolicyRequest, opts ...grpc.CallOption) (*v1.Policy, error) { 1099 out := new(v1.Policy) 1100 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/GetIamPolicy", in, out, opts...) 1101 if err != nil { 1102 return nil, err 1103 } 1104 return out, nil 1105} 1106 1107func (c *secretManagerServiceClient) TestIamPermissions(ctx context.Context, in *v1.TestIamPermissionsRequest, opts ...grpc.CallOption) (*v1.TestIamPermissionsResponse, error) { 1108 out := new(v1.TestIamPermissionsResponse) 1109 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/TestIamPermissions", in, out, opts...) 1110 if err != nil { 1111 return nil, err 1112 } 1113 return out, nil 1114} 1115 1116// SecretManagerServiceServer is the server API for SecretManagerService service. 1117type SecretManagerServiceServer interface { 1118 // Lists [Secrets][google.cloud.secrets.v1beta1.Secret]. 1119 ListSecrets(context.Context, *ListSecretsRequest) (*ListSecretsResponse, error) 1120 // Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. 1121 CreateSecret(context.Context, *CreateSecretRequest) (*Secret, error) 1122 // Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret data and attaches 1123 // it to an existing [Secret][google.cloud.secrets.v1beta1.Secret]. 1124 AddSecretVersion(context.Context, *AddSecretVersionRequest) (*SecretVersion, error) 1125 // Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret]. 1126 GetSecret(context.Context, *GetSecretRequest) (*Secret, error) 1127 // Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret]. 1128 UpdateSecret(context.Context, *UpdateSecretRequest) (*Secret, error) 1129 // Deletes a [Secret][google.cloud.secrets.v1beta1.Secret]. 1130 DeleteSecret(context.Context, *DeleteSecretRequest) (*empty.Empty, error) 1131 // Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return secret 1132 // data. 1133 ListSecretVersions(context.Context, *ListSecretVersionsRequest) (*ListSecretVersionsResponse, error) 1134 // Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 1135 // 1136 // `projects/*/secrets/*/versions/latest` is an alias to the `latest` 1137 // [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 1138 GetSecretVersion(context.Context, *GetSecretVersionRequest) (*SecretVersion, error) 1139 // Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the secret data. 1140 // 1141 // `projects/*/secrets/*/versions/latest` is an alias to the `latest` 1142 // [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 1143 AccessSecretVersion(context.Context, *AccessSecretVersionRequest) (*AccessSecretVersionResponse, error) 1144 // Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 1145 // 1146 // Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to 1147 // [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED]. 1148 DisableSecretVersion(context.Context, *DisableSecretVersionRequest) (*SecretVersion, error) 1149 // Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 1150 // 1151 // Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to 1152 // [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED]. 1153 EnableSecretVersion(context.Context, *EnableSecretVersionRequest) (*SecretVersion, error) 1154 // Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 1155 // 1156 // Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to 1157 // [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably destroys the 1158 // secret data. 1159 DestroySecretVersion(context.Context, *DestroySecretVersionRequest) (*SecretVersion, error) 1160 // Sets the access control policy on the specified secret. Replaces any 1161 // existing policy. 1162 // 1163 // Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced according 1164 // to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret]. 1165 SetIamPolicy(context.Context, *v1.SetIamPolicyRequest) (*v1.Policy, error) 1166 // Gets the access control policy for a secret. 1167 // Returns empty policy if the secret exists and does not have a policy set. 1168 GetIamPolicy(context.Context, *v1.GetIamPolicyRequest) (*v1.Policy, error) 1169 // Returns permissions that a caller has for the specified secret. 