1// Code generated by protoc-gen-go. DO NOT EDIT. 2// source: google/cloud/secrets/v1beta1/service.proto 3 4package secrets 5 6import ( 7 context "context" 8 fmt "fmt" 9 math "math" 10 11 proto "github.com/golang/protobuf/proto" 12 empty "github.com/golang/protobuf/ptypes/empty" 13 _ "google.golang.org/genproto/googleapis/api/annotations" 14 v1 "google.golang.org/genproto/googleapis/iam/v1" 15 field_mask "google.golang.org/genproto/protobuf/field_mask" 16 grpc "google.golang.org/grpc" 17 codes "google.golang.org/grpc/codes" 18 status "google.golang.org/grpc/status" 19) 20 21// Reference imports to suppress errors if they are not otherwise used. 22var _ = proto.Marshal 23var _ = fmt.Errorf 24var _ = math.Inf 25 26// This is a compile-time assertion to ensure that this generated file 27// is compatible with the proto package it is being compiled against. 28// A compilation error at this line likely means your copy of the 29// proto package needs to be updated. 30const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package 31 32// Request message for [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets]. 33type ListSecretsRequest struct { 34 // Required. The resource name of the project associated with the 35 // [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`. 36 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 37 // Optional. The maximum number of results to be returned in a single page. If 38 // set to 0, the server decides the number of results to return. If the 39 // number is greater than 25000, it is capped at 25000. 40 PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"` 41 // Optional. Pagination token, returned earlier via 42 // [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token]. 43 PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"` 44 XXX_NoUnkeyedLiteral struct{} `json:"-"` 45 XXX_unrecognized []byte `json:"-"` 46 XXX_sizecache int32 `json:"-"` 47} 48 49func (m *ListSecretsRequest) Reset() { *m = ListSecretsRequest{} } 50func (m *ListSecretsRequest) String() string { return proto.CompactTextString(m) } 51func (*ListSecretsRequest) ProtoMessage() {} 52func (*ListSecretsRequest) Descriptor() ([]byte, []int) { 53 return fileDescriptor_67a0e1a61a378c59, []int{0} 54} 55 56func (m *ListSecretsRequest) XXX_Unmarshal(b []byte) error { 57 return xxx_messageInfo_ListSecretsRequest.Unmarshal(m, b) 58} 59func (m *ListSecretsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 60 return xxx_messageInfo_ListSecretsRequest.Marshal(b, m, deterministic) 61} 62func (m *ListSecretsRequest) XXX_Merge(src proto.Message) { 63 xxx_messageInfo_ListSecretsRequest.Merge(m, src) 64} 65func (m *ListSecretsRequest) XXX_Size() int { 66 return xxx_messageInfo_ListSecretsRequest.Size(m) 67} 68func (m *ListSecretsRequest) XXX_DiscardUnknown() { 69 xxx_messageInfo_ListSecretsRequest.DiscardUnknown(m) 70} 71 72var xxx_messageInfo_ListSecretsRequest proto.InternalMessageInfo 73 74func (m *ListSecretsRequest) GetParent() string { 75 if m != nil { 76 return m.Parent 77 } 78 return "" 79} 80 81func (m *ListSecretsRequest) GetPageSize() int32 { 82 if m != nil { 83 return m.PageSize 84 } 85 return 0 86} 87 88func (m *ListSecretsRequest) GetPageToken() string { 89 if m != nil { 90 return m.PageToken 91 } 92 return "" 93} 94 95// Response message for [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets]. 96type ListSecretsResponse struct { 97 // The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest 98 // first). 99 Secrets []*Secret `protobuf:"bytes,1,rep,name=secrets,proto3" json:"secrets,omitempty"` 100 // A token to retrieve the next page of results. Pass this value in 101 // [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page. 102 NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"` 103 // The total number of [Secrets][google.cloud.secrets.v1beta1.Secret]. 104 TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"` 105 XXX_NoUnkeyedLiteral struct{} `json:"-"` 106 XXX_unrecognized []byte `json:"-"` 107 XXX_sizecache int32 `json:"-"` 108} 109 110func (m *ListSecretsResponse) Reset() { *m = ListSecretsResponse{} } 111func (m *ListSecretsResponse) String() string { return proto.CompactTextString(m) } 112func (*ListSecretsResponse) ProtoMessage() {} 113func (*ListSecretsResponse) Descriptor() ([]byte, []int) { 114 return fileDescriptor_67a0e1a61a378c59, []int{1} 115} 116 117func (m *ListSecretsResponse) XXX_Unmarshal(b []byte) error { 118 return xxx_messageInfo_ListSecretsResponse.Unmarshal(m, b) 119} 120func (m *ListSecretsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 121 return xxx_messageInfo_ListSecretsResponse.Marshal(b, m, deterministic) 122} 123func (m *ListSecretsResponse) XXX_Merge(src proto.Message) { 124 xxx_messageInfo_ListSecretsResponse.Merge(m, src) 125} 126func (m *ListSecretsResponse) XXX_Size() int { 127 return xxx_messageInfo_ListSecretsResponse.Size(m) 128} 129func (m *ListSecretsResponse) XXX_DiscardUnknown() { 130 xxx_messageInfo_ListSecretsResponse.DiscardUnknown(m) 131} 132 133var xxx_messageInfo_ListSecretsResponse proto.InternalMessageInfo 134 135func (m *ListSecretsResponse) GetSecrets() []*Secret { 136 if m != nil { 137 return m.Secrets 138 } 139 return nil 140} 141 142func (m *ListSecretsResponse) GetNextPageToken() string { 143 if m != nil { 144 return m.NextPageToken 145 } 146 return "" 147} 148 149func (m *ListSecretsResponse) GetTotalSize() int32 { 150 if m != nil { 151 return m.TotalSize 152 } 153 return 0 154} 155 156// Request message for [SecretManagerService.CreateSecret][google.cloud.secrets.v1beta1.SecretManagerService.CreateSecret]. 157type CreateSecretRequest struct { 158 // Required. The resource name of the project to associate with the 159 // [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`. 160 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 161 // Required. This must be unique within the project. 162 SecretId string `protobuf:"bytes,2,opt,name=secret_id,json=secretId,proto3" json:"secret_id,omitempty"` 163 // A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values. 164 Secret *Secret `protobuf:"bytes,3,opt,name=secret,proto3" json:"secret,omitempty"` 165 XXX_NoUnkeyedLiteral struct{} `json:"-"` 166 XXX_unrecognized []byte `json:"-"` 167 XXX_sizecache int32 `json:"-"` 168} 169 170func (m *CreateSecretRequest) Reset() { *m = CreateSecretRequest{} } 171func (m *CreateSecretRequest) String() string { return proto.CompactTextString(m) } 172func (*CreateSecretRequest) ProtoMessage() {} 173func (*CreateSecretRequest) Descriptor() ([]byte, []int) { 174 return fileDescriptor_67a0e1a61a378c59, []int{2} 175} 176 177func (m *CreateSecretRequest) XXX_Unmarshal(b []byte) error { 178 return xxx_messageInfo_CreateSecretRequest.Unmarshal(m, b) 179} 180func (m *CreateSecretRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 181 return xxx_messageInfo_CreateSecretRequest.Marshal(b, m, deterministic) 182} 183func (m *CreateSecretRequest) XXX_Merge(src proto.Message) { 184 xxx_messageInfo_CreateSecretRequest.Merge(m, src) 185} 186func (m *CreateSecretRequest) XXX_Size() int { 187 return xxx_messageInfo_CreateSecretRequest.Size(m) 188} 189func (m *CreateSecretRequest) XXX_DiscardUnknown() { 190 xxx_messageInfo_CreateSecretRequest.DiscardUnknown(m) 191} 192 193var xxx_messageInfo_CreateSecretRequest proto.InternalMessageInfo 194 195func (m *CreateSecretRequest) GetParent() string { 196 if m != nil { 197 return m.Parent 198 } 199 return "" 200} 201 202func (m *CreateSecretRequest) GetSecretId() string { 203 if m != nil { 204 return m.SecretId 205 } 206 return "" 207} 208 209func (m *CreateSecretRequest) GetSecret() *Secret { 210 if m != nil { 211 return m.Secret 212 } 213 return nil 214} 215 216// Request message for [SecretManagerService.AddSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AddSecretVersion]. 217type AddSecretVersionRequest struct { 218 // Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the 219 // [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`. 