1// Code generated by protoc-gen-go. DO NOT EDIT.
2// source: google/cloud/secrets/v1beta1/service.proto
3
4package secrets
5
6import (
7	context "context"
8	fmt "fmt"
9	math "math"
10
11	proto "github.com/golang/protobuf/proto"
12	empty "github.com/golang/protobuf/ptypes/empty"
13	_ "google.golang.org/genproto/googleapis/api/annotations"
14	v1 "google.golang.org/genproto/googleapis/iam/v1"
15	field_mask "google.golang.org/genproto/protobuf/field_mask"
16	grpc "google.golang.org/grpc"
17	codes "google.golang.org/grpc/codes"
18	status "google.golang.org/grpc/status"
19)
20
21// Reference imports to suppress errors if they are not otherwise used.
22var _ = proto.Marshal
23var _ = fmt.Errorf
24var _ = math.Inf
25
26// This is a compile-time assertion to ensure that this generated file
27// is compatible with the proto package it is being compiled against.
28// A compilation error at this line likely means your copy of the
29// proto package needs to be updated.
30const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package
31
32// Request message for [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets].
33type ListSecretsRequest struct {
34	// Required. The resource name of the project associated with the
35	// [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
36	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
37	// Optional. The maximum number of results to be returned in a single page. If
38	// set to 0, the server decides the number of results to return. If the
39	// number is greater than 25000, it is capped at 25000.
40	PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"`
41	// Optional. Pagination token, returned earlier via
42	// [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token].
43	PageToken            string   `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"`
44	XXX_NoUnkeyedLiteral struct{} `json:"-"`
45	XXX_unrecognized     []byte   `json:"-"`
46	XXX_sizecache        int32    `json:"-"`
47}
48
49func (m *ListSecretsRequest) Reset()         { *m = ListSecretsRequest{} }
50func (m *ListSecretsRequest) String() string { return proto.CompactTextString(m) }
51func (*ListSecretsRequest) ProtoMessage()    {}
52func (*ListSecretsRequest) Descriptor() ([]byte, []int) {
53	return fileDescriptor_67a0e1a61a378c59, []int{0}
54}
55
56func (m *ListSecretsRequest) XXX_Unmarshal(b []byte) error {
57	return xxx_messageInfo_ListSecretsRequest.Unmarshal(m, b)
58}
59func (m *ListSecretsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
60	return xxx_messageInfo_ListSecretsRequest.Marshal(b, m, deterministic)
61}
62func (m *ListSecretsRequest) XXX_Merge(src proto.Message) {
63	xxx_messageInfo_ListSecretsRequest.Merge(m, src)
64}
65func (m *ListSecretsRequest) XXX_Size() int {
66	return xxx_messageInfo_ListSecretsRequest.Size(m)
67}
68func (m *ListSecretsRequest) XXX_DiscardUnknown() {
69	xxx_messageInfo_ListSecretsRequest.DiscardUnknown(m)
70}
71
72var xxx_messageInfo_ListSecretsRequest proto.InternalMessageInfo
73
74func (m *ListSecretsRequest) GetParent() string {
75	if m != nil {
76		return m.Parent
77	}
78	return ""
79}
80
81func (m *ListSecretsRequest) GetPageSize() int32 {
82	if m != nil {
83		return m.PageSize
84	}
85	return 0
86}
87
88func (m *ListSecretsRequest) GetPageToken() string {
89	if m != nil {
90		return m.PageToken
91	}
92	return ""
93}
94
95// Response message for [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets].
96type ListSecretsResponse struct {
97	// The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
98	// first).
99	Secrets []*Secret `protobuf:"bytes,1,rep,name=secrets,proto3" json:"secrets,omitempty"`
100	// A token to retrieve the next page of results. Pass this value in
101	// [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page.
102	NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"`
103	// The total number of [Secrets][google.cloud.secrets.v1beta1.Secret].