1170 // If the secret does not exist, this call returns an empty set of 1171 // permissions, not a NOT_FOUND error. 1172 // 1173 // Note: This operation is designed to be used for building permission-aware 1174 // UIs and command-line tools, not for authorization checking. This operation 1175 // may "fail open" without warning. 1176 TestIamPermissions(context.Context, *v1.TestIamPermissionsRequest) (*v1.TestIamPermissionsResponse, error) 1177} 1178 1179// UnimplementedSecretManagerServiceServer can be embedded to have forward compatible implementations. 1180type UnimplementedSecretManagerServiceServer struct { 1181} 1182 1183func (*UnimplementedSecretManagerServiceServer) ListSecrets(ctx context.Context, req *ListSecretsRequest) (*ListSecretsResponse, error) { 1184 return nil, status.Errorf(codes.Unimplemented, "method ListSecrets not implemented") 1185} 1186func (*UnimplementedSecretManagerServiceServer) CreateSecret(ctx context.Context, req *CreateSecretRequest) (*Secret, error) { 1187 return nil, status.Errorf(codes.Unimplemented, "method CreateSecret not implemented") 1188} 1189func (*UnimplementedSecretManagerServiceServer) AddSecretVersion(ctx context.Context, req *AddSecretVersionRequest) (*SecretVersion, error) { 1190 return nil, status.Errorf(codes.Unimplemented, "method AddSecretVersion not implemented") 1191} 1192func (*UnimplementedSecretManagerServiceServer) GetSecret(ctx context.Context, req *GetSecretRequest) (*Secret, error) { 1193 return nil, status.Errorf(codes.Unimplemented, "method GetSecret not implemented") 1194} 1195func (*UnimplementedSecretManagerServiceServer) UpdateSecret(ctx context.Context, req *UpdateSecretRequest) (*Secret, error) { 1196 return nil, status.Errorf(codes.Unimplemented, "method UpdateSecret not implemented") 1197} 1198func (*UnimplementedSecretManagerServiceServer) DeleteSecret(ctx context.Context, req *DeleteSecretRequest) (*empty.Empty, error) { 1199 return nil, status.Errorf(codes.Unimplemented, "method DeleteSecret not implemented") 1200} 1201func (*UnimplementedSecretManagerServiceServer) ListSecretVersions(ctx context.Context, req *ListSecretVersionsRequest) (*ListSecretVersionsResponse, error) { 1202 return nil, status.Errorf(codes.Unimplemented, "method ListSecretVersions not implemented") 1203} 1204func (*UnimplementedSecretManagerServiceServer) GetSecretVersion(ctx context.Context, req *GetSecretVersionRequest) (*SecretVersion, error) { 1205 return nil, status.Errorf(codes.Unimplemented, "method GetSecretVersion not implemented") 1206} 1207func (*UnimplementedSecretManagerServiceServer) AccessSecretVersion(ctx context.Context, req *AccessSecretVersionRequest) (*AccessSecretVersionResponse, error) { 1208 return nil, status.Errorf(codes.Unimplemented, "method AccessSecretVersion not implemented") 1209} 1210func (*UnimplementedSecretManagerServiceServer) DisableSecretVersion(ctx context.Context, req *DisableSecretVersionRequest) (*SecretVersion, error) { 1211 return nil, status.Errorf(codes.Unimplemented, "method DisableSecretVersion not implemented") 1212} 1213func (*UnimplementedSecretManagerServiceServer) EnableSecretVersion(ctx context.Context, req *EnableSecretVersionRequest) (*SecretVersion, error) { 1214 return nil, status.Errorf(codes.Unimplemented, "method EnableSecretVersion not implemented") 1215} 1216func (*UnimplementedSecretManagerServiceServer) DestroySecretVersion(ctx context.Context, req *DestroySecretVersionRequest) (*SecretVersion, error) { 1217 return nil, status.Errorf(codes.Unimplemented, "method DestroySecretVersion not implemented") 1218} 1219func (*UnimplementedSecretManagerServiceServer) SetIamPolicy(ctx context.Context, req *v1.SetIamPolicyRequest) (*v1.Policy, error) { 1220 return nil, status.Errorf(codes.Unimplemented, "method SetIamPolicy not implemented") 1221} 1222func (*UnimplementedSecretManagerServiceServer) GetIamPolicy(ctx context.Context, req *v1.GetIamPolicyRequest) (*v1.Policy, error) { 1223 return nil, status.Errorf(codes.Unimplemented, "method GetIamPolicy not implemented") 1224} 1225func (*UnimplementedSecretManagerServiceServer) TestIamPermissions(ctx