220 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 221 // Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 222 Payload *SecretPayload `protobuf:"bytes,2,opt,name=payload,proto3" json:"payload,omitempty"` 223 XXX_NoUnkeyedLiteral struct{} `json:"-"` 224 XXX_unrecognized []byte `json:"-"` 225 XXX_sizecache int32 `json:"-"` 226} 227 228func (m *AddSecretVersionRequest) Reset() { *m = AddSecretVersionRequest{} } 229func (m *AddSecretVersionRequest) String() string { return proto.CompactTextString(m) } 230func (*AddSecretVersionRequest) ProtoMessage() {} 231func (*AddSecretVersionRequest) Descriptor() ([]byte, []int) { 232 return fileDescriptor_67a0e1a61a378c59, []int{3} 233} 234 235func (m *AddSecretVersionRequest) XXX_Unmarshal(b []byte) error { 236 return xxx_messageInfo_AddSecretVersionRequest.Unmarshal(m, b) 237} 238func (m *AddSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 239 return xxx_messageInfo_AddSecretVersionRequest.Marshal(b, m, deterministic) 240} 241func (m *AddSecretVersionRequest) XXX_Merge(src proto.Message) { 242 xxx_messageInfo_AddSecretVersionRequest.Merge(m, src) 243} 244func (m *AddSecretVersionRequest) XXX_Size() int { 245 return xxx_messageInfo_AddSecretVersionRequest.Size(m) 246} 247func (m *AddSecretVersionRequest) XXX_DiscardUnknown() { 248 xxx_messageInfo_AddSecretVersionRequest.DiscardUnknown(m) 249} 250 251var xxx_messageInfo_AddSecretVersionRequest proto.InternalMessageInfo 252 253func (m *AddSecretVersionRequest) GetParent() string { 254 if m != nil { 255 return m.Parent 256 } 257 return "" 258} 259 260func (m *AddSecretVersionRequest) GetPayload() *SecretPayload { 261 if m != nil { 262 return m.Payload 263 } 264 return nil 265} 266 267// Request message for [SecretManagerService.GetSecret][google.cloud.secrets.v1beta1.SecretManagerService.GetSecret]. 268type GetSecretRequest struct { 269 // Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`. 270 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 271 XXX_NoUnkeyedLiteral struct{} `json:"-"` 272 XXX_unrecognized []byte `json:"-"` 273 XXX_sizecache int32 `json:"-"` 274} 275 276func (m *GetSecretRequest) Reset() { *m = GetSecretRequest{} } 277func (m *GetSecretRequest) String() string { return proto.CompactTextString(m) } 278func (*GetSecretRequest) ProtoMessage() {} 279func (*GetSecretRequest) Descriptor() ([]byte, []int) { 280 return fileDescriptor_67a0e1a61a378c59, []int{4} 281} 282 283func (m *GetSecretRequest) XXX_Unmarshal(b []byte) error { 284 return xxx_messageInfo_GetSecretRequest.Unmarshal(m, b) 285} 286func (m *GetSecretRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 287 return xxx_messageInfo_GetSecretRequest.Marshal(b, m, deterministic) 288} 289func (m *GetSecretRequest) XXX_Merge(src proto.Message) { 290 xxx_messageInfo_GetSecretRequest.Merge(m, src) 291} 292func (m *GetSecretRequest) XXX_Size() int { 293 return xxx_messageInfo_GetSecretRequest.Size(m) 294} 295func (m *GetSecretRequest) XXX_DiscardUnknown() { 296 xxx_messageInfo_GetSecretRequest.DiscardUnknown(m) 297} 298 299var xxx_messageInfo_GetSecretRequest proto.InternalMessageInfo 300 301func (m *GetSecretRequest) GetName() string { 302 if m != nil { 303 return m.Name 304 } 305 return "" 306} 307 308// Request message for [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions]. 309type ListSecretVersionsRequest struct { 310 // Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the 311 // [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format 312 // `projects/*/secrets/*`. 313 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 314 // Optional. The maximum number of results to be returned in a single page. If 315 // set to 0, the server decides the number of results to return. If the 316 // number is greater than 25000, it is capped at 25000. 317 PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"` 318 // Optional. Pagination token, returned earlier via 319 // ListSecretVersionsResponse.next_page_token][]. 320 PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"` 321 XXX_NoUnkeyedLiteral struct{} `json:"-"` 322 XXX_unrecognized []byte `json:"-"` 323 XXX_sizecache int32 `json:"-"` 324} 325 326func (m *ListSecretVersionsRequest) Reset() { *m = ListSecretVersionsRequest{} } 327func (m *ListSecretVersionsRequest) String() string { return proto.CompactTextString(m) } 328func (*ListSecretVersionsRequest) ProtoMessage() {} 329func (*ListSecretVersionsRequest) Descriptor() ([]byte, []int) { 330 return fileDescriptor_67a0e1a61a378c59, []int{5} 331} 332 333func (m *ListSecretVersionsRequest) XXX_Unmarshal(b []byte) error { 334 return xxx_messageInfo_ListSecretVersionsRequest.Unmarshal(m, b) 335} 336func (m *ListSecretVersionsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 337 return xxx_messageInfo_ListSecretVersionsRequest.Marshal(b, m, deterministic) 338} 339func (m *ListSecretVersionsRequest) XXX_Merge(src proto.Message) { 340 xxx_messageInfo_ListSecretVersionsRequest.Merge(m, src) 341} 342func (m *ListSecretVersionsRequest) XXX_Size() int { 343 return xxx_messageInfo_ListSecretVersionsRequest.Size(m) 344} 345func (m *ListSecretVersionsRequest) XXX_DiscardUnknown() { 346 xxx_messageInfo_ListSecretVersionsRequest.DiscardUnknown(m) 347} 348 349var xxx_messageInfo_ListSecretVersionsRequest proto.InternalMessageInfo 350 351func (m *ListSecretVersionsRequest) GetParent() string { 352 if m != nil { 353 return m.Parent 354 } 355 return "" 356} 357 358func (m *ListSecretVersionsRequest) GetPageSize() int32 { 359 if m != nil { 360 return m.PageSize 361 } 362 return 0 363} 364 365func (m *ListSecretVersionsRequest) GetPageToken() string { 366 if m != nil { 367 return m.PageToken 368 } 369 return "" 370} 371 372// Response message for [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions]. 373type ListSecretVersionsResponse struct { 374 // The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by 375 // create_time (newest first). 376 Versions []*SecretVersion `protobuf:"bytes,1,rep,name=versions,proto3" json:"versions,omitempty"` 377 // A token to retrieve the next page of results. Pass this value in 378 // [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page. 379 NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"` 380 // The total number of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. 381 TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"` 382 XXX_NoUnkeyedLiteral struct{} `json:"-"` 383 XXX_unrecognized []byte `json:"-"` 384 XXX_sizecache int32 `json:"-"` 385} 386 387func (m *ListSecretVersionsResponse) Reset() { *m = ListSecretVersionsResponse{} } 388func (m *ListSecretVersionsResponse) String() string { return proto.CompactTextString(m) } 389func (*ListSecretVersionsResponse) ProtoMessage() {} 390func (*ListSecretVersionsResponse) Descriptor() ([]byte, []int) { 391 return fileDescriptor_67a0e1a61a378c59, []int{6} 392} 393 394func (m *ListSecretVersionsResponse) XXX_Unmarshal(b []byte) error { 395 return xxx_messageInfo_ListSecretVersionsResponse.Unmarshal(m, b) 396} 397func (m *ListSecretVersionsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 398 return xxx_messageInfo_ListSecretVersionsResponse.Marshal(b, m, deterministic) 399} 400func (m *ListSecretVersionsResponse) XXX_Merge(src proto.Message) { 401 xxx_messageInfo_ListSecretVersionsResponse.Merge(m, src) 402} 403func (m *ListSecretVersionsResponse) XXX_Size() int { 404 return xxx_messageInfo_ListSecretVersionsResponse.Size(m) 405} 406func (m *ListSecretVersionsResponse) XXX_DiscardUnknown() { 407 xxx_messageInfo_ListSecretVersionsResponse.DiscardUnknown(m) 408} 409 410var xxx_messageInfo_ListSecretVersionsResponse proto.InternalMessageInfo 411 412func (m *ListSecretVersionsResponse) GetVersions() []*SecretVersion { 413 if m != nil { 414 return m.Versions 415 } 416 return nil 417} 418 419func (m *ListSecretVersionsResponse) GetNextPageToken() string { 420 if m != nil { 421 return m.NextPageToken 422 } 423 return "" 424} 425 426func (m *ListSecretVersionsResponse) GetTotalSize() int32 { 427 if m != nil { 428 return m.TotalSize 429 } 430 return 0 431} 432 433// Request message for [SecretManagerService.GetSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.GetSecretVersion]. 434type GetSecretVersionRequest struct { 435 // Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format 436 // `projects/*/secrets/*/versions/*`. 437 // `projects/*/secrets/*/versions/latest` is an alias to the `latest` 438 // [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 439 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 440 XXX_NoUnkeyedLiteral struct{} `json:"-"` 441 XXX_unrecognized []byte `json:"-"` 442 XXX_sizecache int32 `json:"-"` 443} 444 445func (m *GetSecretVersionRequest) Reset() { *m = GetSecretVersionRequest{} } 446func (m *GetSecretVersionRequest) String() string { return proto.CompactTextString(m) } 447func (*GetSecretVersionRequest) ProtoMessage() {} 448func (*GetSecretVersionRequest) Descriptor() ([]byte, []int) { 449 return fileDescriptor_67a0e1a61a378c59, []int{7} 450} 451 452func (m *GetSecretVersionRequest) XXX_Unmarshal(b []byte) error { 453 return xxx_messageInfo_GetSecretVersionRequest.Unmarshal(m, b) 454} 455func (m *GetSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 456 return xxx_messageInfo_GetSecretVersionRequest.Marshal(b, m, deterministic) 457} 458func (m *GetSecretVersionRequest) XXX_Merge(src proto.Message) { 459 xxx_messageInfo_GetSecretVersionRequest.Merge(m, src) 460} 461func (m *GetSecretVersionRequest) XXX_Size() int { 462 return xxx_messageInfo_GetSecretVersionRequest.Size(m) 463} 464func (m *GetSecretVersionRequest) XXX_DiscardUnknown() { 465 xxx_messageInfo_GetSecretVersionRequest.DiscardUnknown(m) 466} 467 468var xxx_messageInfo_GetSecretVersionRequest proto.InternalMessageInfo 469 470func (m *GetSecretVersionRequest) GetName() string { 471 if m != nil { 472 return m.Name 473 } 474 return "" 475} 476 477// Request message for [SecretManagerService.UpdateSecret][google.cloud.secrets.v1beta1.SecretManagerService.UpdateSecret]. 