104	TotalSize            int32    `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"`
105	XXX_NoUnkeyedLiteral struct{} `json:"-"`
106	XXX_unrecognized     []byte   `json:"-"`
107	XXX_sizecache        int32    `json:"-"`
108}
109
110func (m *ListSecretsResponse) Reset()         { *m = ListSecretsResponse{} }
111func (m *ListSecretsResponse) String() string { return proto.CompactTextString(m) }
112func (*ListSecretsResponse) ProtoMessage()    {}
113func (*ListSecretsResponse) Descriptor() ([]byte, []int) {
114	return fileDescriptor_67a0e1a61a378c59, []int{1}
115}
116
117func (m *ListSecretsResponse) XXX_Unmarshal(b []byte) error {
118	return xxx_messageInfo_ListSecretsResponse.Unmarshal(m, b)
119}
120func (m *ListSecretsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
121	return xxx_messageInfo_ListSecretsResponse.Marshal(b, m, deterministic)
122}
123func (m *ListSecretsResponse) XXX_Merge(src proto.Message) {
124	xxx_messageInfo_ListSecretsResponse.Merge(m, src)
125}
126func (m *ListSecretsResponse) XXX_Size() int {
127	return xxx_messageInfo_ListSecretsResponse.Size(m)
128}
129func (m *ListSecretsResponse) XXX_DiscardUnknown() {
130	xxx_messageInfo_ListSecretsResponse.DiscardUnknown(m)
131}
132
133var xxx_messageInfo_ListSecretsResponse proto.InternalMessageInfo
134
135func (m *ListSecretsResponse) GetSecrets() []*Secret {
136	if m != nil {
137		return m.Secrets
138	}
139	return nil
140}
141
142func (m *ListSecretsResponse) GetNextPageToken() string {
143	if m != nil {
144		return m.NextPageToken
145	}
146	return ""
147}
148
149func (m *ListSecretsResponse) GetTotalSize() int32 {
150	if m != nil {
151		return m.TotalSize
152	}
153	return 0
154}
155
156// Request message for [SecretManagerService.CreateSecret][google.cloud.secrets.v1beta1.SecretManagerService.CreateSecret].
157type CreateSecretRequest struct {
158	// Required. The resource name of the project to associate with the
159	// [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
160	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
161	// Required. This must be unique within the project.
162	SecretId string `protobuf:"bytes,2,opt,name=secret_id,json=secretId,proto3" json:"secret_id,omitempty"`
163	// A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
164	Secret               *Secret  `protobuf:"bytes,3,opt,name=secret,proto3" json:"secret,omitempty"`
165	XXX_NoUnkeyedLiteral struct{} `json:"-"`
166	XXX_unrecognized     []byte   `json:"-"`
167	XXX_sizecache        int32    `json:"-"`
168}
169
170func (m *CreateSecretRequest) Reset()         { *m = CreateSecretRequest{} }
171func (m *CreateSecretRequest) String() string { return proto.CompactTextString(m) }
172func (*CreateSecretRequest) ProtoMessage()    {}
173func (*CreateSecretRequest) Descriptor() ([]byte, []int) {
174	return fileDescriptor_67a0e1a61a378c59, []int{2}
175}
176
177func (m *CreateSecretRequest) XXX_Unmarshal(b []byte) error {
178	return xxx_messageInfo_CreateSecretRequest.Unmarshal(m, b)
179}
180func (m *CreateSecretRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
181	return xxx_messageInfo_CreateSecretRequest.Marshal(b, m, deterministic)
182}
183func (m *CreateSecretRequest) XXX_Merge(src proto.Message) {
184	xxx_messageInfo_CreateSecretRequest.Merge(m, src)
185}
186func (m *CreateSecretRequest) XXX_Size() int {
187	return xxx_messageInfo_CreateSecretRequest.Size(m)
188}
189func (m *CreateSecretRequest) XXX_DiscardUnknown() {
190	xxx_messageInfo_CreateSecretRequest.DiscardUnknown(m)
191}
192
193var xxx_messageInfo_CreateSecretRequest proto.InternalMessageInfo
194
195func (m *CreateSecretRequest) GetParent() string {
196	if m != nil {
197		return m.Parent
198	}
199	return ""
200}
201
202func (m *CreateSecretRequest) GetSecretId() string {
203	if m != nil {
204		return m.SecretId
205	}
206	return ""
207}
208
209func (m *CreateSecretRequest) GetSecret() *Secret {
210	if m != nil {
211		return m.Secret
212	}
213	return nil
214}
215
216// Request message for [SecretManagerService.AddSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AddSecretVersion].
