1// Code generated by protoc-gen-go. DO NOT EDIT.
2// source: google/cloud/secrets/v1beta1/service.proto
3
4package secretmanager
5
6import (
7	context "context"
8	fmt "fmt"
9	math "math"
10
11	proto "github.com/golang/protobuf/proto"
12	empty "github.com/golang/protobuf/ptypes/empty"
13	_ "google.golang.org/genproto/googleapis/api/annotations"
14	v1 "google.golang.org/genproto/googleapis/iam/v1"
15	field_mask "google.golang.org/genproto/protobuf/field_mask"
16	grpc "google.golang.org/grpc"
17	codes "google.golang.org/grpc/codes"
18	status "google.golang.org/grpc/status"
19)
20
21// Reference imports to suppress errors if they are not otherwise used.
22var _ = proto.Marshal
23var _ = fmt.Errorf
24var _ = math.Inf
25
26// This is a compile-time assertion to ensure that this generated file
27// is compatible with the proto package it is being compiled against.
28// A compilation error at this line likely means your copy of the
29// proto package needs to be updated.
30const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package
31
32// Request message for [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets].
33type ListSecretsRequest struct {
34	// Required. The resource name of the project associated with the
35	// [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
36	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
37	// Optional. The maximum number of results to be returned in a single page. If
38	// set to 0, the server decides the number of results to return. If the
39	// number is greater than 25000, it is capped at 25000.
40	PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"`
41	// Optional. Pagination token, returned earlier via
42	// [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token].
43	PageToken            string   `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"`
44	XXX_NoUnkeyedLiteral struct{} `json:"-"`
45	XXX_unrecognized     []byte   `json:"-"`
46	XXX_sizecache        int32    `json:"-"`
47}
48
49func (m *ListSecretsRequest) Reset()         { *m = ListSecretsRequest{} }
50func (m *ListSecretsRequest) String() string { return proto.CompactTextString(m) }
51func (*ListSecretsRequest) ProtoMessage()    {}
52func (*ListSecretsRequest) Descriptor() ([]byte, []int) {
53	return fileDescriptor_67a0e1a61a378c59, []int{0}
54}
55
56func (m *ListSecretsRequest) XXX_Unmarshal(b []byte) error {
57	return xxx_messageInfo_ListSecretsRequest.Unmarshal(m, b)
58}
59func (m *ListSecretsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
60	return xxx_messageInfo_ListSecretsRequest.Marshal(b, m, deterministic)
61}
62func (m *ListSecretsRequest) XXX_Merge(src proto.Message) {
63	xxx_messageInfo_ListSecretsRequest.Merge(m, src)
64}
65func (m *ListSecretsRequest) XXX_Size() int {
66	return xxx_messageInfo_ListSecretsRequest.Size(m)
67}
68func (m *ListSecretsRequest) XXX_DiscardUnknown() {
69	xxx_messageInfo_ListSecretsRequest.DiscardUnknown(m)
70}
71
72var xxx_messageInfo_ListSecretsRequest proto.InternalMessageInfo
73
74func (m *ListSecretsRequest) GetParent() string {
75	if m != nil {
76		return m.Parent
77	}
78	return ""
79}
80
81func (m *ListSecretsRequest) GetPageSize() int32 {
82	if m != nil {
83		return m.PageSize
84	}
85	return 0
86}
87
88func (m *ListSecretsRequest) GetPageToken() string {
89	if m != nil {
90		return m.PageToken
91	}
92	return ""
93}
94
95// Response message for [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets].
96type ListSecretsResponse struct {
97	// The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
98	// first).
99	Secrets []*Secret `protobuf:"bytes,1,rep,name=secrets,proto3" json:"secrets,omitempty"`
100	// A token to retrieve the next page of results. Pass this value in
101	// [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page.
102	NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"`
103	// The total number of [Secrets][google.cloud.secrets.v1beta1.Secret].
104	TotalSize            int32    `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"`
105	XXX_NoUnkeyedLiteral struct{} `json:"-"`
106	XXX_unrecognized     []byte   `json:"-"`
107	XXX_sizecache        int32    `json:"-"`
108}
109
110func (m *ListSecretsResponse) Reset()         { *m = ListSecretsResponse{} }
111func (m *ListSecretsResponse) String() string { return proto.CompactTextString(m) }
112func (*ListSecretsResponse) ProtoMessage()    {}
113func (*ListSecretsResponse) Descriptor() ([]byte, []int) {
114	return fileDescriptor_67a0e1a61a378c59, []int{1}
115}
116
117func (m *ListSecretsResponse) XXX_Unmarshal(b []byte) error {
118	return xxx_messageInfo_ListSecretsResponse.Unmarshal(m, b)
119}
120func (m *ListSecretsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
121	return xxx_messageInfo_ListSecretsResponse.Marshal(b, m, deterministic)
122}
123func (m *ListSecretsResponse) XXX_Merge(src proto.Message) {
124	xxx_messageInfo_ListSecretsResponse.Merge(m, src)
125}
126func (m *ListSecretsResponse) XXX_Size() int {
127	return xxx_messageInfo_ListSecretsResponse.Size(m)
128}
129func (m *ListSecretsResponse) XXX_DiscardUnknown() {
130	xxx_messageInfo_ListSecretsResponse.DiscardUnknown(m)
131}
132
133var xxx_messageInfo_ListSecretsResponse proto.InternalMessageInfo
134
135func (m *ListSecretsResponse) GetSecrets() []*Secret {
136	if m != nil {
137		return m.Secrets
138	}
139	return nil
140}
141
142func (m *ListSecretsResponse) GetNextPageToken() string {
143	if m != nil {
144		return m.NextPageToken
145	}
146	return ""
147}
148
149func (m *ListSecretsResponse) GetTotalSize() int32 {
150	if m != nil {
151		return m.TotalSize
152	}
153	return 0
154}
155
156// Request message for [SecretManagerService.CreateSecret][google.cloud.secrets.v1beta1.SecretManagerService.CreateSecret].
157type CreateSecretRequest struct {
158	// Required. The resource name of the project to associate with the
159	// [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
160	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
161	// Required. This must be unique within the project.
162	SecretId string `protobuf:"bytes,2,opt,name=secret_id,json=secretId,proto3" json:"secret_id,omitempty"`
163	// A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
164	Secret               *Secret  `protobuf:"bytes,3,opt,name=secret,proto3" json:"secret,omitempty"`
165	XXX_NoUnkeyedLiteral struct{} `json:"-"`
166	XXX_unrecognized     []byte   `json:"-"`
167	XXX_sizecache        int32    `json:"-"`
168}
169
170func (m *CreateSecretRequest) Reset()         { *m = CreateSecretRequest{} }
171func (m *CreateSecretRequest) String() string { return proto.CompactTextString(m) }
172func (*CreateSecretRequest) ProtoMessage()    {}
173func (*CreateSecretRequest) Descriptor() ([]byte, []int) {
174	return fileDescriptor_67a0e1a61a378c59, []int{2}
175}
176
177func (m *CreateSecretRequest) XXX_Unmarshal(b []byte) error {
178	return xxx_messageInfo_CreateSecretRequest.Unmarshal(m, b)
179}
180func (m *CreateSecretRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
181	return xxx_messageInfo_CreateSecretRequest.Marshal(b, m, deterministic)
182}
183func (m *CreateSecretRequest) XXX_Merge(src proto.Message) {
184	xxx_messageInfo_CreateSecretRequest.Merge(m, src)
185}
186func (m *CreateSecretRequest) XXX_Size() int {
187	return xxx_messageInfo_CreateSecretRequest.Size(m)
188}
189func (m *CreateSecretRequest) XXX_DiscardUnknown() {
190	xxx_messageInfo_CreateSecretRequest.DiscardUnknown(m)
191}
192
193var xxx_messageInfo_CreateSecretRequest proto.InternalMessageInfo
194
195func (m *CreateSecretRequest) GetParent() string {
196	if m != nil {
197		return m.Parent
198	}
199	return ""
200}
201
202func (m *CreateSecretRequest) GetSecretId() string {
203	if m != nil {
204		return m.SecretId
205	}
206	return ""
207}
208
209func (m *CreateSecretRequest) GetSecret() *Secret {
210	if m != nil {
211		return m.Secret
212	}
213	return nil
214}
215
216// Request message for [SecretManagerService.AddSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AddSecretVersion].
217type AddSecretVersionRequest struct {
218	// Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the
219	// [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`.
220	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
221	// Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
222	Payload              *SecretPayload `protobuf:"bytes,2,opt,name=payload,proto3" json:"payload,omitempty"`
223	XXX_NoUnkeyedLiteral struct{}       `json:"-"`
224	XXX_unrecognized     []byte         `json:"-"`
225	XXX_sizecache        int32          `json:"-"`
226}
227
228func (m *AddSecretVersionRequest) Reset()         { *m = AddSecretVersionRequest{} }
229func (m *AddSecretVersionRequest) String() string { return proto.CompactTextString(m) }
230func (*AddSecretVersionRequest) ProtoMessage()    {}
231func (*AddSecretVersionRequest) Descriptor() ([]byte, []int) {
232	return fileDescriptor_67a0e1a61a378c59, []int{3}
233}
234
235func (m *AddSecretVersionRequest) XXX_Unmarshal(b []byte) error {
236	return xxx_messageInfo_AddSecretVersionRequest.Unmarshal(m, b)
237}
238func (m *AddSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
239	return xxx_messageInfo_AddSecretVersionRequest.Marshal(b, m, deterministic)
240}
241func (m *AddSecretVersionRequest) XXX_Merge(src proto.Message) {
242	xxx_messageInfo_AddSecretVersionRequest.Merge(m, src)
243}
244func (m *AddSecretVersionRequest) XXX_Size() int {
245	return xxx_messageInfo_AddSecretVersionRequest.Size(m)
246}
247func (m *AddSecretVersionRequest) XXX_DiscardUnknown() {
248	xxx_messageInfo_AddSecretVersionRequest.DiscardUnknown(m)
249}
250
251var xxx_messageInfo_AddSecretVersionRequest proto.InternalMessageInfo
252
253func (m *AddSecretVersionRequest) GetParent() string {
254	if m != nil {
255		return m.Parent
256	}
257	return ""
258}
259
260func (m *AddSecretVersionRequest) GetPayload() *SecretPayload {
261	if m != nil {
262		return m.Payload
263	}
264	return nil
265}
266
267// Request message for [SecretManagerService.GetSecret][google.cloud.secrets.v1beta1.SecretManagerService.GetSecret].