478type UpdateSecretRequest struct { 479 // Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values. 480 Secret *Secret `protobuf:"bytes,1,opt,name=secret,proto3" json:"secret,omitempty"` 481 // Required. Specifies the fields to be updated. 482 UpdateMask *field_mask.FieldMask `protobuf:"bytes,2,opt,name=update_mask,json=updateMask,proto3" json:"update_mask,omitempty"` 483 XXX_NoUnkeyedLiteral struct{} `json:"-"` 484 XXX_unrecognized []byte `json:"-"` 485 XXX_sizecache int32 `json:"-"` 486} 487 488func (m *UpdateSecretRequest) Reset() { *m = UpdateSecretRequest{} } 489func (m *UpdateSecretRequest) String() string { return proto.CompactTextString(m) } 490func (*UpdateSecretRequest) ProtoMessage() {} 491func (*UpdateSecretRequest) Descriptor() ([]byte, []int) { 492 return fileDescriptor_67a0e1a61a378c59, []int{8} 493} 494 495func (m *UpdateSecretRequest) XXX_Unmarshal(b []byte) error { 496 return xxx_messageInfo_UpdateSecretRequest.Unmarshal(m, b) 497} 498func (m *UpdateSecretRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 499 return xxx_messageInfo_UpdateSecretRequest.Marshal(b, m, deterministic) 500} 501func (m *UpdateSecretRequest) XXX_Merge(src proto.Message) { 502 xxx_messageInfo_UpdateSecretRequest.Merge(m, src) 503} 504func (m *UpdateSecretRequest) XXX_Size() int { 505 return xxx_messageInfo_UpdateSecretRequest.Size(m) 506} 507func (m *UpdateSecretRequest) XXX_DiscardUnknown() { 508 xxx_messageInfo_UpdateSecretRequest.DiscardUnknown(m) 509} 510 511var xxx_messageInfo_UpdateSecretRequest proto.InternalMessageInfo 512 513func (m *UpdateSecretRequest) GetSecret() *Secret { 514 if m != nil { 515 return m.Secret 516 } 517 return nil 518} 519 520func (m *UpdateSecretRequest) GetUpdateMask() *field_mask.FieldMask { 521 if m != nil { 522 return m.UpdateMask 523 } 524 return nil 525} 526 527// Request message for [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion]. 528type AccessSecretVersionRequest struct { 529 // Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format 530 // `projects/*/secrets/*/versions/*`. 531 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 532 XXX_NoUnkeyedLiteral struct{} `json:"-"` 533 XXX_unrecognized []byte `json:"-"` 534 XXX_sizecache int32 `json:"-"` 535} 536 537func (m *AccessSecretVersionRequest) Reset() { *m = AccessSecretVersionRequest{} } 538func (m *AccessSecretVersionRequest) String() string { return proto.CompactTextString(m) } 539func (*AccessSecretVersionRequest) ProtoMessage() {} 540func (*AccessSecretVersionRequest) Descriptor() ([]byte, []int) { 541 return fileDescriptor_67a0e1a61a378c59, []int{9} 542} 543 544func (m *AccessSecretVersionRequest) XXX_Unmarshal(b []byte) error { 545 return xxx_messageInfo_AccessSecretVersionRequest.Unmarshal(m, b) 546} 547func (m *AccessSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 548 return xxx_messageInfo_AccessSecretVersionRequest.Marshal(b, m, deterministic) 549} 550func (m *AccessSecretVersionRequest) XXX_Merge(src proto.Message) { 551 xxx_messageInfo_AccessSecretVersionRequest.Merge(m, src) 552} 553func (m *AccessSecretVersionRequest) XXX_Size() int { 554 return xxx_messageInfo_AccessSecretVersionRequest.Size(m) 555} 556func (m *AccessSecretVersionRequest) XXX_DiscardUnknown() { 557 xxx_messageInfo_AccessSecretVersionRequest.DiscardUnknown(m) 558} 559 560var xxx_messageInfo_AccessSecretVersionRequest proto.InternalMessageInfo 561 562func (m *AccessSecretVersionRequest) GetName() string { 563 if m != nil { 564 return m.Name 565 } 566 return "" 567} 568 569// Response message for [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion]. 570type AccessSecretVersionResponse struct { 571 // The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format 572 // `projects/*/secrets/*/versions/*`. 573 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 574 // Secret payload 575 Payload *SecretPayload `protobuf:"bytes,2,opt,name=payload,proto3" json:"payload,omitempty"` 576 XXX_NoUnkeyedLiteral struct{} `json:"-"` 577 XXX_unrecognized []byte `json:"-"` 578 XXX_sizecache int32 `json:"-"` 579} 580 581func (m *AccessSecretVersionResponse) Reset() { *m = AccessSecretVersionResponse{} } 582func (m *AccessSecretVersionResponse) String() string { return proto.CompactTextString(m) } 583func (*AccessSecretVersionResponse) ProtoMessage() {} 584func (*AccessSecretVersionResponse) Descriptor() ([]byte, []int) { 585 return fileDescriptor_67a0e1a61a378c59, []int{10} 586} 587 588func (m *AccessSecretVersionResponse) XXX_Unmarshal(b []byte) error { 589 return xxx_messageInfo_AccessSecretVersionResponse.Unmarshal(m, b) 590} 591func (m *AccessSecretVersionResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 592 return xxx_messageInfo_AccessSecretVersionResponse.Marshal(b, m, deterministic) 593} 594func (m *AccessSecretVersionResponse) XXX_Merge(src proto.Message) { 595 xxx_messageInfo_AccessSecretVersionResponse.Merge(m, src) 596} 597func (m *AccessSecretVersionResponse) XXX_Size() int { 598 return xxx_messageInfo_AccessSecretVersionResponse.Size(m) 599} 600func (m *AccessSecretVersionResponse) XXX_DiscardUnknown() { 601 xxx_messageInfo_AccessSecretVersionResponse.DiscardUnknown(m) 602} 603 604var xxx_messageInfo_AccessSecretVersionResponse proto.InternalMessageInfo 605 606func (m *AccessSecretVersionResponse) GetName() string { 607 if m != nil { 608 return m.Name 609 } 610 return "" 611} 612 613func (m *AccessSecretVersionResponse) GetPayload() *SecretPayload { 614 if m != nil { 615 return m.Payload 616 } 617 return nil 618} 619 620// Request message for [SecretManagerService.DeleteSecret][google.cloud.secrets.v1beta1.SecretManagerService.DeleteSecret]. 621type DeleteSecretRequest struct { 622 // Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format 623 // `projects/*/secrets/*`. 624 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 625 XXX_NoUnkeyedLiteral struct{} `json:"-"` 626 XXX_unrecognized []byte `json:"-"` 627 XXX_sizecache int32 `json:"-"` 628} 629 630func (m *DeleteSecretRequest) Reset() { *m = DeleteSecretRequest{} } 631func (m *DeleteSecretRequest) String() string { return proto.CompactTextString(m) } 632func (*DeleteSecretRequest) ProtoMessage() {} 633func (*DeleteSecretRequest) Descriptor() ([]byte, []int) { 634 return fileDescriptor_67a0e1a61a378c59, []int{11} 635} 636 637func (m *DeleteSecretRequest) XXX_Unmarshal(b []byte) error { 638 return xxx_messageInfo_DeleteSecretRequest.Unmarshal(m, b) 639} 640func (m *DeleteSecretRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 641 return xxx_messageInfo_DeleteSecretRequest.Marshal(b, m, deterministic) 642} 643func (m *DeleteSecretRequest) XXX_Merge(src proto.Message) { 644 xxx_messageInfo_DeleteSecretRequest.Merge(m, src) 645} 646func (m *DeleteSecretRequest) XXX_Size() int { 647 return xxx_messageInfo_DeleteSecretRequest.Size(m) 648} 649func (m *DeleteSecretRequest) XXX_DiscardUnknown() { 650 xxx_messageInfo_DeleteSecretRequest.DiscardUnknown(m) 651} 652 653var xxx_messageInfo_DeleteSecretRequest proto.InternalMessageInfo 654 655func (m *DeleteSecretRequest) GetName() string { 656 if m != nil { 657 return m.Name 658 } 659 return "" 660} 661 662// Request message for [SecretManagerService.DisableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DisableSecretVersion]. 663type DisableSecretVersionRequest struct { 664 // Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format 665 // `projects/*/secrets/*/versions/*`. 666 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 667 XXX_NoUnkeyedLiteral struct{} `json:"-"` 668 XXX_unrecognized []byte `json:"-"` 669 XXX_sizecache int32 `json:"-"` 670} 671 672func (m *DisableSecretVersionRequest) Reset() { *m = DisableSecretVersionRequest{} } 673func (m *DisableSecretVersionRequest) String() string { return proto.CompactTextString(m) } 674func (*DisableSecretVersionRequest) ProtoMessage() {} 675func (*DisableSecretVersionRequest) Descriptor() ([]byte, []int) { 676 return fileDescriptor_67a0e1a61a378c59, []int{12} 677} 678 679func (m *DisableSecretVersionRequest) XXX_Unmarshal(b []byte) error { 680 return xxx_messageInfo_DisableSecretVersionRequest.Unmarshal(m, b) 681} 682func (m *DisableSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 683 return xxx_messageInfo_DisableSecretVersionRequest.Marshal(b, m, deterministic) 684} 685func (m *DisableSecretVersionRequest) XXX_Merge(src proto.Message) { 686 xxx_messageInfo_DisableSecretVersionRequest.Merge(m, src) 687} 688func (m *DisableSecretVersionRequest) XXX_Size() int { 689 return xxx_messageInfo_DisableSecretVersionRequest.Size(m) 690} 691func (m *DisableSecretVersionRequest) XXX_DiscardUnknown() { 692 xxx_messageInfo_DisableSecretVersionRequest.DiscardUnknown(m) 693} 694 695var xxx_messageInfo_DisableSecretVersionRequest proto.InternalMessageInfo 696 697func (m *DisableSecretVersionRequest) GetName() string { 698 if m != nil { 699 return m.Name 700 } 701 return "" 702} 703 704// Request message for [SecretManagerService.EnableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.EnableSecretVersion]. 