217type AddSecretVersionRequest struct {
218	// Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the
219	// [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`.
220	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
221	// Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
222	Payload              *SecretPayload `protobuf:"bytes,2,opt,name=payload,proto3" json:"payload,omitempty"`
223	XXX_NoUnkeyedLiteral struct{}       `json:"-"`
224	XXX_unrecognized     []byte         `json:"-"`
225	XXX_sizecache        int32          `json:"-"`
226}
227
228func (m *AddSecretVersionRequest) Reset()         { *m = AddSecretVersionRequest{} }
229func (m *AddSecretVersionRequest) String() string { return proto.CompactTextString(m) }
230func (*AddSecretVersionRequest) ProtoMessage()    {}
231func (*AddSecretVersionRequest) Descriptor() ([]byte, []int) {
232	return fileDescriptor_67a0e1a61a378c59, []int{3}
233}
234
235func (m *AddSecretVersionRequest) XXX_Unmarshal(b []byte) error {
236	return xxx_messageInfo_AddSecretVersionRequest.Unmarshal(m, b)
237}
238func (m *AddSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
239	return xxx_messageInfo_AddSecretVersionRequest.Marshal(b, m, deterministic)
240}
241func (m *AddSecretVersionRequest) XXX_Merge(src proto.Message) {
242	xxx_messageInfo_AddSecretVersionRequest.Merge(m, src)
243}
244func (m *AddSecretVersionRequest) XXX_Size() int {
245	return xxx_messageInfo_AddSecretVersionRequest.Size(m)
246}
247func (m *AddSecretVersionRequest) XXX_DiscardUnknown() {
248	xxx_messageInfo_AddSecretVersionRequest.DiscardUnknown(m)
249}
250
251var xxx_messageInfo_AddSecretVersionRequest proto.InternalMessageInfo
252
253func (m *AddSecretVersionRequest) GetParent() string {
254	if m != nil {
255		return m.Parent
256	}
257	return ""
258}
259
260func (m *AddSecretVersionRequest) GetPayload() *SecretPayload {
261	if m != nil {
262		return m.Payload
263	}
264	return nil
265}
266
267// Request message for [SecretManagerService.GetSecret][google.cloud.secrets.v1beta1.SecretManagerService.GetSecret].
268type GetSecretRequest struct {
269	// Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`.
270	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
271	XXX_NoUnkeyedLiteral struct{} `json:"-"`
272	XXX_unrecognized     []byte   `json:"-"`
273	XXX_sizecache        int32    `json:"-"`
274}
275
276func (m *GetSecretRequest) Reset()         { *m = GetSecretRequest{} }
277func (m *GetSecretRequest) String() string { return proto.CompactTextString(m) }
278func (*GetSecretRequest) ProtoMessage()    {}
279func (*GetSecretRequest) Descriptor() ([]byte, []int) {
280	return fileDescriptor_67a0e1a61a378c59, []int{4}
281}
282
283func (m *GetSecretRequest) XXX_Unmarshal(b []byte) error {
284	return xxx_messageInfo_GetSecretRequest.Unmarshal(m, b)
285}
286func (m *GetSecretRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
287	return xxx_messageInfo_GetSecretRequest.Marshal(b, m, deterministic)
288}
289func (m *GetSecretRequest) XXX_Merge(src proto.Message) {
290	xxx_messageInfo_GetSecretRequest.Merge(m, src)
291}
292func (m *GetSecretRequest) XXX_Size() int {
293	return xxx_messageInfo_GetSecretRequest.Size(m)
294}
295func (m *GetSecretRequest) XXX_DiscardUnknown() {
296	xxx_messageInfo_GetSecretRequest.DiscardUnknown(m)
297}
298
299var xxx_messageInfo_GetSecretRequest proto.InternalMessageInfo
300
301func (m *GetSecretRequest) GetName() string {
302	if m != nil {
303		return m.Name
304	}
305	return ""
306}
307
308// Request message for [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions].
309type ListSecretVersionsRequest struct {
310	// Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the
311	// [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format
312	// `projects/*/secrets/*`.
313	Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
314	// Optional. The maximum number of results to be returned in a single page. If
315	// set to 0, the server decides the number of results to return. If the
316	// number is greater than 25000, it is capped at 25000.