268type GetSecretRequest struct {
269	// Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`.
270	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
271	XXX_NoUnkeyedLiteral struct{} `json:"-"`
272	XXX_unrecognized     []byte   `json:"-"`
273	XXX_sizecache        int32    `json:"-"`
274}
275
276func (m *GetSecretRequest) Reset()         { *m = GetSecretRequest{} }
277func (m *GetSecretRequest) String() string { return proto.CompactTextString(m) }
278func (*GetSecretRequest) ProtoMessage()    {}
279func (*GetSecretRequest) Descriptor() ([]byte, []int) {
280	return fileDescriptor_67a0e1a61a378c59, []int{4}
281}
282
283func (m *GetSecretRequest) XXX_Unmarshal(b []byte) error {
284	return xxx_messageInfo_GetSecretRequest.Unmarshal(m, b)
285}
286func (m *GetSecretRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
287	return xxx_messageInfo_GetSecretRequest.Marshal(b, m, deterministic)
288}
289func (m *GetSecretRequest) XXX_Merge(src proto.Message) {
290	xxx_messageInfo_GetSecretRequest.Merge(m, src)
291}
292func (m *GetSecretRequest) XXX_Size() int {
293	return xxx_messageInfo_GetSecretRequest.Size(m)
294}
295func (m *GetSecretRequest) XXX_DiscardUnknown() {
296	xxx_messageInfo_GetSecretRequest.DiscardUnknown(m)
297}
298
299var xxx_messageInfo_GetSecretRequest proto.InternalMessageInfo
300
301func (m *GetSecretRequest) GetName() string {
302	if m != nil {
303		return m.Name
304	}
305	return ""
306}
307
308// Request message for [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions].
309type ListSecretVersionsRequest struct {
310	// Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the
311	// [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format
312	// `projects/*/secrets/*`.
313	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
314	// Optional. The maximum number of results to be returned in a single page. If
315	// set to 0, the server decides the number of results to return. If the
316	// number is greater than 25000, it is capped at 25000.
317	PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"`
318	// Optional. Pagination token, returned earlier via
319	// ListSecretVersionsResponse.next_page_token][].
320	PageToken            string   `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"`
321	XXX_NoUnkeyedLiteral struct{} `json:"-"`
322	XXX_unrecognized     []byte   `json:"-"`
323	XXX_sizecache        int32    `json:"-"`
324}
325
326func (m *ListSecretVersionsRequest) Reset()         { *m = ListSecretVersionsRequest{} }
327func (m *ListSecretVersionsRequest) String() string { return proto.CompactTextString(m) }
328func (*ListSecretVersionsRequest) ProtoMessage()    {}
329func (*ListSecretVersionsRequest) Descriptor() ([]byte, []int) {
330	return fileDescriptor_67a0e1a61a378c59, []int{5}
331}
332
333func (m *ListSecretVersionsRequest) XXX_Unmarshal(b []byte) error {
334	return xxx_messageInfo_ListSecretVersionsRequest.Unmarshal(m, b)
335}
336func (m *ListSecretVersionsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
337	return xxx_messageInfo_ListSecretVersionsRequest.Marshal(b, m, deterministic)
338}
339func (m *ListSecretVersionsRequest) XXX_Merge(src proto.Message) {
340	xxx_messageInfo_ListSecretVersionsRequest.Merge(m, src)
341}
342func (m *ListSecretVersionsRequest) XXX_Size() int {
343	return xxx_messageInfo_ListSecretVersionsRequest.Size(m)
344}
345func (m *ListSecretVersionsRequest) XXX_DiscardUnknown() {
346	xxx_messageInfo_ListSecretVersionsRequest.DiscardUnknown(m)
347}
348
349var xxx_messageInfo_ListSecretVersionsRequest proto.InternalMessageInfo
350
351func (m *ListSecretVersionsRequest) GetParent() string {
352	if m != nil {
353		return m.Parent
354	}
355	return ""
356}
357
358func (m *ListSecretVersionsRequest) GetPageSize() int32 {
359	if m != nil {
360		return m.PageSize
361	}
362	return 0
363}
364
365func (m *ListSecretVersionsRequest) GetPageToken() string {
366	if m != nil {
367		return m.PageToken
368	}
369	return ""
370}
371
372// Response message for [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions].
373type ListSecretVersionsResponse struct {
374	// The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
375	// create_time (newest first).
376	Versions []*SecretVersion `protobuf:"bytes,1,rep,name=versions,proto3" json:"versions,omitempty"`
377	// A token to retrieve the next page of results. Pass this value in
378	// [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page.
379	NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"`
380	// The total number of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
381	TotalSize            int32    `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"`
382	XXX_NoUnkeyedLiteral struct{} `json:"-"`
383	XXX_unrecognized     []byte   `json:"-"`
384	XXX_sizecache        int32    `json:"-"`
385}
386
387func (m *ListSecretVersionsResponse) Reset()         { *m = ListSecretVersionsResponse{} }
388func (m *ListSecretVersionsResponse) String() string { return proto.CompactTextString(m) }
389func (*ListSecretVersionsResponse) ProtoMessage()    {}
390func (*ListSecretVersionsResponse) Descriptor() ([]byte, []int) {
391	return fileDescriptor_67a0e1a61a378c59, []int{6}
392}
393
394func (m *ListSecretVersionsResponse) XXX_Unmarshal(b []byte) error {
395	return xxx_messageInfo_ListSecretVersionsResponse.Unmarshal(m, b)
396}
397func (m *ListSecretVersionsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
398	return xxx_messageInfo_ListSecretVersionsResponse.Marshal(b, m, deterministic)
399}
400func (m *ListSecretVersionsResponse) XXX_Merge(src proto.Message) {
401	xxx_messageInfo_ListSecretVersionsResponse.Merge(m, src)
402}
403func (m *ListSecretVersionsResponse) XXX_Size() int {
404	return xxx_messageInfo_ListSecretVersionsResponse.Size(m)
405}
406func (m *ListSecretVersionsResponse) XXX_DiscardUnknown() {
407	xxx_messageInfo_ListSecretVersionsResponse.DiscardUnknown(m)
408}
409
410var xxx_messageInfo_ListSecretVersionsResponse proto.InternalMessageInfo
411
412func (m *ListSecretVersionsResponse) GetVersions() []*SecretVersion {
413	if m != nil {
414		return m.Versions
415	}
416	return nil
417}
418
419func (m *ListSecretVersionsResponse) GetNextPageToken() string {
420	if m != nil {
421		return m.NextPageToken
422	}
423	return ""
424}
425
426func (m *ListSecretVersionsResponse) GetTotalSize() int32 {
427	if m != nil {
428		return m.TotalSize
429	}
430	return 0
431}
432
433// Request message for [SecretManagerService.GetSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.GetSecretVersion].
434type GetSecretVersionRequest struct {
435	// Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
436	// `projects/*/secrets/*/versions/*`.
437	// `projects/*/secrets/*/versions/latest` is an alias to the `latest`
438	// [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
439	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
440	XXX_NoUnkeyedLiteral struct{} `json:"-"`
441	XXX_unrecognized     []byte   `json:"-"`
442	XXX_sizecache        int32    `json:"-"`
443}
444
445func (m *GetSecretVersionRequest) Reset()         { *m = GetSecretVersionRequest{} }
446func (m *GetSecretVersionRequest) String() string { return proto.CompactTextString(m) }
447func (*GetSecretVersionRequest) ProtoMessage()    {}
448func (*GetSecretVersionRequest) Descriptor() ([]byte, []int) {
449	return fileDescriptor_67a0e1a61a378c59, []int{7}
450}
451
452func (m *GetSecretVersionRequest) XXX_Unmarshal(b []byte) error {
453	return xxx_messageInfo_GetSecretVersionRequest.Unmarshal(m, b)
454}
455func (m *GetSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
456	return xxx_messageInfo_GetSecretVersionRequest.Marshal(b, m, deterministic)
457}
458func (m *GetSecretVersionRequest) XXX_Merge(src proto.Message) {
459	xxx_messageInfo_GetSecretVersionRequest.Merge(m, src)
460}
461func (m *GetSecretVersionRequest) XXX_Size() int {
462	return xxx_messageInfo_GetSecretVersionRequest.Size(m)
463}
464func (m *GetSecretVersionRequest) XXX_DiscardUnknown() {
465	xxx_messageInfo_GetSecretVersionRequest.DiscardUnknown(m)
466}
467
468var xxx_messageInfo_GetSecretVersionRequest proto.InternalMessageInfo
469
470func (m *GetSecretVersionRequest) GetName() string {
471	if m != nil {
472		return m.Name
473	}
474	return ""
475}
476
477// Request message for [SecretManagerService.UpdateSecret][google.cloud.secrets.v1beta1.SecretManagerService.UpdateSecret].
478type UpdateSecretRequest struct {
479	// Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
480	Secret *Secret `protobuf:"bytes,1,opt,name=secret,proto3" json:"secret,omitempty"`
481	// Required. Specifies the fields to be updated.
482	UpdateMask           *field_mask.FieldMask `protobuf:"bytes,2,opt,name=update_mask,json=updateMask,proto3" json:"update_mask,omitempty"`
483	XXX_NoUnkeyedLiteral struct{}              `json:"-"`
484	XXX_unrecognized     []byte                `json:"-"`
485	XXX_sizecache        int32                 `json:"-"`
486}
487
488func (m *UpdateSecretRequest) Reset()         { *m = UpdateSecretRequest{} }
489func (m *UpdateSecretRequest) String() string { return proto.CompactTextString(m) }
490func (*UpdateSecretRequest) ProtoMessage()    {}
491func (*UpdateSecretRequest) Descriptor() ([]byte, []int) {
492	return fileDescriptor_67a0e1a61a378c59, []int{8}
493}
494
495func (m *UpdateSecretRequest) XXX_Unmarshal(b []byte) error {
496	return xxx_messageInfo_UpdateSecretRequest.Unmarshal(m, b)
497}
498func (m *UpdateSecretRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
499	return xxx_messageInfo_UpdateSecretRequest.Marshal(b, m, deterministic)
500}
501func (m *UpdateSecretRequest) XXX_Merge(src proto.Message) {
502	xxx_messageInfo_UpdateSecretRequest.Merge(m, src)
503}
504func (m *UpdateSecretRequest) XXX_Size() int {
505	return xxx_messageInfo_UpdateSecretRequest.Size(m)
506}
507func (m *UpdateSecretRequest) XXX_DiscardUnknown() {
508	xxx_messageInfo_UpdateSecretRequest.DiscardUnknown(m)
509}
510
511var xxx_messageInfo_UpdateSecretRequest proto.InternalMessageInfo
512
513func (m *UpdateSecretRequest) GetSecret() *Secret {
514	if m != nil {
515		return m.Secret
516	}
517	return nil
518}
519
520func (m *UpdateSecretRequest) GetUpdateMask() *field_mask.FieldMask {
521	if m != nil {
522		return m.UpdateMask
523	}
524	return nil
525}
526
527// Request message for [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion].