705type EnableSecretVersionRequest struct { 706 // Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format 707 // `projects/*/secrets/*/versions/*`. 708 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 709 XXX_NoUnkeyedLiteral struct{} `json:"-"` 710 XXX_unrecognized []byte `json:"-"` 711 XXX_sizecache int32 `json:"-"` 712} 713 714func (m *EnableSecretVersionRequest) Reset() { *m = EnableSecretVersionRequest{} } 715func (m *EnableSecretVersionRequest) String() string { return proto.CompactTextString(m) } 716func (*EnableSecretVersionRequest) ProtoMessage() {} 717func (*EnableSecretVersionRequest) Descriptor() ([]byte, []int) { 718 return fileDescriptor_67a0e1a61a378c59, []int{13} 719} 720 721func (m *EnableSecretVersionRequest) XXX_Unmarshal(b []byte) error { 722 return xxx_messageInfo_EnableSecretVersionRequest.Unmarshal(m, b) 723} 724func (m *EnableSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 725 return xxx_messageInfo_EnableSecretVersionRequest.Marshal(b, m, deterministic) 726} 727func (m *EnableSecretVersionRequest) XXX_Merge(src proto.Message) { 728 xxx_messageInfo_EnableSecretVersionRequest.Merge(m, src) 729} 730func (m *EnableSecretVersionRequest) XXX_Size() int { 731 return xxx_messageInfo_EnableSecretVersionRequest.Size(m) 732} 733func (m *EnableSecretVersionRequest) XXX_DiscardUnknown() { 734 xxx_messageInfo_EnableSecretVersionRequest.DiscardUnknown(m) 735} 736 737var xxx_messageInfo_EnableSecretVersionRequest proto.InternalMessageInfo 738 739func (m *EnableSecretVersionRequest) GetName() string { 740 if m != nil { 741 return m.Name 742 } 743 return "" 744} 745 746// Request message for [SecretManagerService.DestroySecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DestroySecretVersion]. 747type DestroySecretVersionRequest struct { 748 // Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format 749 // `projects/*/secrets/*/versions/*`. 750 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 751 XXX_NoUnkeyedLiteral struct{} `json:"-"` 752 XXX_unrecognized []byte `json:"-"` 753 XXX_sizecache int32 `json:"-"` 754} 755 756func (m *DestroySecretVersionRequest) Reset() { *m = DestroySecretVersionRequest{} } 757func (m *DestroySecretVersionRequest) String() string { return proto.CompactTextString(m) } 758func (*DestroySecretVersionRequest) ProtoMessage() {} 759func (*DestroySecretVersionRequest) Descriptor() ([]byte, []int) { 760 return fileDescriptor_67a0e1a61a378c59, []int{14} 761} 762 763func (m *DestroySecretVersionRequest) XXX_Unmarshal(b []byte) error { 764 return xxx_messageInfo_DestroySecretVersionRequest.Unmarshal(m, b) 765} 766func (m *DestroySecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 767 return xxx_messageInfo_DestroySecretVersionRequest.Marshal(b, m, deterministic) 768} 769func (m *DestroySecretVersionRequest) XXX_Merge(src proto.Message) { 770 xxx_messageInfo_DestroySecretVersionRequest.Merge(m, src) 771} 772func (m *DestroySecretVersionRequest) XXX_Size() int { 773 return xxx_messageInfo_DestroySecretVersionRequest.Size(m) 774} 775func (m *DestroySecretVersionRequest) XXX_DiscardUnknown() { 776 xxx_messageInfo_DestroySecretVersionRequest.DiscardUnknown(m) 777} 778 779var xxx_messageInfo_DestroySecretVersionRequest proto.InternalMessageInfo 780 781func (m *DestroySecretVersionRequest) GetName() string { 782 if m != nil { 783 return m.Name 784 } 785 return "" 786} 787 788func init() { 789 proto.RegisterType((*ListSecretsRequest)(nil), "google.cloud.secrets.v1beta1.ListSecretsRequest") 790 proto.RegisterType((*ListSecretsResponse)(nil), "google.cloud.secrets.v1beta1.ListSecretsResponse") 791 proto.RegisterType((*CreateSecretRequest)(nil), "google.cloud.secrets.v1beta1.CreateSecretRequest") 792 proto.RegisterType((*AddSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.AddSecretVersionRequest") 793 proto.RegisterType((*GetSecretRequest)(nil), "google.cloud.secrets.v1beta1.GetSecretRequest") 794 proto.RegisterType((*ListSecretVersionsRequest)(nil), "google.cloud.secrets.v1beta1.ListSecretVersionsRequest") 795 proto.RegisterType((*ListSecretVersionsResponse)(nil), "google.cloud.secrets.v1beta1.ListSecretVersionsResponse") 796 proto.RegisterType((*GetSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.GetSecretVersionRequest") 797 proto.RegisterType((*UpdateSecretRequest)(nil), "google.cloud.secrets.v1beta1.UpdateSecretRequest") 798 proto.RegisterType((*AccessSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.AccessSecretVersionRequest") 799 proto.RegisterType((*AccessSecretVersionResponse)(nil), "google.cloud.secrets.v1beta1.AccessSecretVersionResponse") 800 proto.RegisterType((*DeleteSecretRequest)(nil), "google.cloud.secrets.v1beta1.DeleteSecretRequest") 801 proto.RegisterType((*DisableSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.DisableSecretVersionRequest") 802 proto.RegisterType((*EnableSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.EnableSecretVersionRequest") 803 proto.RegisterType((*DestroySecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.DestroySecretVersionRequest") 804} 805 806func init() { 807 proto.RegisterFile("google/cloud/secrets/v1beta1/service.proto", fileDescriptor_67a0e1a61a378c59) 808} 809 810var fileDescriptor_67a0e1a61a378c59 = []byte{ 811 // 1346 bytes of a gzipped FileDescriptorProto 812 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xbc, 0x58, 0xcd, 0x6f, 0x1b, 0x45, 813 0x1b, 0xd7, 0x38, 0x6f, 0xd3, 0x64, 0xe2, 0x17, 0xaa, 0x71, 0x69, 0xd2, 0x4d, 0x00, 0x6b, 0x29, 814 0x55, 0x70, 0xd2, 0x5d, 0x9c, 0x28, 0x4d, 0x71, 0xda, 0x92, 0x4d, 0x9a, 0x98, 0x00, 0x41, 0x96, 815 0x5d, 0x72, 0x40, 0x91, 0xa2, 0x89, 0x77, 0xe2, 0x2c, 0xb1, 0x77, 0x97, 0x9d, 0xb1, 0x43, 0x8a, 816 0x7a, 0x81, 0x0b, 0x12, 0x12, 0x17, 0x24, 0x0e, 0x88, 0x13, 0x07, 0x50, 0x2b, 0x2e, 0x5c, 0x40, 817 0x5c, 0x38, 0x20, 0x81, 0x44, 0x6f, 0xc0, 0x2d, 0xa7, 0x1e, 0xf8, 0x23, 0x10, 0x27, 0xb4, 0x33, 818 0xb3, 0xf6, 0xfa, 0x7b, 0x9d, 0x26, 0x9c, 0x12, 0x3f, 0x1f, 0xf3, 0xfc, 0x9e, 0xef, 0xc7, 0x86, 819 0xa9, 0x92, 0xe3, 0x94, 0xca, 0x44, 0x2f, 0x96, 0x9d, 0xaa, 0xa9, 0x53, 0x52, 0xf4, 0x08, 0xa3, 820 0x7a, 0x2d, 0xbd, 0x4b, 0x18, 0x4e, 0xeb, 0x94, 0x78, 0x35, 0xab, 0x48, 0x34, 0xd7, 0x73, 0x98, 821 0x83, 0xa6, 0x84, 0xac, 0xc6, 0x65, 0x35, 0x29, 0xab, 0x49, 0x59, 0x45, 0x72, 0x75, 0xec, 0x5a, 822 0x3a, 0xb6, 0x6d, 0x87, 0x61, 0x66, 0x39, 0x36, 0x15, 0xba, 0xca, 0x78, 0x88, 0x5b, 0x2c, 0x5b, 823 0xc4, 0x66, 0x92, 0xf1, 0x7c, 0x88, 0xb1, 0x67, 0x91, 0xb2, 0xb9, 0xb3, 0x4b, 0xf6, 0x71, 0xcd, 824 0x72, 0x3c, 0x29, 0x70, 0x39, 0x24, 0xe0, 0x11, 0xea, 0x54, 0xbd, 0x00, 0x90, 0x32, 0xdb, 0x13, 825 0x7c, 0x20, 0x1c, 0x40, 0x78, 0x4e, 0x4a, 0x5b, 0xb8, 0xa2, 0xd7, 0xd2, 0xfe, 0x9f, 0x1d, 0xd7, 826 0x29, 0x5b, 0xc5, 0x23, 0xc9, 0x57, 0x9a, 0xf9, 0x4d, 0xbc, 0x49, 0xc9, 0xe3, 0x9f, 0x76, 0xab, 827 0x7b, 0x3a, 0xa9, 0xb8, 0x2c, 0x60, 0x26, 0x5b, 0x99, 0xc2, 0x8f, 0x0a, 0xa6, 0x07, 0x42, 0x42, 828 0xfd, 0x06, 0x40, 0xf4, 0xa6, 0x45, 0x59, 0x41, 0x40, 0xcc, 0x93, 0xf7, 0xaa, 0x84, 0x32, 0xf4, 829 0x06, 0x1c, 0x76, 0xb1, 0x47, 0x6c, 0x36, 0x01, 0x92, 0x60, 0x7a, 0x74, 0x65, 0xfe, 0xb1, 0x11, 830 0xfb, 0xc7, 0xb8, 0x06, 0x67, 0xb8, 0x43, 0x01, 0xfe, 0x0a, 0xb6, 0x71, 0x89, 0x78, 0x9a, 0xb0, 831 0x82, 0x5d, 0x8b, 0x6a, 0x45, 0xa7, 0xa2, 0xe7, 0x3c, 0xe7, 0x5d, 0x52, 0x64, 0x79, 0xf9, 0x04, 832 0x4a, 0xc2, 0x51, 0x17, 0x97, 0xc8, 0x0e, 0xb5, 0xee, 0x91, 0x89, 0x58, 0x12, 0x4c, 0x9f, 0x5b, 833 0x19, 0x7a, 0x6c, 0x80, 0xfc, 0x88, 0x4f, 0x2d, 0x58, 0xf7, 0x08, 0x52, 0x21, 0xe4, 0x12, 0xcc, 834 0x39, 0x20, 0xf6, 0xc4, 0x10, 0x37, 0xc9, 0x45, 0xb8, 0xe2, 0x5d, 0x9f, 0xaa, 0x7e, 0x09, 0x60, 835 0xa2, 0x09, 0x29, 0x75, 0x1d, 0x9b, 0x12, 0x74, 0x1b, 0x9e, 0x97, 0xf1, 0x9d, 0x00, 0xc9, 0xa1, 836 0xe9, 0xb1, 0xb9, 0x2b, 0x5a, 0xaf, 0x6a, 0xd0, 0x84, 0x7e, 0x3e, 0x50, 0x42, 0x57, 0xe1, 0xd3, 837 0x36, 0x79, 0x9f, 0xed, 0x84, 0x00, 0xf8, 0x18, 0x47, 0xf3, 0xff, 0xf7, 0xc9, 0xb9, 0xc0, 0x3e, 838 0x7a, 0x16, 0x42, 0xe6, 0x30, 0x5c, 0x16, 0x6e, 0xf8, 0x18, 0xcf, 0xe5, 0x47, 0x39, 0xc5, 0x77, 839 0x41, 0xfd, 0x19, 0xc0, 0xc4, 0xaa, 0x47, 0x30, 0x23, 0xd2, 0xc0, 0x19, 0x45, 0x52, 0xc0, 0xde, 840 0xb1, 0x4c, 0x81, 0xd2, 0x0f, 0x53, 0x2c, 0x3f, 0x22, 0xa8, 0x1b, 0x26, 0xba, 0x09, 0x87, 0xc5, 841 0xff, 0x1c, 0x61, 0xd4, 0x60, 0x48, 0x1d, 0xf5, 0x21, 0x80, 0xe3, 0x86, 0x69, 0x0a, 0xea, 0x16, 842 0xf1, 0xa8, 0xe5, 0xd8, 0x81, 0x23, 0xab, 0x2d, 0x8e, 0xcc, 0x70, 0x47, 0x5e, 0x84, 0x2f, 0x08, 843 0xdd, 