317	PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"`
318	// Optional. Pagination token, returned earlier via
319	// ListSecretVersionsResponse.next_page_token][].
320	PageToken            string   `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"`
321	XXX_NoUnkeyedLiteral struct{} `json:"-"`
322	XXX_unrecognized     []byte   `json:"-"`
323	XXX_sizecache        int32    `json:"-"`
324}
325
326func (m *ListSecretVersionsRequest) Reset()         { *m = ListSecretVersionsRequest{} }
327func (m *ListSecretVersionsRequest) String() string { return proto.CompactTextString(m) }
328func (*ListSecretVersionsRequest) ProtoMessage()    {}
329func (*ListSecretVersionsRequest) Descriptor() ([]byte, []int) {
330	return fileDescriptor_67a0e1a61a378c59, []int{5}
331}
332
333func (m *ListSecretVersionsRequest) XXX_Unmarshal(b []byte) error {
334	return xxx_messageInfo_ListSecretVersionsRequest.Unmarshal(m, b)
335}
336func (m *ListSecretVersionsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
337	return xxx_messageInfo_ListSecretVersionsRequest.Marshal(b, m, deterministic)
338}
339func (m *ListSecretVersionsRequest) XXX_Merge(src proto.Message) {
340	xxx_messageInfo_ListSecretVersionsRequest.Merge(m, src)
341}
342func (m *ListSecretVersionsRequest) XXX_Size() int {
343	return xxx_messageInfo_ListSecretVersionsRequest.Size(m)
344}
345func (m *ListSecretVersionsRequest) XXX_DiscardUnknown() {
346	xxx_messageInfo_ListSecretVersionsRequest.DiscardUnknown(m)
347}
348
349var xxx_messageInfo_ListSecretVersionsRequest proto.InternalMessageInfo
350
351func (m *ListSecretVersionsRequest) GetParent() string {
352	if m != nil {
353		return m.Parent
354	}
355	return ""
356}
357
358func (m *ListSecretVersionsRequest) GetPageSize() int32 {
359	if m != nil {
360		return m.PageSize
361	}
362	return 0
363}
364
365func (m *ListSecretVersionsRequest) GetPageToken() string {
366	if m != nil {
367		return m.PageToken
368	}
369	return ""
370}
371
372// Response message for [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions].
373type ListSecretVersionsResponse struct {
374	// The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
375	// create_time (newest first).
376	Versions []*SecretVersion `protobuf:"bytes,1,rep,name=versions,proto3" json:"versions,omitempty"`
377	// A token to retrieve the next page of results. Pass this value in
378	// [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page.
379	NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"`
380	// The total number of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
381	TotalSize            int32    `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"`
382	XXX_NoUnkeyedLiteral struct{} `json:"-"`
383	XXX_unrecognized     []byte   `json:"-"`
384	XXX_sizecache        int32    `json:"-"`
385}
386
387func (m *ListSecretVersionsResponse) Reset()         { *m = ListSecretVersionsResponse{} }
388func (m *ListSecretVersionsResponse) String() string { return proto.CompactTextString(m) }
389func (*ListSecretVersionsResponse) ProtoMessage()    {}
390func (*ListSecretVersionsResponse) Descriptor() ([]byte, []int) {
391	return fileDescriptor_67a0e1a61a378c59, []int{6}
392}
393
394func (m *ListSecretVersionsResponse) XXX_Unmarshal(b []byte) error {
395	return xxx_messageInfo_ListSecretVersionsResponse.Unmarshal(m, b)
396}
397func (m *ListSecretVersionsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
398	return xxx_messageInfo_ListSecretVersionsResponse.Marshal(b, m, deterministic)
399}
400func (m *ListSecretVersionsResponse) XXX_Merge(src proto.Message) {
401	xxx_messageInfo_ListSecretVersionsResponse.Merge(m, src)
402}
403func (m *ListSecretVersionsResponse) XXX_Size() int {
404	return xxx_messageInfo_ListSecretVersionsResponse.Size(m)
405}
406func (m *ListSecretVersionsResponse) XXX_DiscardUnknown() {
407	xxx_messageInfo_ListSecretVersionsResponse.DiscardUnknown(m)
408}
409
410var xxx_messageInfo_ListSecretVersionsResponse proto.InternalMessageInfo
411
412func (m *ListSecretVersionsResponse) GetVersions() []*SecretVersion {
413	if m != nil {
414		return m.Versions
415	}
416	return nil
417}
418
419func (m *ListSecretVersionsResponse) GetNextPageToken() string {
420	if m != nil {
421		return m.NextPageToken
422	}
423	return ""
424}
425
426func (m *ListSecretVersionsResponse) GetTotalSize() int32 {
427	if m != nil {
428		return m.TotalSize
429	}
430	return 0
431}
432
433// Request message for [SecretManagerService.GetSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.GetSecretVersion].