528type AccessSecretVersionRequest struct {
529	// Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
530	// `projects/*/secrets/*/versions/*`.
531	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
532	XXX_NoUnkeyedLiteral struct{} `json:"-"`
533	XXX_unrecognized     []byte   `json:"-"`
534	XXX_sizecache        int32    `json:"-"`
535}
536
537func (m *AccessSecretVersionRequest) Reset()         { *m = AccessSecretVersionRequest{} }
538func (m *AccessSecretVersionRequest) String() string { return proto.CompactTextString(m) }
539func (*AccessSecretVersionRequest) ProtoMessage()    {}
540func (*AccessSecretVersionRequest) Descriptor() ([]byte, []int) {
541	return fileDescriptor_67a0e1a61a378c59, []int{9}
542}
543
544func (m *AccessSecretVersionRequest) XXX_Unmarshal(b []byte) error {
545	return xxx_messageInfo_AccessSecretVersionRequest.Unmarshal(m, b)
546}
547func (m *AccessSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
548	return xxx_messageInfo_AccessSecretVersionRequest.Marshal(b, m, deterministic)
549}
550func (m *AccessSecretVersionRequest) XXX_Merge(src proto.Message) {
551	xxx_messageInfo_AccessSecretVersionRequest.Merge(m, src)
552}
553func (m *AccessSecretVersionRequest) XXX_Size() int {
554	return xxx_messageInfo_AccessSecretVersionRequest.Size(m)
555}
556func (m *AccessSecretVersionRequest) XXX_DiscardUnknown() {
557	xxx_messageInfo_AccessSecretVersionRequest.DiscardUnknown(m)
558}
559
560var xxx_messageInfo_AccessSecretVersionRequest proto.InternalMessageInfo
561
562func (m *AccessSecretVersionRequest) GetName() string {
563	if m != nil {
564		return m.Name
565	}
566	return ""
567}
568
569// Response message for [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion].
570type AccessSecretVersionResponse struct {
571	// The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
572	// `projects/*/secrets/*/versions/*`.
573	Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
574	// Secret payload
575	Payload              *SecretPayload `protobuf:"bytes,2,opt,name=payload,proto3" json:"payload,omitempty"`
576	XXX_NoUnkeyedLiteral struct{}       `json:"-"`
577	XXX_unrecognized     []byte         `json:"-"`
578	XXX_sizecache        int32          `json:"-"`
579}
580
581func (m *AccessSecretVersionResponse) Reset()         { *m = AccessSecretVersionResponse{} }
582func (m *AccessSecretVersionResponse) String() string { return proto.CompactTextString(m) }
583func (*AccessSecretVersionResponse) ProtoMessage()    {}
584func (*AccessSecretVersionResponse) Descriptor() ([]byte, []int) {
585	return fileDescriptor_67a0e1a61a378c59, []int{10}
586}
587
588func (m *AccessSecretVersionResponse) XXX_Unmarshal(b []byte) error {
589	return xxx_messageInfo_AccessSecretVersionResponse.Unmarshal(m, b)
590}
591func (m *AccessSecretVersionResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
592	return xxx_messageInfo_AccessSecretVersionResponse.Marshal(b, m, deterministic)
593}
594func (m *AccessSecretVersionResponse) XXX_Merge(src proto.Message) {
595	xxx_messageInfo_AccessSecretVersionResponse.Merge(m, src)
596}
597func (m *AccessSecretVersionResponse) XXX_Size() int {
598	return xxx_messageInfo_AccessSecretVersionResponse.Size(m)
599}
600func (m *AccessSecretVersionResponse) XXX_DiscardUnknown() {
601	xxx_messageInfo_AccessSecretVersionResponse.DiscardUnknown(m)
602}
603
604var xxx_messageInfo_AccessSecretVersionResponse proto.InternalMessageInfo
605
606func (m *AccessSecretVersionResponse) GetName() string {
607	if m != nil {
608		return m.Name
609	}
610	return ""
611}
612
613func (m *AccessSecretVersionResponse) GetPayload() *SecretPayload {
614	if m != nil {
615		return m.Payload
616	}
617	return nil
618}
619
620// Request message for [SecretManagerService.DeleteSecret][google.cloud.secrets.v1beta1.SecretManagerService.DeleteSecret].
621type DeleteSecretRequest struct {
622	// Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format
623	// `projects/*/secrets/*`.
624	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
625	XXX_NoUnkeyedLiteral struct{} `json:"-"`
626	XXX_unrecognized     []byte   `json:"-"`
627	XXX_sizecache        int32    `json:"-"`
628}
629
630func (m *DeleteSecretRequest) Reset()         { *m = DeleteSecretRequest{} }
631func (m *DeleteSecretRequest) String() string { return proto.CompactTextString(m) }
632func (*DeleteSecretRequest) ProtoMessage()    {}
633func (*DeleteSecretRequest) Descriptor() ([]byte, []int) {
634	return fileDescriptor_67a0e1a61a378c59, []int{11}
635}
636
637func (m *DeleteSecretRequest) XXX_Unmarshal(b []byte) error {
638	return xxx_messageInfo_DeleteSecretRequest.Unmarshal(m, b)
639}
640func (m *DeleteSecretRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
641	return xxx_messageInfo_DeleteSecretRequest.Marshal(b, m, deterministic)
642}
643func (m *DeleteSecretRequest) XXX_Merge(src proto.Message) {
644	xxx_messageInfo_DeleteSecretRequest.Merge(m, src)
645}
646func (m *DeleteSecretRequest) XXX_Size() int {
647	return xxx_messageInfo_DeleteSecretRequest.Size(m)
648}
649func (m *DeleteSecretRequest) XXX_DiscardUnknown() {
650	xxx_messageInfo_DeleteSecretRequest.DiscardUnknown(m)
651}
652
653var xxx_messageInfo_DeleteSecretRequest proto.InternalMessageInfo
654
655func (m *DeleteSecretRequest) GetName() string {
656	if m != nil {
657		return m.Name
658	}
659	return ""
660}
661
662// Request message for [SecretManagerService.DisableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DisableSecretVersion].
663type DisableSecretVersionRequest struct {
664	// Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format
665	// `projects/*/secrets/*/versions/*`.
666	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
667	XXX_NoUnkeyedLiteral struct{} `json:"-"`
668	XXX_unrecognized     []byte   `json:"-"`
669	XXX_sizecache        int32    `json:"-"`
670}
671
672func (m *DisableSecretVersionRequest) Reset()         { *m = DisableSecretVersionRequest{} }
673func (m *DisableSecretVersionRequest) String() string { return proto.CompactTextString(m) }
674func (*DisableSecretVersionRequest) ProtoMessage()    {}
675func (*DisableSecretVersionRequest) Descriptor() ([]byte, []int) {
676	return fileDescriptor_67a0e1a61a378c59, []int{12}
677}
678
679func (m *DisableSecretVersionRequest) XXX_Unmarshal(b []byte) error {
680	return xxx_messageInfo_DisableSecretVersionRequest.Unmarshal(m, b)
681}
682func (m *DisableSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
683	return xxx_messageInfo_DisableSecretVersionRequest.Marshal(b, m, deterministic)
684}
685func (m *DisableSecretVersionRequest) XXX_Merge(src proto.Message) {
686	xxx_messageInfo_DisableSecretVersionRequest.Merge(m, src)
687}
688func (m *DisableSecretVersionRequest) XXX_Size() int {
689	return xxx_messageInfo_DisableSecretVersionRequest.Size(m)
690}
691func (m *DisableSecretVersionRequest) XXX_DiscardUnknown() {
692	xxx_messageInfo_DisableSecretVersionRequest.DiscardUnknown(m)
693}
694
695var xxx_messageInfo_DisableSecretVersionRequest proto.InternalMessageInfo
696
697func (m *DisableSecretVersionRequest) GetName() string {
698	if m != nil {
699		return m.Name
700	}
701	return ""
702}
703
704// Request message for [SecretManagerService.EnableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.EnableSecretVersion].
705type EnableSecretVersionRequest struct {
706	// Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format
707	// `projects/*/secrets/*/versions/*`.
708	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
709	XXX_NoUnkeyedLiteral struct{} `json:"-"`
710	XXX_unrecognized     []byte   `json:"-"`
711	XXX_sizecache        int32    `json:"-"`
712}
713
714func (m *EnableSecretVersionRequest) Reset()         { *m = EnableSecretVersionRequest{} }
715func (m *EnableSecretVersionRequest) String() string { return proto.CompactTextString(m) }
716func (*EnableSecretVersionRequest) ProtoMessage()    {}
717func (*EnableSecretVersionRequest) Descriptor() ([]byte, []int) {
718	return fileDescriptor_67a0e1a61a378c59, []int{13}
719}
720
721func (m *EnableSecretVersionRequest) XXX_Unmarshal(b []byte) error {
722	return xxx_messageInfo_EnableSecretVersionRequest.Unmarshal(m, b)
723}
724func (m *EnableSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
725	return xxx_messageInfo_EnableSecretVersionRequest.Marshal(b, m, deterministic)
726}
727func (m *EnableSecretVersionRequest) XXX_Merge(src proto.Message) {
728	xxx_messageInfo_EnableSecretVersionRequest.Merge(m, src)
729}
730func (m *EnableSecretVersionRequest) XXX_Size() int {
731	return xxx_messageInfo_EnableSecretVersionRequest.Size(m)
732}
733func (m *EnableSecretVersionRequest) XXX_DiscardUnknown() {
734	xxx_messageInfo_EnableSecretVersionRequest.DiscardUnknown(m)
735}
736
737var xxx_messageInfo_EnableSecretVersionRequest proto.InternalMessageInfo
738
739func (m *EnableSecretVersionRequest) GetName() string {
740	if m != nil {
741		return m.Name
742	}
743	return ""
744}
745
746// Request message for [SecretManagerService.DestroySecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DestroySecretVersion].