0x2e, 0x1e, 0x04, 0x06, 0xa4, 0x03, 0xaf, 0xc3, 0xf3, 0x2e, 0x3e, 0x2a, 0x3b, 0x58, 0xc0, 844 0x1f, 0x9b, 0x9b, 0x89, 0x82, 0x2f, 0x27, 0x54, 0x84, 0xaf, 0xc1, 0x03, 0x6a, 0x01, 0x5e, 0xc8, 845 0x12, 0xd6, 0x1c, 0xed, 0x57, 0xe1, 0xff, 0x6c, 0x5c, 0x21, 0x27, 0x81, 0xc8, 0x15, 0xd5, 0xaf, 846 0x01, 0xbc, 0xdc, 0xa8, 0x32, 0x19, 0x02, 0x7a, 0xaa, 0x31, 0x38, 0x9d, 0x76, 0xf8, 0x16, 0x40, 847 0xa5, 0x13, 0x50, 0xd9, 0x15, 0x59, 0x38, 0x52, 0x93, 0x34, 0xd9, 0x16, 0x91, 0x22, 0x1d, 0xe4, 848 0xbc, 0xae, 0x7c, 0x5a, 0xed, 0x81, 0xe1, 0x78, 0x3d, 0x59, 0x2d, 0x85, 0xb5, 0xde, 0x94, 0xb3, 849 0x39, 0x1e, 0xd2, 0x59, 0x98, 0x8a, 0x10, 0xd2, 0xe0, 0x21, 0x91, 0xba, 0x2f, 0x00, 0x4c, 0xbc, 850 0xed, 0x9a, 0x6d, 0x1d, 0x68, 0xd4, 0x5b, 0x02, 0x44, 0x6f, 0x09, 0x51, 0x6b, 0x52, 0x11, 0x2d, 851 0xc3, 0xb1, 0x2a, 0x7f, 0x99, 0x8f, 0x4e, 0x59, 0xba, 0x4a, 0xf0, 0x4e, 0x30, 0x5d, 0xb5, 0x75, 852 0x7f, 0xba, 0x6e, 0x62, 0x7a, 0x20, 0xb4, 0xa1, 0xd0, 0xf1, 0x09, 0xaa, 0x09, 0x15, 0xa3, 0x58, 853 0x24, 0x94, 0x9e, 0x69, 0x08, 0x1e, 0x00, 0x38, 0xd9, 0xd1, 0x8c, 0xac, 0x8a, 0xd5, 0x26, 0x3b, 854 0xfa, 0x89, 0x8c, 0xa0, 0xb5, 0x27, 0xe9, 0xe1, 0x46, 0xfb, 0x6e, 0xc1, 0xc4, 0x1d, 0x52, 0x26, 855 0xad, 0xd9, 0x7a, 0xe2, 0x0e, 0x26, 0x70, 0xf2, 0x8e, 0x45, 0xf1, 0x6e, 0x99, 0x9c, 0x69, 0xa8, 856 0x4d, 0xa8, 0xac, 0xd9, 0x67, 0x6e, 0xc5, 0x77, 0x86, 0x50, 0xe6, 0x39, 0x47, 0x67, 0x69, 0x66, 857 0xee, 0xa3, 0x4b, 0xf0, 0xa2, 0xa0, 0x6f, 0x0a, 0xa5, 0x82, 0x38, 0xaf, 0xd0, 0x03, 0x00, 0xc7, 858 0x42, 0x4b, 0x17, 0xbd, 0xdc, 0x3b, 0xd5, 0xed, 0x97, 0x84, 0x92, 0x1e, 0x40, 0x43, 0x54, 0xa9, 859 0xba, 0x70, 0x6c, 0xc8, 0x59, 0xf9, 0xe1, 0x9f, 0x7f, 0x7d, 0x16, 0xbb, 0x8a, 0xae, 0xd4, 0x2f, 860 0xa7, 0x0f, 0x04, 0xfd, 0x96, 0x2b, 0x16, 0x23, 0xd5, 0x53, 0xf7, 0x83, 0xeb, 0x0a, 0xfd, 0x00, 861 0x60, 0x3c, 0xbc, 0x81, 0x51, 0x1f, 0xd3, 0x1d, 0xb6, 0xb5, 0x12, 0x69, 0x36, 0xa8, 0x6f, 0x1d, 862 0x1b, 0xe3, 0x02, 0xc8, 0x6c, 0x7d, 0x1d, 0xcb, 0xff, 0x38, 0x62, 0x4d, 0x8d, 0x84, 0x38, 0x13, 863 0x8c, 0x97, 0x5f, 0x00, 0xbc, 0xd0, 0xba, 0x76, 0xd1, 0x42, 0x6f, 0x28, 0x5d, 0xd6, 0xb4, 0x32, 864 0xc8, 0x98, 0x57, 0x37, 0x8f, 0x8d, 0xa7, 0xa4, 0x23, 0xb2, 0x2d, 0x39, 0xfe, 0xeb, 0x6a, 0xba, 865 0x07, 0xfe, 0xfa, 0x39, 0x9b, 0xba, 0x9f, 0xc1, 0xa6, 0x29, 0xdf, 0xca, 0x80, 0x14, 0xfa, 0x1c, 866 0xc0, 0xd1, 0xfa, 0x94, 0x47, 0x5a, 0x6f, 0x24, 0xad, 0xbb, 0x3b, 0x62, 0xec, 0xe7, 0x8f, 0x0d, 867 0x5e, 0xb3, 0xed, 0xa5, 0xe1, 0x53, 0x3b, 0xc3, 0x44, 0x3f, 0x02, 0x18, 0x0f, 0xaf, 0x86, 0x7e, 868 0xa5, 0xd1, 0x61, 0x8d, 0x44, 0x84, 0x97, 0x3b, 0x36, 0x90, 0x60, 0xcd, 0x86, 0x36, 0x06, 0x07, 869 0xbb, 0x30, 0x37, 0xd3, 0x00, 0x2b, 0x64, 0xb4, 0xee, 0x98, 0xeb, 0xc5, 0xf1, 0x29, 0x80, 0xf1, 870 0xf0, 0xa0, 0xec, 0x87, 0xbd, 0xc3, 0x50, 0x55, 0x2e, 0xb5, 0xad, 0xaa, 0x35, 0xff, 0x5b, 0x42, 871 0x4b, 0x30, 0x53, 0xd1, 0x82, 0xf9, 0x5b, 0xd3, 0x57, 0x86, 0xe0, 0xf2, 0x40, 0x8b, 0x51, 0x1b, 872 0xbd, 0xe5, 0xa8, 0x52, 0x6e, 0x0c, 0xae, 0x28, 0x07, 0xc5, 0x72, 0xf3, 0xa0, 0x48, 0x23, 0x3d, 873 0x5a, 0xd9, 0xea, 0xf5, 0xeb, 0xe6, 0x7b, 0x10, 0x3a, 0x22, 0x23, 0x76, 0x5e, 0x97, 0x3b, 0x66, 874 0xb0, 0xce, 0xbb, 0x1d, 0x8e, 0x7c, 0x13, 0xf0, 0xae, 0x91, 0xaf, 0xa3, 0xf6, 0x93, 0xf0, 0x3b, 875 0x80, 0x89, 0x0e, 0x9b, 0x1e, 0xf5, 0x09, 0x66, 0xf7, 0x1b, 0x44, 0x79, 0xe5, 0x04, 0x9a, 0x32, 876 0x0f, 0x6b, 0x61, 0x67, 0x6e, 0xa0, 0xeb, 0x03, 0x3a, 0x93, 0xc1, 0xfc, 0x6d, 0xbf, 0xb0, 0x2e, 877 0x76, 0x5a, 0xdd, 0xa8, 0x0f, 0xb4, 0x1e, 0xeb, 0x7e, 0xb0, 0xa4, 0x6c, 0x84, 0xfd, 0xb8, 0xa9, 878 0x2e, 0x0e, 0xea, 0x87, 0x29, 0x80, 0xf8, 0xa3, 0xf0, 0x57, 0x00, 0x13, 0x1d, 0xee, 0x83, 0x7e, 879 0xf9, 0xe9, 0x7e, 0x52, 0x0c, 0xe6, 0xc9, 0x6b, 0x61, 0x4f, 0x96, 0xd4, 0x81, 0x33, 0x42, 0xec, 880 0xc0, 0x11, 0x9e, 0x94, 0x0e, 0x27, 0x48, 0xdf, 0xa4, 0x74, 0x3f, 0x5b, 0xfe, 0xe3, 0xa4, 0x08, 881 0x20, 0xbe, 0x2f, 0x9f, 0x00, 0x18, 0x2f, 0x10, 0xb6, 0x81, 0x2b, 0x39, 0xfe, 0x13, 0x0a, 0x52, 882 0x03, 0x20, 0x16, 0xae, 0x68, 0x35, 0xdf, 0x72, 0x83, 0x19, 0x80, 0x7d, 0xa6, 0x45, 0x46, 0x70, 883 0xd5, 0x65, 0x8e, 0x27, 0xa3, 0x2e, 0x34, 0xf0, 0x04, 0x5f, 0xe6, 0xbb, 0x0c, 0x74, 0x1a, 0x7a, 884 0xdc, 0x47, 0xf3, 0x31, 0x80, 0xf1, 0x6c, 0x2f, 0x34, 0xd9, 0xe8, 0x68, 0x6e, 0x71, 0x34, 0x8b, 885 0x28, 0x3a, 0x9a, 0x52, 0xd8, 0xf2, 0x77, 0x00, 0xa2, 0xbb, 0x84, 0x72, 0x0a, 0xf1, 0x2a, 0x16, 886 0x15, 0xd3, 0x71, 0xba, 0xc5, 0x58, 0xbb, 0x48, 0x00, 0xeb, 0xa5, 0x08, 0x92, 0x72, 0x58, 0xac, 887 0x73, 0xa8, 0xcb, 0xea, 0x52, 0x64, 0xa8, 0xac, 0xed, 0xb1, 0x0c, 0x48, 0x29, 0xb9, 0x47, 0xc6, 888 0x54, 0xaf, 0x43, 0xf7, 0x0f, 0x43, 0xdb, 0x67, 0xcc, 0xa5, 0x19, 0x5d, 0x3f, 0x3c, 0x3c, 0x6c, 889 0xbd, 0x82, 0x71, 0x95, 0xed, 0x8b, 0x5f, 0xe7, 0xae, 0xb9, 0x65, 0xcc, 0xf6, 0x1c, 0xaf, 0xb2, 890 0xf2, 0x13, 0x80, 0xc9, 0xa2, 0x53, 0xe9, 0x59, 0x9c, 0x2b, 0x71, 0x79, 0xad, 0xe6, 0xfc, 0x4d, 891 0x9a, 0x03, 0xef, 0xac, 0x4a, 0xe9, 0x92, 0x53, 0xc6, 0x76, 0x49, 0x73, 0xbc, 0x92, 0x5e, 0x22, 892 0x36, 0xdf, 0xb3, 0x7a, 0xc3, 0x66, 0xe7, 0x1f, 0x02, 0x97, 0xe4, 0xe7, 0xbf, 0x01, 0xf8, 0x2a, 893 0x36, 0x94, 0x2d, 0x6c, 0x3e, 0x8c, 0x4d, 0x65, 0xc5, 0x73, 0xab, 0xdc, 0xb8, 0xb4, 0xa5, 0x6d, 894 0xa5, 0x57, 0x7c, 0xf9, 0x47, 0x01, 0x7b, 0x9b, 0xb3, 0xb7, 0x25, 0x7b, 0x7b, 0x4b, 0x3c, 0xb7, 895 0x3b, 0xcc, 0xcd, 0xce, 0xff, 0x1b, 0x00, 0x00, 0xff, 0xff, 0xab, 0x76, 0x41, 0xdf, 0x3b, 0x15, 896 0x00, 0x00, 897} 898 899// Reference imports to suppress errors if they are not otherwise used. 900var _ context.Context 901var _ grpc.ClientConn 902 903// This is a compile-time assertion to ensure that this generated file 904// is compatible with the grpc package it is being compiled against. 905const _ = grpc.SupportPackageIsVersion4 906 907// SecretManagerServiceClient is the client API for SecretManagerService service. 908// 909// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream. 910type SecretManagerServiceClient interface { 911 // Lists [Secrets][google.cloud.secrets.v1beta1.Secret]. 912 ListSecrets(ctx context.Context, in *ListSecretsRequest, opts ...grpc.CallOption) (*ListSecretsResponse, error) 913 // Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. 914 CreateSecret(ctx context.Context, in *CreateSecretRequest, opts ...grpc.CallOption) (*Secret, error) 915 // Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret data and attaches 916 // it to an existing [Secret][google.cloud.secrets.v1beta1.Secret]. 917 AddSecretVersion(ctx context.Context, in *AddSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) 918 // Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret]. 919 GetSecret(ctx context.Context, in *GetSecretRequest, opts ...grpc.CallOption) (*Secret, error) 920 // Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret]. 921 UpdateSecret(ctx context.Context, in *UpdateSecretRequest, opts ...grpc.CallOption) (*Secret, error) 922 // Deletes a [Secret][google.cloud.secrets.v1beta1.Secret]. 923 DeleteSecret(ctx context.Context, in *DeleteSecretRequest, opts ...grpc.CallOption) (*empty.Empty, error) 924 // Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return secret 925 // data. 926 ListSecretVersions(ctx context.Context, in *ListSecretVersionsRequest, opts ...grpc.CallOption) (*ListSecretVersionsResponse, error) 927 // Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 928 // 929 // `projects/*/secrets/*/versions/latest` is an alias to the `latest` 930 // [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 931 GetSecretVersion(ctx context.Context, in *GetSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) 932 // Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the secret data. 933 // 934 // `projects/*/secrets/*/versions/latest` is an alias to the `latest` 935 // [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 936 AccessSecretVersion(ctx context.Context, in *AccessSecretVersionRequest, opts ...grpc.CallOption) (*AccessSecretVersionResponse, error) 937 // Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 938 // 939 // Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to 940 // [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED]. 941 DisableSecretVersion(ctx context.Context, in *DisableSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) 942 // Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 943 // 944 // Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to 945 // [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED]. 946 EnableSecretVersion(ctx context.Context, in *EnableSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) 947 // Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 948 // 949 // Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to 950 // [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably destroys the 951 // secret data. 952 DestroySecretVersion(ctx context.Context, in *DestroySecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) 953 // Sets the access control policy on the specified secret. Replaces any 954 // existing policy. 