context.Context, req *v1.TestIamPermissionsRequest) (*v1.TestIamPermissionsResponse, error) { 1226 return nil, status.Errorf(codes.Unimplemented, "method TestIamPermissions not implemented") 1227} 1228 1229func RegisterSecretManagerServiceServer(s *grpc.Server, srv SecretManagerServiceServer) { 1230 s.RegisterService(&_SecretManagerService_serviceDesc, srv) 1231} 1232 1233func _SecretManagerService_ListSecrets_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1234 in := new(ListSecretsRequest) 1235 if err := dec(in); err != nil { 1236 return nil, err 1237 } 1238 if interceptor == nil { 1239 return srv.(SecretManagerServiceServer).ListSecrets(ctx, in) 1240 } 1241 info := &grpc.UnaryServerInfo{ 1242 Server: srv, 1243 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/ListSecrets", 1244 } 1245 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1246 return srv.(SecretManagerServiceServer).ListSecrets(ctx, req.(*ListSecretsRequest)) 1247 } 1248 return interceptor(ctx, in, info, handler) 1249} 1250 1251func _SecretManagerService_CreateSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1252 in := new(CreateSecretRequest) 1253 if err := dec(in); err != nil { 1254 return nil, err 1255 } 1256 if interceptor == nil { 1257 return srv.(SecretManagerServiceServer).CreateSecret(ctx, in) 1258 } 1259 info := &grpc.UnaryServerInfo{ 1260 Server: srv, 1261 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/CreateSecret", 1262 } 1263 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1264 return srv.(SecretManagerServiceServer).CreateSecret(ctx, req.(*CreateSecretRequest)) 1265 } 1266 return interceptor(ctx, in, info, handler) 1267} 1268 1269func _SecretManagerService_AddSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1270 in := new(AddSecretVersionRequest) 1271 if err := dec(in); err != nil { 1272 return nil, err 1273 } 1274 if interceptor == nil { 1275 return srv.(SecretManagerServiceServer).AddSecretVersion(ctx, in) 1276 } 1277 info := &grpc.UnaryServerInfo{ 1278 Server: srv, 1279 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/AddSecretVersion", 1280 } 1281 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1282 return srv.(SecretManagerServiceServer).AddSecretVersion(ctx, req.(*AddSecretVersionRequest)) 1283 } 1284 return interceptor(ctx, in, info, handler) 1285} 1286 1287func _SecretManagerService_GetSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1288 in := new(GetSecretRequest) 1289 if err := dec(in); err != nil { 1290 return nil, err 1291 } 1292 if interceptor == nil { 1293 return srv.(SecretManagerServiceServer).GetSecret(ctx, in) 1294 } 1295 info := &grpc.UnaryServerInfo{ 1296 Server: srv, 1297 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/GetSecret", 1298 } 1299 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1300 return srv.(SecretManagerServiceServer).GetSecret(ctx, req.(*GetSecretRequest)) 1301 } 1302 return interceptor(ctx, in, info, handler) 1303} 1304 1305func _SecretManagerService_UpdateSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1306 in := new(UpdateSecretRequest) 1307 if err := dec(in); err != nil { 1308 return nil, err 1309 } 1310 if interceptor == nil { 1311 return srv.(SecretManagerServiceServer).UpdateSecret(ctx, in) 1312 } 1313 info := &grpc.UnaryServerInfo{ 1314 Server: srv, 1315 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/UpdateSecret", 1316 } 1317 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1318 return srv.(SecretManagerServiceServer).UpdateSecret(ctx, req.(*UpdateSecretRequest)) 1319 } 1320 return interceptor(ctx, in, info, handler) 1321} 1322 1323func _SecretManagerService_DeleteSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1324 in := new(DeleteSecretRequest) 1325 if err := dec(in); err != nil { 1326 return nil, err 1327 } 1328 if interceptor == nil { 1329 return srv.(SecretManagerServiceServer).DeleteSecret(ctx, in) 1330 } 1331 info := &grpc.UnaryServerInfo{ 1332 Server: srv, 1333 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/DeleteSecret", 1334 } 1335 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1336 return srv.