747type DestroySecretVersionRequest struct {
748	// Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format
749	// `projects/*/secrets/*/versions/*`.
750	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
751	XXX_NoUnkeyedLiteral struct{} `json:"-"`
752	XXX_unrecognized     []byte   `json:"-"`
753	XXX_sizecache        int32    `json:"-"`
754}
755
756func (m *DestroySecretVersionRequest) Reset()         { *m = DestroySecretVersionRequest{} }
757func (m *DestroySecretVersionRequest) String() string { return proto.CompactTextString(m) }
758func (*DestroySecretVersionRequest) ProtoMessage()    {}
759func (*DestroySecretVersionRequest) Descriptor() ([]byte, []int) {
760	return fileDescriptor_67a0e1a61a378c59, []int{14}
761}
762
763func (m *DestroySecretVersionRequest) XXX_Unmarshal(b []byte) error {
764	return xxx_messageInfo_DestroySecretVersionRequest.Unmarshal(m, b)
765}
766func (m *DestroySecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
767	return xxx_messageInfo_DestroySecretVersionRequest.Marshal(b, m, deterministic)
768}
769func (m *DestroySecretVersionRequest) XXX_Merge(src proto.Message) {
770	xxx_messageInfo_DestroySecretVersionRequest.Merge(m, src)
771}
772func (m *DestroySecretVersionRequest) XXX_Size() int {
773	return xxx_messageInfo_DestroySecretVersionRequest.Size(m)
774}
775func (m *DestroySecretVersionRequest) XXX_DiscardUnknown() {
776	xxx_messageInfo_DestroySecretVersionRequest.DiscardUnknown(m)
777}
778
779var xxx_messageInfo_DestroySecretVersionRequest proto.InternalMessageInfo
780
781func (m *DestroySecretVersionRequest) GetName() string {
782	if m != nil {
783		return m.Name
784	}
785	return ""
786}
787
788func init() {
789	proto.RegisterType((*ListSecretsRequest)(nil), "google.cloud.secrets.v1beta1.ListSecretsRequest")
790	proto.RegisterType((*ListSecretsResponse)(nil), "google.cloud.secrets.v1beta1.ListSecretsResponse")
791	proto.RegisterType((*CreateSecretRequest)(nil), "google.cloud.secrets.v1beta1.CreateSecretRequest")
792	proto.RegisterType((*AddSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.AddSecretVersionRequest")
793	proto.RegisterType((*GetSecretRequest)(nil), "google.cloud.secrets.v1beta1.GetSecretRequest")
794	proto.RegisterType((*ListSecretVersionsRequest)(nil), "google.cloud.secrets.v1beta1.ListSecretVersionsRequest")
795	proto.RegisterType((*ListSecretVersionsResponse)(nil), "google.cloud.secrets.v1beta1.ListSecretVersionsResponse")
796	proto.RegisterType((*GetSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.GetSecretVersionRequest")
797	proto.RegisterType((*UpdateSecretRequest)(nil), "google.cloud.secrets.v1beta1.UpdateSecretRequest")
798	proto.RegisterType((*AccessSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.AccessSecretVersionRequest")
799	proto.RegisterType((*AccessSecretVersionResponse)(nil), "google.cloud.secrets.v1beta1.AccessSecretVersionResponse")
800	proto.RegisterType((*DeleteSecretRequest)(nil), "google.cloud.secrets.v1beta1.DeleteSecretRequest")
801	proto.RegisterType((*DisableSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.DisableSecretVersionRequest")
802	proto.RegisterType((*EnableSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.EnableSecretVersionRequest")
803	proto.RegisterType((*DestroySecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.DestroySecretVersionRequest")
804}
805
806func init() {
807	proto.RegisterFile("google/cloud/secrets/v1beta1/service.proto", fileDescriptor_67a0e1a61a378c59)
808}
809
810var fileDescriptor_67a0e1a61a378c59 = []byte{
811	// 1369 bytes of a gzipped FileDescriptorProto
812	0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xbc, 0x58, 0xcb, 0x6f, 0x1b, 0x45,
813	0x18, 0xd7, 0x38, 0xf4, 0x91, 0x89, 0x81, 0x6a, 0x5c, 0x9a, 0x74, 0x5b, 0x20, 0x5a, 0xda, 0x2a,
814	0x38, 0xe9, 0x2e, 0x4e, 0x95, 0xb6, 0x6c, 0x1f, 0x64, 0x93, 0xa6, 0xa6, 0x40, 0xc0, 0xb2, 0x4b,
815	0x0e, 0xa8, 0x52, 0x34, 0xf1, 0x4e, 0xdd, 0xa5, 0xf6, 0xee, 0xb2, 0x33, 0x76, 0x69, 0x51, 0x2f,
816	0xc0, 0x01, 0x09, 0x89, 0x0b, 0x12, 0x07, 0xc4, 0x89, 0x03, 0xa8, 0x15, 0x17, 0x2e, 0x20, 0xae,
817	0x48, 0x20, 0xd1, 0x1b, 0x70, 0xcb, 0xa9, 0x07, 0x4e, 0xfc, 0x05, 0x88, 0x13, 0xda, 0x79, 0xd8,
818	0xbb, 0x7e, 0xae, 0xdb, 0x84, 0x53, 0x9c, 0xef, 0x31, 0xdf, 0xef, 0x7b, 0x7f, 0x36, 0xcc, 0xd7,
819	0x7c, 0xbf, 0x56, 0x27, 0x66, 0xb5, 0xee, 0x37, 0x1d, 0x93, 0x92, 0x6a, 0x48, 0x18, 0x35, 0x5b,
820	0x85, 0x2d, 0xc2, 0x70, 0xc1, 0xa4, 0x24, 0x6c, 0xb9, 0x55, 0x62, 0x04, 0xa1, 0xcf, 0x7c, 0x74,
821	0x54, 0xc8, 0x1a, 0x5c, 0xd6, 0x90, 0xb2, 0x86, 0x94, 0xd5, 0x24, 0xd7, 0xc4, 0x81, 0x6b, 0x62,
822	0xcf, 0xf3, 0x19, 0x66, 0xae, 0xef, 0x51, 0xa1, 0xab, 0x4d, 0xc7, 0xb8, 0xd5, 0xba, 0x4b, 0x3c,
823	0x26, 0x19, 0xcf, 0xc7, 0x18, 0xd7, 0x5d, 0x52, 0x77, 0x36, 0xb7, 0xc8, 0x0d, 0xdc, 0x72, 0xfd,
824	0x50, 0x0a, 0x1c, 0x8e, 0x09, 0x84, 0x84, 0xfa, 0xcd, 0x50, 0x01, 0xd2, 0x16, 0x86, 0x82, 0x57,
825	0xc2, 0x0a, 0xc2, 0x73, 0x52, 0xda, 0xc5, 0x0d, 0xb3, 0x55, 0x88, 0xfe, 0x6c, 0x06, 0x7e, 0xdd,
826	0xad, 0xde, 0x96, 0x7c, 0x2d, 0xc9, 0x4f, 0xf0, 0x8e, 0x48, 0x1e, 0xff, 0x6f, 0xab, 0x79, 0xdd,
827	0x24, 0x8d, 0x80, 0x29, 0xe6, 0x6c, 0x37, 0x53, 0xf8, 0xd1, 0xc0, 0xf4, 0xa6, 0x90, 0xd0, 0xbf,
828	0x05, 0x10, 0xbd, 0xe1, 0x52, 0x56, 0x11, 0x10, 0xcb, 0xe4, 0xbd, 0x26, 0xa1, 0x0c, 0xbd, 0x0e,
829	0xf7, 0x06, 0x38, 0x24, 0x1e, 0x9b, 0x01, 0xb3, 0x60, 0x6e, 0x72, 0xe5, 0xd4, 0x43, 0x3b, 0xf3,
830	0xaf, 0x7d, 0x12, 0xce, 0x73, 0x87, 0x14, 0xfe, 0x06, 0xf6, 0x70, 0x8d, 0x84, 0x86, 0xb0, 0x82,
831	0x03, 0x97, 0x1a, 0x55, 0xbf, 0x61, 0x96, 0x42, 0xff, 0x5d, 0x52, 0x65, 0x65, 0xf9, 0x04, 0x9a,
832	0x85, 0x93, 0x01, 0xae, 0x91, 0x4d, 0xea, 0xde, 0x21, 0x33, 0x99, 0x59, 0x30, 0xb7, 0x67, 0x65,
833	0xe2, 0xa1, 0x0d, 0xca, 0xfb, 0x23, 0x6a, 0xc5, 0xbd, 0x43, 0x90, 0x0e, 0x21, 0x97, 0x60, 0xfe,
834	0x4d, 0xe2, 0xcd, 0x4c, 0x70, 0x93, 0x5c, 0x84, 0x2b, 0x5e, 0x8d, 0xa8, 0xfa, 0x57, 0x00, 0xe6,
835	0x12, 0x48, 0x69, 0xe0, 0x7b, 0x94, 0xa0, 0x8b, 0x70, 0x9f, 0x8c, 0xef, 0x0c, 0x98, 0x9d, 0x98,
836	0x9b, 0x5a, 0x3c, 0x66, 0x0c, 0xab, 0x06, 0x43, 0xe8, 0x97, 0x95, 0x12, 0x3a, 0x01, 0x9f, 0xf6,