955 // 956 // Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced according 957 // to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret]. 958 SetIamPolicy(ctx context.Context, in *v1.SetIamPolicyRequest, opts ...grpc.CallOption) (*v1.Policy, error) 959 // Gets the access control policy for a secret. 960 // Returns empty policy if the secret exists and does not have a policy set. 961 GetIamPolicy(ctx context.Context, in *v1.GetIamPolicyRequest, opts ...grpc.CallOption) (*v1.Policy, error) 962 // Returns permissions that a caller has for the specified secret. 963 // If the secret does not exist, this call returns an empty set of 964 // permissions, not a NOT_FOUND error. 965 // 966 // Note: This operation is designed to be used for building permission-aware 967 // UIs and command-line tools, not for authorization checking. This operation 968 // may "fail open" without warning. 969 TestIamPermissions(ctx context.Context, in *v1.TestIamPermissionsRequest, opts ...grpc.CallOption) (*v1.TestIamPermissionsResponse, error) 970} 971 972type secretManagerServiceClient struct { 973 cc *grpc.ClientConn 974} 975 976func NewSecretManagerServiceClient(cc *grpc.ClientConn) SecretManagerServiceClient { 977 return &secretManagerServiceClient{cc} 978} 979 980func (c *secretManagerServiceClient) ListSecrets(ctx context.Context, in *ListSecretsRequest, opts ...grpc.CallOption) (*ListSecretsResponse, error) { 981 out := new(ListSecretsResponse) 982 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/ListSecrets", in, out, opts...) 983 if err != nil { 984 return nil, err 985 } 986 return out, nil 987} 988 989func (c *secretManagerServiceClient) CreateSecret(ctx context.Context, in *CreateSecretRequest, opts ...grpc.CallOption) (*Secret, error) { 990 out := new(Secret) 991 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/CreateSecret", in, out, opts...) 992 if err != nil { 993 return nil, err 994 } 995 return out, nil 996} 997 998func (c *secretManagerServiceClient) AddSecretVersion(ctx context.Context, in *AddSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) { 999 out := new(SecretVersion) 1000 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/AddSecretVersion", in, out, opts...) 1001 if err != nil { 1002 return nil, err 1003 } 1004 return out, nil 1005} 1006 1007func (c *secretManagerServiceClient) GetSecret(ctx context.Context, in *GetSecretRequest, opts ...grpc.CallOption) (*Secret, error) { 1008 out := new(Secret) 1009 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/GetSecret", in, out, opts...) 1010 if err != nil { 1011 return nil, err 1012 } 1013 return out, nil 1014} 1015 1016func (c *secretManagerServiceClient) UpdateSecret(ctx context.Context, in *UpdateSecretRequest, opts ...grpc.CallOption) (*Secret, error) { 1017 out := new(Secret) 1018 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/UpdateSecret", in, out, opts...) 1019 if err != nil { 1020 return nil, err 1021 } 1022 return out, nil 1023} 1024 1025func (c *secretManagerServiceClient) DeleteSecret(ctx context.Context, in *DeleteSecretRequest, opts ...grpc.CallOption) (*empty.Empty, error) { 1026 out := new(empty.Empty) 1027 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/DeleteSecret", in, out, opts...) 1028 if err != nil { 1029 return nil, err 1030 } 1031 return out, nil 1032} 1033 1034func (c *secretManagerServiceClient) ListSecretVersions(ctx context.Context, in *ListSecretVersionsRequest, opts ...grpc.CallOption) (*ListSecretVersionsResponse, error) { 1035 out := new(ListSecretVersionsResponse) 1036 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/ListSecretVersions", in, out, opts...) 1037 if err != nil { 1038 return nil, err 1039 } 1040 return out, nil 1041} 1042 1043func (c *secretManagerServiceClient) GetSecretVersion(ctx context.Context, in *GetSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) { 1044 out := new(SecretVersion) 1045 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/GetSecretVersion", in, out, opts...) 1046 if err != nil { 1047 return nil, err 1048 } 1049 return out, nil 1050} 1051 1052func (c *secretManagerServiceClient) AccessSecretVersion(ctx context.Context, in *AccessSecretVersionRequest, opts ...grpc.CallOption) (*AccessSecretVersionResponse, error) { 1053 out := new(AccessSecretVersionResponse) 1054 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/AccessSecretVersion", in, out, opts...) 1055 if err != nil { 1056 return nil, err 1057 } 1058 return out, nil 1059} 1060 1061func (c *secretManagerServiceClient) DisableSecretVersion(ctx context.Context, in *DisableSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) { 1062 out := new(SecretVersion) 1063 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/DisableSecretVersion", in, out, opts...) 1064 if err != nil { 1065 return nil, err 1066 } 1067 return out, nil 1068} 1069 1070func (c *secretManagerServiceClient) EnableSecretVersion(ctx context.Context, in *EnableSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) { 1071 out := new(SecretVersion) 1072 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/EnableSecretVersion", in, out, opts...) 1073 if err != nil { 1074 return nil, err 1075 } 1076 return out, nil 1077} 1078 1079func (c *secretManagerServiceClient) DestroySecretVersion(ctx context.Context, in *DestroySecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) { 1080 out := new(SecretVersion) 1081 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/DestroySecretVersion", in, out, opts...) 1082 if err != nil { 1083 return nil, err 1084 } 1085 return out, nil 1086} 1087 1088func (c *secretManagerServiceClient) SetIamPolicy(ctx context.Context, in *v1.SetIamPolicyRequest, opts ...grpc.CallOption) (*v1.Policy, error) { 1089 out := new(v1.Policy) 1090 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/SetIamPolicy", in, out, opts...) 1091 if err != nil { 1092 return nil, err 1093 } 1094 return out, nil 1095} 1096 1097func (c *secretManagerServiceClient) GetIamPolicy(ctx context.Context, in *v1.GetIamPolicyRequest, opts ...grpc.CallOption) (*v1.Policy, error) { 1098 out := new(v1.Policy) 1099 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/GetIamPolicy", in, out, opts...) 1100 if err != nil { 1101 return nil, err 1102 } 1103 return out, nil 1104} 1105 1106func (c *secretManagerServiceClient) TestIamPermissions(ctx context.Context, in *v1.TestIamPermissionsRequest, opts ...grpc.CallOption) (*v1.TestIamPermissionsResponse, error) { 1107 out := new(v1.TestIamPermissionsResponse) 1108 err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/TestIamPermissions", in, out, opts...) 1109 if err != nil { 1110 return nil, err 1111 } 1112 return out, nil 1113} 1114 1115// SecretManagerServiceServer is the server API for SecretManagerService service. 1116type SecretManagerServiceServer interface { 1117 // Lists [Secrets][google.cloud.secrets.v1beta1.Secret]. 1118 ListSecrets(context.Context, *ListSecretsRequest) (*ListSecretsResponse, error) 1119 // Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. 1120 CreateSecret(context.Context, *CreateSecretRequest) (*Secret, error) 1121 // Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret data and attaches 1122 // it to an existing [Secret][google.cloud.secrets.v1beta1.Secret]. 1123 AddSecretVersion(context.Context, *AddSecretVersionRequest) (*SecretVersion, error) 1124 // Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret]. 1125 GetSecret(context.Context, *GetSecretRequest) (*Secret, error) 1126 // Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret]. 1127 UpdateSecret(context.Context, *UpdateSecretRequest) (*Secret, error) 1128 // Deletes a [Secret][google.cloud.secrets.v1beta1.Secret]. 1129 DeleteSecret(context.Context, *DeleteSecretRequest) (*empty.Empty, error) 1130 // Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return secret 1131 // data. 1132 ListSecretVersions(context.Context, *ListSecretVersionsRequest) (*ListSecretVersionsResponse, error) 1133 // Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 1134 // 1135 // `projects/*/secrets/*/versions/latest` is an alias to the `latest` 1136 // [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 1137 GetSecretVersion(context.Context, *GetSecretVersionRequest) (*SecretVersion, error) 1138 // Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the secret data. 1139 // 1140 // `projects/*/secrets/*/versions/latest` is an alias to the `latest` 1141 // [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 1142 AccessSecretVersion(context.Context, *AccessSecretVersionRequest) (*AccessSecretVersionResponse, error) 1143 // Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 1144 // 1145 // Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to 1146 // [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED]. 