(SecretManagerServiceServer).DeleteSecret(ctx, req.(*DeleteSecretRequest)) 1337 } 1338 return interceptor(ctx, in, info, handler) 1339} 1340 1341func _SecretManagerService_ListSecretVersions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1342 in := new(ListSecretVersionsRequest) 1343 if err := dec(in); err != nil { 1344 return nil, err 1345 } 1346 if interceptor == nil { 1347 return srv.(SecretManagerServiceServer).ListSecretVersions(ctx, in) 1348 } 1349 info := &grpc.UnaryServerInfo{ 1350 Server: srv, 1351 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/ListSecretVersions", 1352 } 1353 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1354 return srv.(SecretManagerServiceServer).ListSecretVersions(ctx, req.(*ListSecretVersionsRequest)) 1355 } 1356 return interceptor(ctx, in, info, handler) 1357} 1358 1359func _SecretManagerService_GetSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1360 in := new(GetSecretVersionRequest) 1361 if err := dec(in); err != nil { 1362 return nil, err 1363 } 1364 if interceptor == nil { 1365 return srv.(SecretManagerServiceServer).GetSecretVersion(ctx, in) 1366 } 1367 info := &grpc.UnaryServerInfo{ 1368 Server: srv, 1369 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/GetSecretVersion", 1370 } 1371 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1372 return srv.(SecretManagerServiceServer).GetSecretVersion(ctx, req.(*GetSecretVersionRequest)) 1373 } 1374 return interceptor(ctx, in, info, handler) 1375} 1376 1377func _SecretManagerService_AccessSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1378 in := new(AccessSecretVersionRequest) 1379 if err := dec(in); err != nil { 1380 return nil, err 1381 } 1382 if interceptor == nil { 1383 return srv.(SecretManagerServiceServer).AccessSecretVersion(ctx, in) 1384 } 1385 info := &grpc.UnaryServerInfo{ 1386 Server: srv, 1387 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/AccessSecretVersion", 1388 } 1389 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1390 return srv.(SecretManagerServiceServer).AccessSecretVersion(ctx, req.(*AccessSecretVersionRequest)) 1391 } 1392 return interceptor(ctx, in, info, handler) 1393} 1394 1395func _SecretManagerService_DisableSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1396 in := new(DisableSecretVersionRequest) 1397 if err := dec(in); err != nil { 1398 return nil, err 1399 } 1400 if interceptor == nil { 1401 return srv.(SecretManagerServiceServer).DisableSecretVersion(ctx, in) 1402 } 1403 info := &grpc.UnaryServerInfo{ 1404 Server: srv, 1405 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/DisableSecretVersion", 1406 } 1407 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1408 return srv.(SecretManagerServiceServer).DisableSecretVersion(ctx, req.(*DisableSecretVersionRequest)) 1409 } 1410 return interceptor(ctx, in, info, handler) 1411} 1412 1413func _SecretManagerService_EnableSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1414 in := new(EnableSecretVersionRequest) 1415 if err := dec(in); err != nil { 1416 return nil, err 1417 } 1418 if interceptor == nil { 1419 return srv.(SecretManagerServiceServer).EnableSecretVersion(ctx, in) 1420 } 1421 info := &grpc.UnaryServerInfo{ 1422 Server: srv, 1423 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/EnableSecretVersion", 1424 } 1425 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1426 return srv.(SecretManagerServiceServer).EnableSecretVersion(ctx, req.(*EnableSecretVersionRequest)) 1427 } 1428 return interceptor(ctx, in, info, handler) 1429} 1430 1431func _SecretManagerService_DestroySecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1432 in := new(DestroySecretVersionRequest) 1433 if err := dec(in); err != nil { 1434 return nil, err 1435 } 1436 if interceptor == nil { 1437 return srv.(SecretManagerServiceServer).DestroySecretVersion(ctx, in) 1438 } 1439 info := &grpc.UnaryServerInfo{ 1440 Server: srv, 1441 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/DestroySecretVersion", 1442 } 1443 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1444 return srv.(SecretManagerServiceServer).DestroySecretVersion(ctx, req.