837	0xc8, 0xfb, 0x6c, 0x33, 0x06, 0x20, 0xc2, 0x38, 0x59, 0x7e, 0x32, 0x22, 0x97, 0x94, 0x7d, 0xf4,
838	0x2c, 0x84, 0xcc, 0x67, 0xb8, 0x2e, 0xdc, 0x88, 0x30, 0xee, 0x29, 0x4f, 0x72, 0x4a, 0xe4, 0x82,
839	0xfe, 0x33, 0x80, 0xb9, 0xd5, 0x90, 0x60, 0x46, 0xa4, 0x81, 0x5d, 0x8a, 0xa4, 0x80, 0xbd, 0xe9,
840	0x3a, 0x02, 0x65, 0x14, 0xa6, 0x4c, 0x79, 0xbf, 0xa0, 0x5e, 0x71, 0xd0, 0x79, 0xb8, 0x57, 0x7c,
841	0xe6, 0x08, 0xd3, 0x06, 0x43, 0xea, 0xe8, 0xf7, 0x01, 0x9c, 0xb6, 0x1d, 0x47, 0x50, 0x37, 0x48,
842	0x48, 0x5d, 0xdf, 0x53, 0x8e, 0xac, 0x76, 0x39, 0x32, 0xcf, 0x1d, 0x39, 0x0e, 0x5f, 0x10, 0xba,
843	0x03, 0x3c, 0x50, 0x06, 0xa4, 0x03, 0xaf, 0xc1, 0x7d, 0x01, 0xbe, 0x5d, 0xf7, 0xb1, 0x80, 0x3f,
844	0xb5, 0x38, 0x9f, 0x06, 0x5f, 0x49, 0xa8, 0x08, 0x5f, 0xd5, 0x03, 0x7a, 0x05, 0x1e, 0x28, 0x12,
845	0x96, 0x8c, 0xf6, 0x2b, 0xf0, 0x09, 0x0f, 0x37, 0xc8, 0xa3, 0x40, 0xe4, 0x8a, 0xfa, 0x37, 0x00,
846	0x1e, 0xee, 0x54, 0x99, 0x0c, 0x01, 0xdd, 0xd1, 0x18, 0xec, 0x4c, 0x3b, 0x7c, 0x07, 0xa0, 0xd6,
847	0x0f, 0xa8, 0xec, 0x8a, 0x22, 0xdc, 0xdf, 0x92, 0x34, 0xd9, 0x16, 0xa9, 0x22, 0xad, 0x72, 0xde,
848	0x56, 0xde, 0xa9, 0xf6, 0xc0, 0x70, 0xba, 0x9d, 0xac, 0xae, 0xc2, 0xba, 0x9c, 0xc8, 0xd9, 0x22,
849	0x0f, 0xe9, 0x02, 0xcc, 0xa7, 0x08, 0xa9, 0x7a, 0x48, 0xa4, 0xee, 0x4b, 0x00, 0x73, 0x6f, 0x07,
850	0x4e, 0x4f, 0x07, 0xda, 0xed, 0x96, 0x00, 0xe9, 0x5b, 0x42, 0xd4, 0x9a, 0x54, 0x44, 0xcb, 0x70,
851	0xaa, 0xc9, 0x5f, 0xe6, 0xa3, 0x53, 0x96, 0xae, 0xa6, 0xde, 0x51, 0xd3, 0xd5, 0xb8, 0x1c, 0x4d,
852	0xd7, 0x75, 0x4c, 0x6f, 0x0a, 0x6d, 0x28, 0x74, 0x22, 0x82, 0xee, 0x40, 0xcd, 0xae, 0x56, 0x09,
853	0xa5, 0xbb, 0x1a, 0x82, 0x7b, 0x00, 0x1e, 0xe9, 0x6b, 0x46, 0x56, 0xc5, 0x6a, 0xc2, 0x8e, 0xf9,
854	0x48, 0x46, 0xd0, 0xda, 0xe3, 0xf4, 0x70, 0xa7, 0x7d, 0x37, 0x60, 0xee, 0x12, 0xa9, 0x93, 0xee,
855	0x6c, 0x3d, 0x76, 0x07, 0x13, 0x78, 0xe4, 0x92, 0x4b, 0xf1, 0x56, 0x9d, 0xec, 0x6a, 0xa8, 0x1d,
856	0xa8, 0xad, 0x79, 0xbb, 0x6e, 0x25, 0x72, 0x86, 0x50, 0x16, 0xfa, 0xb7, 0x77, 0xd3, 0xcc, 0xe2,
857	0x47, 0x87, 0xe0, 0x41, 0x41, 0x5f, 0x17, 0x4a, 0x15, 0x71, 0x5e, 0xa1, 0x7b, 0x00, 0x4e, 0xc5,
858	0x96, 0x2e, 0x7a, 0x69, 0x78, 0xaa, 0x7b, 0x2f, 0x09, 0xad, 0x30, 0x86, 0x86, 0xa8, 0x52, 0x7d,
859	0x69, 0xdb, 0x96, 0xb3, 0xf2, 0xc3, 0x3f, 0xff, 0xfa, 0x3c, 0x73, 0x02, 0x1d, 0x6b, 0x5f, 0x4e,
860	0x1f, 0x08, 0xfa, 0x85, 0x40, 0x2c, 0x46, 0x6a, 0xe6, 0xef, 0xaa, 0xeb, 0x0a, 0xfd, 0x08, 0x60,
861	0x36, 0xbe, 0x81, 0xd1, 0x08, 0xd3, 0x7d, 0xb6, 0xb5, 0x96, 0x6a, 0x36, 0xe8, 0x6f, 0x6e, 0xdb,
862	0xd3, 0x02, 0xc8, 0x42, 0x7b, 0x1d, 0xcb, 0x4f, 0x1c, 0xb1, 0xa1, 0xa7, 0x42, 0x6c, 0xa9, 0xf1,
863	0xf2, 0x0b, 0x80, 0x07, 0xba, 0xd7, 0x2e, 0x5a, 0x1a, 0x0e, 0x65, 0xc0, 0x9a, 0xd6, 0xc6, 0x19,
864	0xf3, 0xfa, 0xfa, 0xb6, 0xfd, 0x94, 0x74, 0x44, 0xb6, 0x25, 0xc7, 0x7f, 0x5a, 0x2f, 0x0c, 0xc1,
865	0xdf, 0x3e, 0x67, 0xf3, 0x77, 0x2d, 0xec, 0x38, 0xf2, 0x2d, 0x0b, 0xe4, 0xd1, 0x17, 0x00, 0x4e,
866	0xb6, 0xa7, 0x3c, 0x32, 0x86, 0x23, 0xe9, 0xde, 0xdd, 0x29, 0x63, 0x7f, 0x6a, 0xdb, 0xe6, 0x35,
867	0xdb, 0x5b, 0x1a, 0x11, 0xb5, 0x3f, 0x4c, 0xf4, 0x13, 0x80, 0xd9, 0xf8, 0x6a, 0x18, 0x55, 0x1a,
868	0x7d, 0xd6, 0x48, 0x4a, 0x78, 0xa5, 0x6d, 0x1b, 0x09, 0xd6, 0x42, 0x6c, 0x63, 0x70, 0xb0, 0x4b,
869	0x8b, 0xf3, 0x1d, 0xb0, 0x42, 0xc6, 0x18, 0x8c, 0xb9, 0x5d, 0x1c, 0x9f, 0x01, 0x98, 0x8d, 0x0f,
870	0xca, 0x51, 0xd8, 0xfb, 0x0c, 0x55, 0xed, 0x50, 0xcf, 0xaa, 0x5a, 0x8b, 0xbe, 0x25, 0x74, 0x05,
871	0x33, 0x9f, 0x2e, 0x98, 0xbf, 0x25, 0xbe, 0x32, 0xa8, 0xcb, 0x03, 0x9d, 0x49, 0xdb, 0xe8, 0x5d,
872	0x47, 0x95, 0x76, 0x76, 0x7c, 0x45, 0x39, 0x28, 0x96, 0x93, 0x83, 0xa2, 0x80, 0xcc, 0x74, 0x65,
873	0x6b, 0xb6, 0xaf, 0x9b, 0x1f, 0x40, 0xec, 0x88, 0x4c, 0xd9, 0x79, 0x03, 0xee, 0x98, 0xf1, 0x3a,
874	0xef, 0x62, 0x3c, 0xf2, 0x09, 0xe0, 0x03, 0x23, 0xdf, 0x46, 0x1d, 0x25, 0xe1, 0x77, 0x00, 0x73,
875	0x7d, 0x36, 0x3d, 0x1a, 0x11, 0xcc, 0xc1, 0x37, 0x88, 0xf6, 0xf2, 0x23, 0x68, 0xca, 0x3c, 0xac,
876	0xc5, 0x9d, 0x39, 0x8b, 0x4e, 0x8f, 0xe9, 0x8c, 0x85, 0xf9, 0xdb, 0x51, 0x61, 0x1d, 0xec, 0xb7,
877	0xba, 0xd1, 0x08, 0x68, 0x43, 0xd6, 0xfd, 0x78, 0x49, 0xb9, 0x12, 0xf7, 0xe3, 0xbc, 0x7e, 0x66,
878	0x5c, 0x3f, 0x1c, 0x01, 0x24, 0x1a, 0x85, 0xbf, 0x02, 0x98, 0xeb, 0x73, 0x1f, 0x8c, 0xca, 0xcf,
879	0xe0, 0x93, 0x62, 0x3c, 0x4f, 0x5e, 0x8d, 0x7b, 0x72, 0x4e, 0x1f, 0x3b, 0x23, 0xc4, 0x53, 0x8e,
880	0xf0, 0xa4, 0xf4, 0x39, 0x41, 0x46, 0x26, 0x65, 0xf0, 0xd9, 0xf2, 0x3f, 0x27, 0x45, 0x00, 0x89,
881	0x7c, 0xf9, 0x14, 0xc0, 0x6c, 0x85, 0xb0, 0x2b, 0xb8, 0x51, 0xe2, 0x3f, 0xa1, 0x20, 0x5d, 0x01,
882	0x71, 0x71, 0xc3, 0x68, 0x45, 0x96, 0x3b, 0x4c, 0x05, 0xf6, 0x99, 0x2e, 0x19, 0xc1, 0xd5, 0x97,
883	0x39, 0x1e, 0x4b, 0x5f, 0xea, 0xe0, 0x51, 0x5f, 0xe6, 0x07, 0x0c, 0x74, 0x1a, 0x7b, 0x3c, 0x42,
884	0xf3, 0x09, 0x80, 0xd9, 0xe2, 0x30, 0x34, 0xc5, 0xf4, 0x68, 0x2e, 0x70, 0x34, 0x67, 0x50, 0x7a,
885	0x34, 0xb5, 0xb8, 0xe5, 0xef, 0x01, 0x44, 0x57, 0x09, 0xe5, 0x14, 0x12, 0x36, 0x5c, 0x2a, 0xa6,
886	0xe3, 0x5c, 0x97, 0xb1, 0x5e, 0x11, 0x05, 0xeb, 0xc5, 0x14, 0x92, 0x72, 0x58, 0x5c, 0xe6, 0x50,
887	0x97, 0xf5, 0x73, 0xa9, 0xa1, 0xb2, 0x9e, 0xc7, 0x2c, 0x90, 0xd7, 0x4a, 0x0f, 0xec, 0xa3, 0xc3,
888	0x0e, 0xdd, 0x3f, 0x6c, 0xe3, 0x06, 0x63, 0x01, 0xb5, 0x4c, 0xf3, 0xd6, 0xad, 0x5b, 0xdd, 0x57,
889	0x30, 0x6e, 0xb2, 0x1b, 0xe2, 0xd7, 0xb9, 0x93, 0x41, 0x1d, 0xb3, 0xeb, 0x7e, 0xd8, 0x58, 0xf9,
890	0x38, 0x03, 0x4f, 0x54, 0xfd, 0x46, 0xbf, 0xe2, 0x54, 0x26, 0x24, 0xe4, 0x95, 0xac, 0x3c, 0x90,
891	0x4b, 0xd1, 0x3e, 0x2d, 0x81, 0x77, 0xde, 0x92, 0x3a, 0x35, 0xbf, 0x8e, 0xbd, 0x9a, 0xe1, 0x87,
892	0x35, 0xb3, 0x46, 0x3c, 0xbe, 0x6d, 0xcd, 0x8e, 0xe5, 0xc4, 0xcf, 0x81, 0xf2, 0x49, 0x15, 0x85,
893	0x73, 0x09, 0xea, 0x3f, 0x00, 0x7c, 0x9d, 0x99, 0x28, 0x56, 0xd6, 0xef, 0x67, 0xf4, 0xa2, 0x78,
894	0x7a, 0x95, 0xc3, 0x49, 0x5c, 0xe9, 0xc6, 0x46, 0x61, 0x25, 0xd2, 0x7d, 0xa0, 0x84, 0xae, 0x71,
895	0xa1, 0x6b, 0x09, 0xa1, 0x6b, 0x1b, 0xc2, 0xc0, 0xdf, 0x99, 0xe3, 0x42, 0xc8, 0xb2, 0xb8, 0x94,
896	0x65, 0x25, 0xc4, 0x2c, 0x4b, 0xca, 0x6d, 0xed, 0xe5, 0xb0, 0x4f, 0xfd, 0x17, 0x00, 0x00, 0xff,
897	0xff, 0xdd, 0x02, 0x7b, 0x01, 0x81, 0x15, 0x00, 0x00,
898}
899
900// Reference imports to suppress errors if they are not otherwise used.