1147 DisableSecretVersion(context.Context, *DisableSecretVersionRequest) (*SecretVersion, error) 1148 // Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 1149 // 1150 // Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to 1151 // [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED]. 1152 EnableSecretVersion(context.Context, *EnableSecretVersionRequest) (*SecretVersion, error) 1153 // Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. 1154 // 1155 // Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to 1156 // [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably destroys the 1157 // secret data. 1158 DestroySecretVersion(context.Context, *DestroySecretVersionRequest) (*SecretVersion, error) 1159 // Sets the access control policy on the specified secret. Replaces any 1160 // existing policy. 1161 // 1162 // Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced according 1163 // to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret]. 1164 SetIamPolicy(context.Context, *v1.SetIamPolicyRequest) (*v1.Policy, error) 1165 // Gets the access control policy for a secret. 1166 // Returns empty policy if the secret exists and does not have a policy set. 1167 GetIamPolicy(context.Context, *v1.GetIamPolicyRequest) (*v1.Policy, error) 1168 // Returns permissions that a caller has for the specified secret. 1169 // If the secret does not exist, this call returns an empty set of 1170 // permissions, not a NOT_FOUND error. 1171 // 1172 // Note: This operation is designed to be used for building permission-aware 1173 // UIs and command-line tools, not for authorization checking. This operation 1174 // may "fail open" without warning. 1175 TestIamPermissions(context.Context, *v1.TestIamPermissionsRequest) (*v1.TestIamPermissionsResponse, error) 1176} 1177 1178// UnimplementedSecretManagerServiceServer can be embedded to have forward compatible implementations. 1179type UnimplementedSecretManagerServiceServer struct { 1180} 1181 1182func (*UnimplementedSecretManagerServiceServer) ListSecrets(ctx context.Context, req *ListSecretsRequest) (*ListSecretsResponse, error) { 1183 return nil, status.Errorf(codes.Unimplemented, "method ListSecrets not implemented") 1184} 1185func (*UnimplementedSecretManagerServiceServer) CreateSecret(ctx context.Context, req *CreateSecretRequest) (*Secret, error) { 1186 return nil, status.Errorf(codes.Unimplemented, "method CreateSecret not implemented") 1187} 1188func (*UnimplementedSecretManagerServiceServer) AddSecretVersion(ctx context.Context, req *AddSecretVersionRequest) (*SecretVersion, error) { 1189 return nil, status.Errorf(codes.Unimplemented, "method AddSecretVersion not implemented") 1190} 1191func (*UnimplementedSecretManagerServiceServer) GetSecret(ctx context.Context, req *GetSecretRequest) (*Secret, error) { 1192 return nil, status.Errorf(codes.Unimplemented, "method GetSecret not implemented") 1193} 1194func (*UnimplementedSecretManagerServiceServer) UpdateSecret(ctx context.Context, req *UpdateSecretRequest) (*Secret, error) { 1195 return nil, status.Errorf(codes.Unimplemented, "method UpdateSecret not implemented") 1196} 1197func (*UnimplementedSecretManagerServiceServer) DeleteSecret(ctx context.Context, req *DeleteSecretRequest) (*empty.Empty, error) { 1198 return nil, status.Errorf(codes.Unimplemented, "method DeleteSecret not implemented") 1199} 1200func (*UnimplementedSecretManagerServiceServer) ListSecretVersions(ctx context.Context, req *ListSecretVersionsRequest) (*ListSecretVersionsResponse, error) { 1201 return nil, status.Errorf(codes.Unimplemented, "method ListSecretVersions not implemented") 1202} 1203func (*UnimplementedSecretManagerServiceServer) GetSecretVersion(ctx context.Context, req *GetSecretVersionRequest) (*SecretVersion, error) { 1204 return nil, status.Errorf(codes.Unimplemented, "method GetSecretVersion not implemented") 1205} 1206func (*UnimplementedSecretManagerServiceServer) AccessSecretVersion(ctx context.Context, req *AccessSecretVersionRequest) (*AccessSecretVersionResponse, error) { 1207 return nil, status.Errorf(codes.Unimplemented, "method AccessSecretVersion not implemented") 1208} 1209func (*UnimplementedSecretManagerServiceServer) DisableSecretVersion(ctx context.Context, req *DisableSecretVersionRequest) (*SecretVersion, error) { 1210 return nil, status.Errorf(codes.Unimplemented, "method DisableSecretVersion not implemented") 1211} 1212func (*UnimplementedSecretManagerServiceServer) EnableSecretVersion(ctx context.Context, req *EnableSecretVersionRequest) (*SecretVersion, error) { 1213 return nil, status.Errorf(codes.Unimplemented, "method EnableSecretVersion not implemented") 1214} 1215func (*UnimplementedSecretManagerServiceServer) DestroySecretVersion(ctx context.Context, req *DestroySecretVersionRequest) (*SecretVersion, error) { 1216 return nil, status.Errorf(codes.Unimplemented, "method DestroySecretVersion not implemented") 1217} 1218func (*UnimplementedSecretManagerServiceServer) SetIamPolicy(ctx context.Context, req *v1.SetIamPolicyRequest) (*v1.Policy, error) { 1219 return nil, status.Errorf(codes.Unimplemented, "method SetIamPolicy not implemented") 1220} 1221func (*UnimplementedSecretManagerServiceServer) GetIamPolicy(ctx context.Context, req *v1.GetIamPolicyRequest) (*v1.Policy, error) { 1222 return nil, status.Errorf(codes.Unimplemented, "method GetIamPolicy not implemented") 1223} 1224func (*UnimplementedSecretManagerServiceServer) TestIamPermissions(ctx context.Context, req *v1.TestIamPermissionsRequest) (*v1.TestIamPermissionsResponse, error) { 1225 return nil, status.Errorf(codes.Unimplemented, "method TestIamPermissions not implemented") 1226} 1227 1228func RegisterSecretManagerServiceServer(s *grpc.Server, srv SecretManagerServiceServer) { 1229 s.RegisterService(&_SecretManagerService_serviceDesc, srv) 1230} 1231 1232func _SecretManagerService_ListSecrets_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1233 in := new(ListSecretsRequest) 1234 if err := dec(in); err != nil { 1235 return nil, err 1236 } 1237 if interceptor == nil { 1238 return srv.(SecretManagerServiceServer).ListSecrets(ctx, in) 1239 } 1240 info := &grpc.UnaryServerInfo{ 1241 Server: srv, 1242 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/ListSecrets", 1243 } 1244 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1245 return srv.(SecretManagerServiceServer).ListSecrets(ctx, req.(*ListSecretsRequest)) 1246 } 1247 return interceptor(ctx, in, info, handler) 1248} 1249 1250func _SecretManagerService_CreateSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1251 in := new(CreateSecretRequest) 1252 if err := dec(in); err != nil { 1253 return nil, err 1254 } 1255 if interceptor == nil { 1256 return srv.(SecretManagerServiceServer).CreateSecret(ctx, in) 1257 } 1258 info := &grpc.UnaryServerInfo{ 1259 Server: srv, 1260 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/CreateSecret", 1261 } 1262 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1263 return srv.(SecretManagerServiceServer).CreateSecret(ctx, req.(*CreateSecretRequest)) 1264 } 1265 return interceptor(ctx, in, info, handler) 1266} 1267 1268func _SecretManagerService_AddSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1269 in := new(AddSecretVersionRequest) 1270 if err := dec(in); err != nil { 1271 return nil, err 1272 } 1273 if interceptor == nil { 1274 return srv.(SecretManagerServiceServer).AddSecretVersion(ctx, in) 1275 } 1276 info := &grpc.UnaryServerInfo{ 1277 Server: srv, 1278 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/AddSecretVersion", 1279 } 1280 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1281 return srv.(SecretManagerServiceServer).AddSecretVersion(ctx, req.(*AddSecretVersionRequest)) 1282 } 1283 return interceptor(ctx, in, info, handler) 1284} 1285 1286func _SecretManagerService_GetSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1287 in := new(GetSecretRequest) 1288 if err := dec(in); err != nil { 1289 return nil, err 1290 } 1291 if interceptor == nil { 1292 return srv.(SecretManagerServiceServer).GetSecret(ctx, in) 1293 } 1294 info := &grpc.UnaryServerInfo{ 1295 Server: srv, 1296 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/GetSecret", 1297 } 1298 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1299 return srv.(SecretManagerServiceServer).GetSecret(ctx, req.(*GetSecretRequest)) 1300 } 1301 return interceptor(ctx, in, info, handler) 1302} 1303 1304func _SecretManagerService_UpdateSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1305 in := new(UpdateSecretRequest) 1306 if err := dec(in); err != nil { 1307 return nil, err 1308 } 1309 if interceptor == nil { 1310 return srv.(SecretManagerServiceServer).UpdateSecret(ctx, in) 1311 } 1312 info := &grpc.UnaryServerInfo{ 1313 Server: srv, 1314 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/UpdateSecret", 1315 } 1316 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1317 return srv.