434type GetSecretVersionRequest struct {
435	// Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
436	// `projects/*/secrets/*/versions/*`.
437	// `projects/*/secrets/*/versions/latest` is an alias to the `latest`
438	// [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
439	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
440	XXX_NoUnkeyedLiteral struct{} `json:"-"`
441	XXX_unrecognized     []byte   `json:"-"`
442	XXX_sizecache        int32    `json:"-"`
443}
444
445func (m *GetSecretVersionRequest) Reset()         { *m = GetSecretVersionRequest{} }
446func (m *GetSecretVersionRequest) String() string { return proto.CompactTextString(m) }
447func (*GetSecretVersionRequest) ProtoMessage()    {}
448func (*GetSecretVersionRequest) Descriptor() ([]byte, []int) {
449	return fileDescriptor_67a0e1a61a378c59, []int{7}
450}
451
452func (m *GetSecretVersionRequest) XXX_Unmarshal(b []byte) error {
453	return xxx_messageInfo_GetSecretVersionRequest.Unmarshal(m, b)
454}
455func (m *GetSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
456	return xxx_messageInfo_GetSecretVersionRequest.Marshal(b, m, deterministic)
457}
458func (m *GetSecretVersionRequest) XXX_Merge(src proto.Message) {
459	xxx_messageInfo_GetSecretVersionRequest.Merge(m, src)
460}
461func (m *GetSecretVersionRequest) XXX_Size() int {
462	return xxx_messageInfo_GetSecretVersionRequest.Size(m)
463}
464func (m *GetSecretVersionRequest) XXX_DiscardUnknown() {
465	xxx_messageInfo_GetSecretVersionRequest.DiscardUnknown(m)
466}
467
468var xxx_messageInfo_GetSecretVersionRequest proto.InternalMessageInfo
469
470func (m *GetSecretVersionRequest) GetName() string {
471	if m != nil {
472		return m.Name
473	}
474	return ""
475}
476
477// Request message for [SecretManagerService.UpdateSecret][google.cloud.secrets.v1beta1.SecretManagerService.UpdateSecret].
478type UpdateSecretRequest struct {
479	// Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
480	Secret *Secret `protobuf:"bytes,1,opt,name=secret,proto3" json:"secret,omitempty"`
481	// Required. Specifies the fields to be updated.
482	UpdateMask           *field_mask.FieldMask `protobuf:"bytes,2,opt,name=update_mask,json=updateMask,proto3" json:"update_mask,omitempty"`
483	XXX_NoUnkeyedLiteral struct{}              `json:"-"`
484	XXX_unrecognized     []byte                `json:"-"`
485	XXX_sizecache        int32                 `json:"-"`
486}
487
488func (m *UpdateSecretRequest) Reset()         { *m = UpdateSecretRequest{} }
489func (m *UpdateSecretRequest) String() string { return proto.CompactTextString(m) }
490func (*UpdateSecretRequest) ProtoMessage()    {}
491func (*UpdateSecretRequest) Descriptor() ([]byte, []int) {
492	return fileDescriptor_67a0e1a61a378c59, []int{8}
493}
494
495func (m *UpdateSecretRequest) XXX_Unmarshal(b []byte) error {
496	return xxx_messageInfo_UpdateSecretRequest.Unmarshal(m, b)
497}
498func (m *UpdateSecretRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
499	return xxx_messageInfo_UpdateSecretRequest.Marshal(b, m, deterministic)
500}
501func (m *UpdateSecretRequest) XXX_Merge(src proto.Message) {
502	xxx_messageInfo_UpdateSecretRequest.Merge(m, src)
503}
504func (m *UpdateSecretRequest) XXX_Size() int {
505	return xxx_messageInfo_UpdateSecretRequest.Size(m)
506}
507func (m *UpdateSecretRequest) XXX_DiscardUnknown() {
508	xxx_messageInfo_UpdateSecretRequest.DiscardUnknown(m)
509}
510
511var xxx_messageInfo_UpdateSecretRequest proto.InternalMessageInfo
512
513func (m *UpdateSecretRequest) GetSecret() *Secret {
514	if m != nil {
515		return m.Secret
516	}
517	return nil
518}
519
520func (m *UpdateSecretRequest) GetUpdateMask() *field_mask.FieldMask {
521	if m != nil {
522		return m.UpdateMask
523	}
524	return nil
525}
526
527// Request message for [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion].