901var _ context.Context
902var _ grpc.ClientConnInterface
903
904// This is a compile-time assertion to ensure that this generated file
905// is compatible with the grpc package it is being compiled against.
906const _ = grpc.SupportPackageIsVersion6
907
908// SecretManagerServiceClient is the client API for SecretManagerService service.
909//
910// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream.
911type SecretManagerServiceClient interface {
912	// Lists [Secrets][google.cloud.secrets.v1beta1.Secret].
913	ListSecrets(ctx context.Context, in *ListSecretsRequest, opts ...grpc.CallOption) (*ListSecretsResponse, error)
914	// Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
915	CreateSecret(ctx context.Context, in *CreateSecretRequest, opts ...grpc.CallOption) (*Secret, error)
916	// Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret data and attaches
917	// it to an existing [Secret][google.cloud.secrets.v1beta1.Secret].
918	AddSecretVersion(ctx context.Context, in *AddSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error)
919	// Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret].
920	GetSecret(ctx context.Context, in *GetSecretRequest, opts ...grpc.CallOption) (*Secret, error)
921	// Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret].
922	UpdateSecret(ctx context.Context, in *UpdateSecretRequest, opts ...grpc.CallOption) (*Secret, error)
923	// Deletes a [Secret][google.cloud.secrets.v1beta1.Secret].
924	DeleteSecret(ctx context.Context, in *DeleteSecretRequest, opts ...grpc.CallOption) (*empty.Empty, error)
925	// Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return secret
926	// data.
927	ListSecretVersions(ctx context.Context, in *ListSecretVersionsRequest, opts ...grpc.CallOption) (*ListSecretVersionsResponse, error)
928	// Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
929	//
930	// `projects/*/secrets/*/versions/latest` is an alias to the `latest`
931	// [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
932	GetSecretVersion(ctx context.Context, in *GetSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error)
933	// Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the secret data.
934	//
935	// `projects/*/secrets/*/versions/latest` is an alias to the `latest`
936	// [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
937	AccessSecretVersion(ctx context.Context, in *AccessSecretVersionRequest, opts ...grpc.CallOption) (*AccessSecretVersionResponse, error)
938	// Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
939	//
940	// Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
941	// [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED].
942	DisableSecretVersion(ctx context.Context, in *DisableSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error)
943	// Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
944	//
945	// Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
946	// [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED].
947	EnableSecretVersion(ctx context.Context, in *EnableSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error)
948	// Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
949	//
950	// Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
951	// [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably destroys the
952	// secret data.
953	DestroySecretVersion(ctx context.Context, in *DestroySecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error)
954	// Sets the access control policy on the specified secret. Replaces any
955	// existing policy.
956	//
957	// Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced according
958	// to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret].
959	SetIamPolicy(ctx context.Context, in *v1.SetIamPolicyRequest, opts ...grpc.CallOption) (*v1.Policy, error)
960	// Gets the access control policy for a secret.
961	// Returns empty policy if the secret exists and does not have a policy set.
962	GetIamPolicy(ctx context.Context, in *v1.GetIamPolicyRequest, opts ...grpc.CallOption) (*v1.Policy, error)
963	// Returns permissions that a caller has for the specified secret.
964	// If the secret does not exist, this call returns an empty set of
965	// permissions, not a NOT_FOUND error.
966	//
967	// Note: This operation is designed to be used for building permission-aware
968	// UIs and command-line tools, not for authorization checking. This operation
969	// may "fail open" without warning.
970	TestIamPermissions(ctx context.Context, in *v1.TestIamPermissionsRequest, opts ...grpc.CallOption) (*v1.TestIamPermissionsResponse, error)
971}
972
973type secretManagerServiceClient struct {
974	cc grpc.ClientConnInterface
975}
976
977func NewSecretManagerServiceClient(cc grpc.ClientConnInterface) SecretManagerServiceClient {
978	return &secretManagerServiceClient{cc}
979}
980
981func (c *secretManagerServiceClient) ListSecrets(ctx context.Context, in *ListSecretsRequest, opts ...grpc.CallOption) (*ListSecretsResponse, error) {
982	out := new(ListSecretsResponse)
983	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/ListSecrets", in, out, opts...)
984	if err != nil {
985		return nil, err
986	}
987	return out, nil
988}
989
990func (c *secretManagerServiceClient) CreateSecret(ctx context.Context, in *CreateSecretRequest, opts ...grpc.CallOption) (*Secret, error) {
991	out := new(Secret)
992	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/CreateSecret", in, out, opts...)
993	if err != nil {
994		return nil, err
995	}
996	return out, nil
997}
998
999func (c *secretManagerServiceClient) AddSecretVersion(ctx context.Context, in *AddSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) {
1000	out := new(SecretVersion)
1001	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/AddSecretVersion", in, out, opts...)
1002	if err != nil {
1003		return nil, err
1004	}
1005	return out, nil
1006}
1007
1008func (c *secretManagerServiceClient) GetSecret(ctx context.Context, in *GetSecretRequest, opts ...grpc.CallOption) (*Secret, error) {
1009	out := new(Secret)
1010	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/GetSecret", in, out, opts...)
1011	if err != nil {
1012		return nil, err
1013	}
1014	return out, nil
1015}
1016
1017func (c *secretManagerServiceClient) UpdateSecret(ctx context.Context, in *UpdateSecretRequest, opts ...grpc.CallOption) (*Secret, error) {
1018	out := new(Secret)
1019	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/UpdateSecret", in, out, opts...)
1020	if err != nil {
1021		return nil, err
1022	}
1023	return out, nil
1024}
1025
1026func (c *secretManagerServiceClient) DeleteSecret(ctx context.Context, in *DeleteSecretRequest, opts ...grpc.CallOption) (*empty.Empty, error) {
1027	out := new(empty.Empty)
1028	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/DeleteSecret", in, out, opts...)
1029	if err != nil {
1030		return nil, err
1031	}
1032	return out, nil
1033}
1034
1035func (c *secretManagerServiceClient) ListSecretVersions(ctx context.Context, in *ListSecretVersionsRequest, opts ...grpc.CallOption) (*ListSecretVersionsResponse, error) {
1036	out := new(ListSecretVersionsResponse)
1037	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/ListSecretVersions", in, out, opts...)
1038	if err != nil {
1039		return nil, err
1040	}
1041	return out, nil
1042}
1043
1044func (c *secretManagerServiceClient) GetSecretVersion(ctx context.Context, in *GetSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) {
1045	out := new(SecretVersion)
1046	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/GetSecretVersion", in, out, opts...)
1047	if err != nil {
1048		return nil, err
1049	}
1050	return out, nil
1051}
1052
1053func (c *secretManagerServiceClient) AccessSecretVersion(ctx context.Context, in *AccessSecretVersionRequest, opts ...grpc.CallOption) (*AccessSecretVersionResponse, error) {
1054	out := new(AccessSecretVersionResponse)
1055	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/AccessSecretVersion", in, out, opts...)
1056	if err != nil {
1057		return nil, err
1058	}
1059	return out, nil
1060}
1061
1062func (c *secretManagerServiceClient) DisableSecretVersion(ctx context.Context, in *DisableSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) {
1063	out := new(SecretVersion)
1064	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/DisableSecretVersion", in, out, opts...)
1065	if err != nil {
1066		return nil, err
1067	}
1068	return out, nil
1069}
1070
1071func (c *secretManagerServiceClient) EnableSecretVersion(ctx context.Context, in *EnableSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) {
1072	out := new(SecretVersion)
1073	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/EnableSecretVersion", in, out, opts...)
1074	if err != nil {
1075		return nil, err
1076	}
1077	return out, nil
1078}
1079
1080func (c *secretManagerServiceClient) DestroySecretVersion(ctx context.Context, in *DestroySecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) {
1081	out := new(SecretVersion)
1082	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/DestroySecretVersion", in, out, opts...)
1083	if err != nil {
1084		return nil, err
1085	}
1086	return out, nil
1087}
1088
1089func (c *secretManagerServiceClient) SetIamPolicy(ctx context.Context, in *v1.SetIamPolicyRequest, opts ...grpc.CallOption) (*v1.Policy, error) {
1090	out := new(v1.Policy)
1091	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/SetIamPolicy", in, out, opts...)