(SecretManagerServiceServer).UpdateSecret(ctx, req.(*UpdateSecretRequest)) 1318 } 1319 return interceptor(ctx, in, info, handler) 1320} 1321 1322func _SecretManagerService_DeleteSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1323 in := new(DeleteSecretRequest) 1324 if err := dec(in); err != nil { 1325 return nil, err 1326 } 1327 if interceptor == nil { 1328 return srv.(SecretManagerServiceServer).DeleteSecret(ctx, in) 1329 } 1330 info := &grpc.UnaryServerInfo{ 1331 Server: srv, 1332 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/DeleteSecret", 1333 } 1334 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1335 return srv.(SecretManagerServiceServer).DeleteSecret(ctx, req.(*DeleteSecretRequest)) 1336 } 1337 return interceptor(ctx, in, info, handler) 1338} 1339 1340func _SecretManagerService_ListSecretVersions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1341 in := new(ListSecretVersionsRequest) 1342 if err := dec(in); err != nil { 1343 return nil, err 1344 } 1345 if interceptor == nil { 1346 return srv.(SecretManagerServiceServer).ListSecretVersions(ctx, in) 1347 } 1348 info := &grpc.UnaryServerInfo{ 1349 Server: srv, 1350 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/ListSecretVersions", 1351 } 1352 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1353 return srv.(SecretManagerServiceServer).ListSecretVersions(ctx, req.(*ListSecretVersionsRequest)) 1354 } 1355 return interceptor(ctx, in, info, handler) 1356} 1357 1358func _SecretManagerService_GetSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1359 in := new(GetSecretVersionRequest) 1360 if err := dec(in); err != nil { 1361 return nil, err 1362 } 1363 if interceptor == nil { 1364 return srv.(SecretManagerServiceServer).GetSecretVersion(ctx, in) 1365 } 1366 info := &grpc.UnaryServerInfo{ 1367 Server: srv, 1368 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/GetSecretVersion", 1369 } 1370 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1371 return srv.(SecretManagerServiceServer).GetSecretVersion(ctx, req.(*GetSecretVersionRequest)) 1372 } 1373 return interceptor(ctx, in, info, handler) 1374} 1375 1376func _SecretManagerService_AccessSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1377 in := new(AccessSecretVersionRequest) 1378 if err := dec(in); err != nil { 1379 return nil, err 1380 } 1381 if interceptor == nil { 1382 return srv.(SecretManagerServiceServer).AccessSecretVersion(ctx, in) 1383 } 1384 info := &grpc.UnaryServerInfo{ 1385 Server: srv, 1386 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/AccessSecretVersion", 1387 } 1388 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1389 return srv.(SecretManagerServiceServer).AccessSecretVersion(ctx, req.(*AccessSecretVersionRequest)) 1390 } 1391 return interceptor(ctx, in, info, handler) 1392} 1393 1394func _SecretManagerService_DisableSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1395 in := new(DisableSecretVersionRequest) 1396 if err := dec(in); err != nil { 1397 return nil, err 1398 } 1399 if interceptor == nil { 1400 return srv.(SecretManagerServiceServer).DisableSecretVersion(ctx, in) 1401 } 1402 info := &grpc.UnaryServerInfo{ 1403 Server: srv, 1404 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/DisableSecretVersion", 1405 } 1406 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1407 return srv.(SecretManagerServiceServer).DisableSecretVersion(ctx, req.(*DisableSecretVersionRequest)) 1408 } 1409 return interceptor(ctx, in, info, handler) 1410} 1411 1412func _SecretManagerService_EnableSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1413 in := new(EnableSecretVersionRequest) 1414 if err := dec(in); err != nil { 1415 return nil, err 1416 } 1417 if interceptor == nil { 1418 return srv.(SecretManagerServiceServer).EnableSecretVersion(ctx, in) 1419 } 1420 info := &grpc.UnaryServerInfo{ 1421 Server: srv, 1422 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/EnableSecretVersion", 1423 } 1424 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1425 return srv.(SecretManagerServiceServer).EnableSecretVersion(ctx, req.(*EnableSecretVersionRequest)) 1426 } 1427 return interceptor(ctx, in, info, handler) 1428} 1429 1430func _SecretManagerService_DestroySecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1431 in := new(DestroySecretVersionRequest) 1432 if err := dec(in); err != nil { 1433 return nil, err 1434 } 1435 if interceptor == nil { 1436 return srv.(SecretManagerServiceServer).DestroySecretVersion(ctx, in) 1437 } 1438 info := &grpc.UnaryServerInfo{ 1439 Server: srv, 1440 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/DestroySecretVersion", 1441 } 1442 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1443 return srv.(SecretManagerServiceServer).DestroySecretVersion(ctx, req.(*DestroySecretVersionRequest)) 1444 } 1445 return interceptor(ctx, in, info, handler) 1446} 1447 1448func _SecretManagerService_SetIamPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1449 in := new(v1.SetIamPolicyRequest) 1450 if err := dec(in); err != nil { 1451 return nil, err 1452 } 1453 if interceptor == nil { 1454 return srv.(SecretManagerServiceServer).SetIamPolicy(ctx, in) 1455 } 1456 info := &grpc.UnaryServerInfo{ 1457 Server: srv, 1458 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/SetIamPolicy", 1459 } 1460 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1461 return srv.(SecretManagerServiceServer).SetIamPolicy(ctx, req.(*v1.SetIamPolicyRequest)) 1462 } 1463 return interceptor(ctx, in, info, handler) 1464} 1465 1466func _SecretManagerService_GetIamPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1467 in := new(v1.GetIamPolicyRequest) 1468 if err := dec(in); err != nil { 1469 return nil, err 1470 } 1471 if interceptor == nil { 1472 return srv.(SecretManagerServiceServer).GetIamPolicy(ctx, in) 1473 } 1474 info := &grpc.UnaryServerInfo{ 1475 Server: srv, 1476 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/GetIamPolicy", 1477 } 1478 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1479 return srv.(SecretManagerServiceServer).GetIamPolicy(ctx, req.(*v1.GetIamPolicyRequest)) 1480 } 1481 return interceptor(ctx, in, info, handler) 1482} 1483 1484func _SecretManagerService_TestIamPermissions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 1485 in := new(v1.TestIamPermissionsRequest) 1486 if err := dec(in); err != nil { 1487 return nil, err 1488 } 1489 if interceptor == nil { 1490 return srv.(SecretManagerServiceServer).TestIamPermissions(ctx, in) 1491 } 1492 info := &grpc.UnaryServerInfo{ 1493 Server: srv, 1494 FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/TestIamPermissions", 1495 } 1496 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 1497 return srv.(SecretManagerServiceServer).TestIamPermissions(ctx, req.(*v1.TestIamPermissionsRequest)) 1498 } 1499 return interceptor(ctx, in, info, handler) 1500} 1501 1502var _SecretManagerService_serviceDesc = grpc.ServiceDesc{ 1503 ServiceName: "google.cloud.secrets.v1beta1.SecretManagerService", 1504 HandlerType: (*SecretManagerServiceServer)(nil), 1505 Methods: []grpc.MethodDesc{ 1506 { 1507 MethodName: "ListSecrets", 1508 Handler: _SecretManagerService_ListSecrets_Handler, 1509 }, 1510 { 1511 MethodName: "CreateSecret", 1512 Handler: _SecretManagerService_CreateSecret_Handler, 1513 }, 1514 { 1515 MethodName: "AddSecretVersion", 1516 Handler: _SecretManagerService_AddSecretVersion_Handler, 1517 }, 1518 { 1519 MethodName: "GetSecret", 1520 Handler: _SecretManagerService_GetSecret_Handler, 1521 }, 1522 { 1523 MethodName: "UpdateSecret", 1524 Handler: _SecretManagerService_UpdateSecret_Handler, 1525 }, 1526 { 1527 MethodName: "DeleteSecret", 1528 Handler: _SecretManagerService_DeleteSecret_Handler, 1529 }, 1530 { 1531 MethodName: "ListSecretVersions", 1532 Handler: _SecretManagerService_ListSecretVersions_Handler, 1533 }, 1534 { 1535 MethodName: "GetSecretVersion", 1536 Handler: _SecretManagerService_GetSecretVersion_Handler, 1537 }, 1538 { 1539 MethodName: "AccessSecretVersion", 1540 Handler: _SecretManagerService_AccessSecretVersion_Handler, 1541 }, 1542 { 1543 MethodName: "DisableSecretVersion", 1544 Handler: _SecretManagerService_DisableSecretVersion_Handler, 1545 }, 1546 { 1547 MethodName: "EnableSecretVersion", 1548 Handler: _SecretManagerService_EnableSecretVersion_Handler, 1549 }, 1550 { 1551 MethodName: "DestroySecretVersion", 1552 Handler: _SecretManagerService_DestroySecretVersion_Handler, 1553 }, 1554 { 1555 MethodName: "SetIamPolicy", 1556 Handler: _SecretManagerService_SetIamPolicy_Handler, 1557 }, 1558 { 1559 MethodName: "GetIamPolicy", 1560 Handler: _SecretManagerService_GetIamPolicy_Handler, 1561 }, 1562 { 1563 MethodName: "TestIamPermissions", 1564 Handler: _SecretManagerService_TestIamPermissions_Handler, 1565 }, 1566 }, 1567 Streams: []grpc.StreamDesc{}, 1568 Metadata: "google/cloud/secrets/v1beta1/service.proto", 1569} 1570