(*DestroySecretVersionRequest)) 1445 } 1446 return interceptor(ctx, in, info, handler) 1447} 1448 1449func _SecretManagerService_SetIamPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1450 in := new(v1.SetIamPolicyRequest) 1451 if err := dec(in); err != nil { 1452 return nil, err 1453 } 1454 if interceptor == nil { 1455 return srv.(SecretManagerServiceServer).SetIamPolicy(ctx, in) 1456 } 1457 info := &grpc.UnaryServerInfo{ 1458 Server: srv, 1459 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/SetIamPolicy", 1460 } 1461 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1462 return srv.(SecretManagerServiceServer).SetIamPolicy(ctx, req.(*v1.SetIamPolicyRequest)) 1463 } 1464 return interceptor(ctx, in, info, handler) 1465} 1466 1467func _SecretManagerService_GetIamPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1468 in := new(v1.GetIamPolicyRequest) 1469 if err := dec(in); err != nil { 1470 return nil, err 1471 } 1472 if interceptor == nil { 1473 return srv.(SecretManagerServiceServer).GetIamPolicy(ctx, in) 1474 } 1475 info := &grpc.UnaryServerInfo{ 1476 Server: srv, 1477 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/GetIamPolicy", 1478 } 1479 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1480 return srv.(SecretManagerServiceServer).GetIamPolicy(ctx, req.(*v1.GetIamPolicyRequest)) 1481 } 1482 return interceptor(ctx, in, info, handler) 1483} 1484 1485func _SecretManagerService_TestIamPermissions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1486 in := new(v1.TestIamPermissionsRequest) 1487 if err := dec(in); err != nil { 1488 return nil, err 1489 } 1490 if interceptor == nil { 1491 return srv.(SecretManagerServiceServer).TestIamPermissions(ctx, in) 1492 } 1493 info := &grpc.UnaryServerInfo{ 1494 Server: srv, 1495 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/TestIamPermissions", 1496 } 1497 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1498 return srv.(SecretManagerServiceServer).TestIamPermissions(ctx, req.(*v1.TestIamPermissionsRequest)) 1499 } 1500 return interceptor(ctx, in, info, handler) 1501} 1502 1503var _SecretManagerService_serviceDesc = grpc.ServiceDesc{ 1504 ServiceName: "google.cloud.secrets.v1beta1.SecretManagerService", 1505 HandlerType: (*SecretManagerServiceServer)(nil), 1506 Methods: []grpc.MethodDesc{ 1507 { 1508 MethodName: "ListSecrets", 1509 Handler: _SecretManagerService_ListSecrets_Handler, 1510 }, 1511 { 1512 MethodName: "CreateSecret", 1513 Handler: _SecretManagerService_CreateSecret_Handler, 1514 }, 1515 { 1516 MethodName: "AddSecretVersion", 1517 Handler: _SecretManagerService_AddSecretVersion_Handler, 1518 }, 1519 { 1520 MethodName: "GetSecret", 1521 Handler: _SecretManagerService_GetSecret_Handler, 1522 }, 1523 { 1524 MethodName: "UpdateSecret", 1525 Handler: _SecretManagerService_UpdateSecret_Handler, 1526 }, 1527 { 1528 MethodName: "DeleteSecret", 1529 Handler: _SecretManagerService_DeleteSecret_Handler, 1530 }, 1531 { 1532 MethodName: "ListSecretVersions", 1533 Handler: _SecretManagerService_ListSecretVersions_Handler, 1534 }, 1535 { 1536 MethodName: "GetSecretVersion", 1537 Handler: _SecretManagerService_GetSecretVersion_Handler, 1538 }, 1539 { 1540 MethodName: "AccessSecretVersion", 1541 Handler: _SecretManagerService_AccessSecretVersion_Handler, 1542 }, 1543 { 1544 MethodName: "DisableSecretVersion", 1545 Handler: _SecretManagerService_DisableSecretVersion_Handler, 1546 }, 1547 { 1548 MethodName: "EnableSecretVersion", 1549 Handler: _SecretManagerService_EnableSecretVersion_Handler, 1550 }, 1551 { 1552 MethodName: "DestroySecretVersion", 1553 Handler: _SecretManagerService_DestroySecretVersion_Handler, 1554 }, 1555 { 1556 MethodName: "SetIamPolicy", 1557 Handler: _SecretManagerService_SetIamPolicy_Handler, 1558 }, 1559 { 1560 MethodName: "GetIamPolicy", 1561 Handler: _SecretManagerService_GetIamPolicy_Handler, 1562 }, 1563 { 1564 MethodName: "TestIamPermissions", 1565 Handler: _SecretManagerService_TestIamPermissions_Handler, 1566 }, 1567 }, 1568 Streams: []grpc.StreamDesc{}, 1569 Metadata: "google/cloud/secrets/v1beta1/service.proto", 1570} 1571