1092	if err != nil {
1093		return nil, err
1094	}
1095	return out, nil
1096}
1097
1098func (c *secretManagerServiceClient) GetIamPolicy(ctx context.Context, in *v1.GetIamPolicyRequest, opts ...grpc.CallOption) (*v1.Policy, error) {
1099	out := new(v1.Policy)
1100	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/GetIamPolicy", in, out, opts...)
1101	if err != nil {
1102		return nil, err
1103	}
1104	return out, nil
1105}
1106
1107func (c *secretManagerServiceClient) TestIamPermissions(ctx context.Context, in *v1.TestIamPermissionsRequest, opts ...grpc.CallOption) (*v1.TestIamPermissionsResponse, error) {
1108	out := new(v1.TestIamPermissionsResponse)
1109	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/TestIamPermissions", in, out, opts...)
1110	if err != nil {
1111		return nil, err
1112	}
1113	return out, nil
1114}
1115
1116// SecretManagerServiceServer is the server API for SecretManagerService service.
1117type SecretManagerServiceServer interface {
1118	// Lists [Secrets][google.cloud.secrets.v1beta1.Secret].
1119	ListSecrets(context.Context, *ListSecretsRequest) (*ListSecretsResponse, error)
1120	// Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
1121	CreateSecret(context.Context, *CreateSecretRequest) (*Secret, error)
1122	// Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret data and attaches
1123	// it to an existing [Secret][google.cloud.secrets.v1beta1.Secret].
1124	AddSecretVersion(context.Context, *AddSecretVersionRequest) (*SecretVersion, error)
1125	// Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret].
1126	GetSecret(context.Context, *GetSecretRequest) (*Secret, error)
1127	// Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret].
1128	UpdateSecret(context.Context, *UpdateSecretRequest) (*Secret, error)
1129	// Deletes a [Secret][google.cloud.secrets.v1beta1.Secret].
1130	DeleteSecret(context.Context, *DeleteSecretRequest) (*empty.Empty, error)
1131	// Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return secret
1132	// data.
1133	ListSecretVersions(context.Context, *ListSecretVersionsRequest) (*ListSecretVersionsResponse, error)
1134	// Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
1135	//
1136	// `projects/*/secrets/*/versions/latest` is an alias to the `latest`
1137	// [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
1138	GetSecretVersion(context.Context, *GetSecretVersionRequest) (*SecretVersion, error)
1139	// Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the secret data.
1140	//
1141	// `projects/*/secrets/*/versions/latest` is an alias to the `latest`
1142	// [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
1143	AccessSecretVersion(context.Context, *AccessSecretVersionRequest) (*AccessSecretVersionResponse, error)
1144	// Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
1145	//
1146	// Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
1147	// [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED].
1148	DisableSecretVersion(context.Context, *DisableSecretVersionRequest) (*SecretVersion, error)
1149	// Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
1150	//
1151	// Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
1152	// [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED].
1153	EnableSecretVersion(context.Context, *EnableSecretVersionRequest) (*SecretVersion, error)
1154	// Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
1155	//
1156	// Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
1157	// [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably destroys the
1158	// secret data.
1159	DestroySecretVersion(context.Context, *DestroySecretVersionRequest) (*SecretVersion, error)
1160	// Sets the access control policy on the specified secret. Replaces any
1161	// existing policy.
1162	//
1163	// Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced according
1164	// to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret].
1165	SetIamPolicy(context.Context, *v1.SetIamPolicyRequest) (*v1.Policy, error)
1166	// Gets the access control policy for a secret.
1167	// Returns empty policy if the secret exists and does not have a policy set.
1168	GetIamPolicy(context.Context, *v1.GetIamPolicyRequest) (*v1.Policy, error)
1169	// Returns permissions that a caller has for the specified secret.
1170	// If the secret does not exist, this call returns an empty set of
1171	// permissions, not a NOT_FOUND error.
1172	//
1173	// Note: This operation is designed to be used for building permission-aware
1174	// UIs and command-line tools, not for authorization checking. This operation
1175	// may "fail open" without warning.
1176	TestIamPermissions(context.Context, *v1.TestIamPermissionsRequest) (*v1.TestIamPermissionsResponse, error)
1177}
1178
1179// UnimplementedSecretManagerServiceServer can be embedded to have forward compatible implementations.
1180type UnimplementedSecretManagerServiceServer struct {
1181}
1182
1183func (*UnimplementedSecretManagerServiceServer) ListSecrets(ctx context.Context, req *ListSecretsRequest) (*ListSecretsResponse, error) {
1184	return nil, status.Errorf(codes.Unimplemented, "method ListSecrets not implemented")
1185}
1186func (*UnimplementedSecretManagerServiceServer) CreateSecret(ctx context.Context, req *CreateSecretRequest) (*Secret, error) {
1187	return nil, status.Errorf(codes.Unimplemented, "method CreateSecret not implemented")
1188}
1189func (*UnimplementedSecretManagerServiceServer) AddSecretVersion(ctx context.Context, req *AddSecretVersionRequest) (*SecretVersion, error) {
1190	return nil, status.Errorf(codes.Unimplemented, "method AddSecretVersion not implemented")
1191}
1192func (*UnimplementedSecretManagerServiceServer) GetSecret(ctx context.Context, req *GetSecretRequest) (*Secret, error) {
1193	return nil, status.Errorf(codes.Unimplemented, "method GetSecret not implemented")
1194}
1195func (*UnimplementedSecretManagerServiceServer) UpdateSecret(ctx context.Context, req *UpdateSecretRequest) (*Secret, error) {
1196	return nil, status.Errorf(codes.Unimplemented, "method UpdateSecret not implemented")
1197}
1198func (*UnimplementedSecretManagerServiceServer) DeleteSecret(ctx context.Context, req *DeleteSecretRequest) (*empty.Empty, error) {
1199	return nil, status.Errorf(codes.Unimplemented, "method DeleteSecret not implemented")
1200}
1201func (*UnimplementedSecretManagerServiceServer) ListSecretVersions(ctx context.Context, req *ListSecretVersionsRequest) (*ListSecretVersionsResponse, error) {
1202	return nil, status.Errorf(codes.Unimplemented, "method ListSecretVersions not implemented")
1203}
1204func (*UnimplementedSecretManagerServiceServer) GetSecretVersion(ctx context.Context, req *GetSecretVersionRequest) (*SecretVersion, error) {
1205	return nil, status.Errorf(codes.Unimplemented, "method GetSecretVersion not implemented")
1206}
1207func (*UnimplementedSecretManagerServiceServer) AccessSecretVersion(ctx context.Context, req *AccessSecretVersionRequest) (*AccessSecretVersionResponse, error) {
1208	return nil, status.Errorf(codes.Unimplemented, "method AccessSecretVersion not implemented")
1209}
1210func (*UnimplementedSecretManagerServiceServer) DisableSecretVersion(ctx context.Context, req *DisableSecretVersionRequest) (*SecretVersion, error) {
1211	return nil, status.Errorf(codes.Unimplemented, "method DisableSecretVersion not implemented")
1212}
1213func (*UnimplementedSecretManagerServiceServer) EnableSecretVersion(ctx context.Context, req *EnableSecretVersionRequest) (*SecretVersion, error) {
1214	return nil, status.Errorf(codes.Unimplemented, "method EnableSecretVersion not implemented")
1215}
1216func (*UnimplementedSecretManagerServiceServer) DestroySecretVersion(ctx context.Context, req *DestroySecretVersionRequest) (*SecretVersion, error) {
1217	return nil, status.Errorf(codes.Unimplemented, "method DestroySecretVersion not implemented")
1218}
1219func (*UnimplementedSecretManagerServiceServer) SetIamPolicy(ctx context.Context, req *v1.SetIamPolicyRequest) (*v1.Policy, error) {
1220	return nil, status.Errorf(codes.Unimplemented, "method SetIamPolicy not implemented")
1221}
1222func (*UnimplementedSecretManagerServiceServer) GetIamPolicy(ctx context.Context, req *v1.GetIamPolicyRequest) (*v1.Policy, error) {
1223	return nil, status.Errorf(codes.Unimplemented, "method GetIamPolicy not implemented")
1224}
1225func (*UnimplementedSecretManagerServiceServer) TestIamPermissions(ctx context.Context, req *v1.TestIamPermissionsRequest) (*v1.TestIamPermissionsResponse, error) {
1226	return nil, status.Errorf(codes.Unimplemented, "method TestIamPermissions not implemented")
1227}
1228
1229func RegisterSecretManagerServiceServer(s *grpc.Server, srv SecretManagerServiceServer) {
1230	s.RegisterService(&_SecretManagerService_serviceDesc, srv)
1231}
1232
1233func _SecretManagerService_ListSecrets_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1234	in := new(ListSecretsRequest)
1235	if err := dec(in); err != nil {
1236		return nil, err
1237	}
1238	if interceptor == nil {
1239		return srv.(SecretManagerServiceServer).ListSecrets(ctx, in)
1240	}
1241	info := &grpc.UnaryServerInfo{
1242		Server:     srv,
1243		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/ListSecrets",
1244	}
1245	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1246		return srv.(SecretManagerServiceServer).ListSecrets(ctx, req.(*ListSecretsRequest))
1247	}
1248	return interceptor(ctx, in, info, handler)
1249}
1250
1251func _SecretManagerService_CreateSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1252	in := new(CreateSecretRequest)
1253	if err := dec(in); err != nil {
1254		return nil, err
1255	}
1256	if interceptor == nil {
1257		return srv.(SecretManagerServiceServer).CreateSecret(ctx, in)
1258	}
1259	info := &grpc.UnaryServerInfo{
1260		Server:     srv,
1261		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/CreateSecret",
1262	}
1263	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1264		return srv.(SecretManagerServiceServer).CreateSecret(ctx, req.(*CreateSecretRequest))
1265	}
1266	return interceptor(ctx, in, info, handler)
1267}
1268
1269func _SecretManagerService_AddSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1270	in := new(AddSecretVersionRequest)
1271	if err := dec(in); err != nil {
1272		return nil, err
1273	}
1274	if interceptor == nil {
1275		return srv.(SecretManagerServiceServer).AddSecretVersion(ctx, in)
1276	}
1277	info := &grpc.UnaryServerInfo{
1278		Server:     srv,
1279		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/AddSecretVersion",
1280	}
1281	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1282		return srv.(SecretManagerServiceServer).AddSecretVersion(ctx, req.(*AddSecretVersionRequest))
1283	}
1284	return interceptor(ctx, in, info, handler)
1285}
1286
1287func _SecretManagerService_GetSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1288	in := new(GetSecretRequest)
1289	if err := dec(in); err != nil {
1290		return nil, err
1291	}
1292	if interceptor == nil {
1293		return srv.(SecretManagerServiceServer).GetSecret(ctx, in)
1294	}
1295	info := &grpc.UnaryServerInfo{
1296		Server:     srv,
1297		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/GetSecret",
1298	}
1299	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1300		return srv.(SecretManagerServiceServer).GetSecret(ctx, req.(*GetSecretRequest))
1301	}
1302	return interceptor(ctx, in, info, handler)
1303}
1304
1305func _SecretManagerService_UpdateSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1306	in := new(UpdateSecretRequest)
1307	if err := dec(in); err != nil {
1308		return nil, err
1309	}
1310	if interceptor == nil {
1311		return srv.(SecretManagerServiceServer).UpdateSecret(ctx, in)
1312	}
1313	info := &grpc.UnaryServerInfo{
1314		Server:     srv,
1315		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/UpdateSecret",
1316	}
1317	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1318		return srv.(SecretManagerServiceServer).UpdateSecret(ctx, req.(*UpdateSecretRequest))
1319	}
1320	return interceptor(ctx, in, info, handler)
1321}
1322
1323func _SecretManagerService_DeleteSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1324	in := new(DeleteSecretRequest)
1325	if err := dec(in); err != nil {
1326		return nil, err
1327	}
1328	if interceptor == nil {
1329		return srv.(SecretManagerServiceServer).DeleteSecret(ctx, in)
1330	}
1331	info := &grpc.UnaryServerInfo{
1332		Server:     srv,
1333		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/DeleteSecret",
1334	}
1335	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1336		return srv.(SecretManagerServiceServer).DeleteSecret(ctx, req.(*DeleteSecretRequest))
1337	}
1338	return interceptor(ctx, in, info, handler)
1339}
1340
1341func _SecretManagerService_ListSecretVersions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1342	in := new(ListSecretVersionsRequest)
1343	if err := dec(in); err != nil {
1344		return nil, err
1345	}
1346	if interceptor == nil {
1347		return srv.(SecretManagerServiceServer).ListSecretVersions(ctx, in)
1348	}
1349	info := &grpc.UnaryServerInfo{
1350		Server:     srv,
1351		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/ListSecretVersions",
1352	}
1353	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1354		return srv.(SecretManagerServiceServer).ListSecretVersions(ctx, req.(*ListSecretVersionsRequest))
1355	}
1356	return interceptor(ctx, in, info, handler)
1357}
1358
1359func _SecretManagerService_GetSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1360	in := new(GetSecretVersionRequest)
1361	if err := dec(in); err != nil {
1362		return nil, err
1363	}
1364	if interceptor == nil {
1365		return srv.(SecretManagerServiceServer).GetSecretVersion(ctx, in)
1366	}
1367	info := &grpc.UnaryServerInfo{
1368		Server:     srv,
1369		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/GetSecretVersion",
1370	}
1371	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1372		return srv.(SecretManagerServiceServer).GetSecretVersion(ctx, req.(*GetSecretVersionRequest))
1373	}
1374	return interceptor(ctx, in, info, handler)
1375}
1376
1377func _SecretManagerService_AccessSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1378	in := new(AccessSecretVersionRequest)
1379	if err := dec(in); err != nil {
1380		return nil, err
1381	}
1382	if interceptor == nil {
1383		return srv.(SecretManagerServiceServer).AccessSecretVersion(ctx, in)
1384	}
1385	info := &grpc.UnaryServerInfo{
1386		Server:     srv,
1387		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/AccessSecretVersion",
1388	}
1389	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1390		return srv.(SecretManagerServiceServer).AccessSecretVersion(ctx, req.(*AccessSecretVersionRequest))
1391	}
1392	return interceptor(ctx, in, info, handler)
1393}
1394
1395func _SecretManagerService_DisableSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1396	in := new(DisableSecretVersionRequest)
1397	if err := dec(in); err != nil {
1398		return nil, err
1399	}
1400	if interceptor == nil {
1401		return srv.(SecretManagerServiceServer).DisableSecretVersion(ctx, in)
1402	}
1403	info := &grpc.UnaryServerInfo{
1404		Server:     srv,
1405		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/DisableSecretVersion",
1406	}
1407	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1408		return srv.(SecretManagerServiceServer).DisableSecretVersion(ctx, req.(*DisableSecretVersionRequest))
1409	}
1410	return interceptor(ctx, in, info, handler)
1411}
1412
1413func _SecretManagerService_EnableSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1414	in := new(EnableSecretVersionRequest)
1415	if err := dec(in); err != nil {
1416		return nil, err
1417	}
1418	if interceptor == nil {
1419		return srv.(SecretManagerServiceServer).EnableSecretVersion(ctx, in)
1420	}
1421	info := &grpc.UnaryServerInfo{
1422		Server:     srv,
1423		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/EnableSecretVersion",
1424	}
1425	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1426		return srv.(SecretManagerServiceServer).EnableSecretVersion(ctx, req.(*EnableSecretVersionRequest))
1427	}
1428	return interceptor(ctx, in, info, handler)
1429}
1430
1431func _SecretManagerService_DestroySecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1432	in := new(DestroySecretVersionRequest)
1433	if err := dec(in); err != nil {
1434		return nil, err
1435	}
1436	if interceptor == nil {
1437		return srv.(SecretManagerServiceServer).DestroySecretVersion(ctx, in)
1438	}
1439	info := &grpc.UnaryServerInfo{
1440		Server:     srv,
1441		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/DestroySecretVersion",
1442	}
1443	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1444		return srv.(SecretManagerServiceServer).DestroySecretVersion(ctx, req.(*DestroySecretVersionRequest))
1445	}
1446	return interceptor(ctx, in, info, handler)
1447}
1448
1449func _SecretManagerService_SetIamPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1450	in := new(v1.SetIamPolicyRequest)
1451	if err := dec(in); err != nil {
1452		return nil, err
1453	}
1454	if interceptor == nil {
1455		return srv.(SecretManagerServiceServer).SetIamPolicy(ctx, in)
1456	}
1457	info := &grpc.UnaryServerInfo{
1458		Server:     srv,
1459		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/SetIamPolicy",
1460	}
1461	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1462		return srv.(SecretManagerServiceServer).SetIamPolicy(ctx, req.(*v1.SetIamPolicyRequest))
1463	}
1464	return interceptor(ctx, in, info, handler)
1465}
1466
1467func _SecretManagerService_GetIamPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1468	in := new(v1.GetIamPolicyRequest)
1469	if err := dec(in); err != nil {
1470		return nil, err
1471	}
1472	if interceptor == nil {
1473		return srv.(SecretManagerServiceServer).GetIamPolicy(ctx, in)
1474	}
1475	info := &grpc.UnaryServerInfo{
1476		Server:     srv,
1477		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/GetIamPolicy",
1478	}
1479	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1480		return srv.(SecretManagerServiceServer).GetIamPolicy(ctx, req.(*v1.GetIamPolicyRequest))
1481	}
1482	return interceptor(ctx, in, info, handler)
1483}
1484
1485func _SecretManagerService_TestIamPermissions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1486	in := new(v1.TestIamPermissionsRequest)
1487	if err := dec(in); err != nil {
1488		return nil, err
1489	}
1490	if interceptor == nil {
1491		return srv.(SecretManagerServiceServer).TestIamPermissions(ctx, in)
1492	}
1493	info := &grpc.UnaryServerInfo{
1494		Server:     srv,
1495		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/TestIamPermissions",
1496	}
1497	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1498		return srv.(SecretManagerServiceServer).TestIamPermissions(ctx, req.(*v1.TestIamPermissionsRequest))
1499	}
1500	return interceptor(ctx, in, info, handler)
1501}
1502
1503var _SecretManagerService_serviceDesc = grpc.ServiceDesc{
1504	ServiceName: "google.cloud.secrets.v1beta1.SecretManagerService",
1505	HandlerType: (*SecretManagerServiceServer)(nil),
1506	Methods: []grpc.MethodDesc{
1507		{
1508			MethodName: "ListSecrets",
1509			Handler:    _SecretManagerService_ListSecrets_Handler,
1510		},
1511		{
1512			MethodName: "CreateSecret",
1513			Handler:    _SecretManagerService_CreateSecret_Handler,
1514		},
1515		{
1516			MethodName: "AddSecretVersion",
1517			Handler:    _SecretManagerService_AddSecretVersion_Handler,
1518		},
1519		{
1520			MethodName: "GetSecret",
1521			Handler:    _SecretManagerService_GetSecret_Handler,
1522		},
1523		{
1524			MethodName: "UpdateSecret",
1525			Handler:    _SecretManagerService_UpdateSecret_Handler,
1526		},
1527		{
1528			MethodName: "DeleteSecret",
1529			Handler:    _SecretManagerService_DeleteSecret_Handler,
1530		},
1531		{
1532			MethodName: "ListSecretVersions",
1533			Handler:    _SecretManagerService_ListSecretVersions_Handler,
1534		},
1535		{
1536			MethodName: "GetSecretVersion",
1537			Handler:    _SecretManagerService_GetSecretVersion_Handler,
1538		},
1539		{
1540			MethodName: "AccessSecretVersion",
1541			Handler:    _SecretManagerService_AccessSecretVersion_Handler,
1542		},
1543		{
1544			MethodName: "DisableSecretVersion",
1545			Handler:    _SecretManagerService_DisableSecretVersion_Handler,
1546		},
1547		{
1548			MethodName: "EnableSecretVersion",
1549			Handler:    _SecretManagerService_EnableSecretVersion_Handler,
1550		},
1551		{
1552			MethodName: "DestroySecretVersion",
1553			Handler:    _SecretManagerService_DestroySecretVersion_Handler,
1554		},
1555		{
1556			MethodName: "SetIamPolicy",
1557			Handler:    _SecretManagerService_SetIamPolicy_Handler,
1558		},
1559		{
1560			MethodName: "GetIamPolicy",
1561			Handler:    _SecretManagerService_GetIamPolicy_Handler,
1562		},
1563		{
1564			MethodName: "TestIamPermissions",
1565			Handler:    _SecretManagerService_TestIamPermissions_Handler,
1566		},
1567	},
1568	Streams:  []grpc.StreamDesc{},
1569	Metadata: "google/cloud/secrets/v1beta1/service.proto",
1570}
1571