528type AccessSecretVersionRequest struct {
529	// Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
530	// `projects/*/secrets/*/versions/*`.
531	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
532	XXX_NoUnkeyedLiteral struct{} `json:"-"`
533	XXX_unrecognized     []byte   `json:"-"`
534	XXX_sizecache        int32    `json:"-"`
535}
536
537func (m *AccessSecretVersionRequest) Reset()         { *m = AccessSecretVersionRequest{} }
538func (m *AccessSecretVersionRequest) String() string { return proto.CompactTextString(m) }
539func (*AccessSecretVersionRequest) ProtoMessage()    {}
540func (*AccessSecretVersionRequest) Descriptor() ([]byte, []int) {
541	return fileDescriptor_67a0e1a61a378c59, []int{9}
542}
543
544func (m *AccessSecretVersionRequest) XXX_Unmarshal(b []byte) error {
545	return xxx_messageInfo_AccessSecretVersionRequest.Unmarshal(m, b)
546}
547func (m *AccessSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
548	return xxx_messageInfo_AccessSecretVersionRequest.Marshal(b, m, deterministic)
549}
550func (m *AccessSecretVersionRequest) XXX_Merge(src proto.Message) {
551	xxx_messageInfo_AccessSecretVersionRequest.Merge(m, src)
552}
553func (m *AccessSecretVersionRequest) XXX_Size() int {
554	return xxx_messageInfo_AccessSecretVersionRequest.Size(m)
555}
556func (m *AccessSecretVersionRequest) XXX_DiscardUnknown() {
557	xxx_messageInfo_AccessSecretVersionRequest.DiscardUnknown(m)
558}
559
560var xxx_messageInfo_AccessSecretVersionRequest proto.InternalMessageInfo
561
562func (m *AccessSecretVersionRequest) GetName() string {
563	if m != nil {
564		return m.Name
565	}
566	return ""
567}
568
569// Response message for [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion].
570type AccessSecretVersionResponse struct {
571	// The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
572	// `projects/*/secrets/*/versions/*`.
573	Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
574	// Secret payload
575	Payload              *SecretPayload `protobuf:"bytes,2,opt,name=payload,proto3" json:"payload,omitempty"`
576	XXX_NoUnkeyedLiteral struct{}       `json:"-"`
577	XXX_unrecognized     []byte         `json:"-"`
578	XXX_sizecache        int32          `json:"-"`
579}
580
581func (m *AccessSecretVersionResponse) Reset()         { *m = AccessSecretVersionResponse{} }
582func (m *AccessSecretVersionResponse) String() string { return proto.CompactTextString(m) }
583func (*AccessSecretVersionResponse) ProtoMessage()    {}
584func (*AccessSecretVersionResponse) Descriptor() ([]byte, []int) {
585	return fileDescriptor_67a0e1a61a378c59, []int{10}
586}
587
588func (m *AccessSecretVersionResponse) XXX_Unmarshal(b []byte) error {
589	return xxx_messageInfo_AccessSecretVersionResponse.Unmarshal(m, b)
590}
591func (m *AccessSecretVersionResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
592	return xxx_messageInfo_AccessSecretVersionResponse.Marshal(b, m, deterministic)
593}
594func (m *AccessSecretVersionResponse) XXX_Merge(src proto.Message) {
595	xxx_messageInfo_AccessSecretVersionResponse.Merge(m, src)
596}
597func (m *AccessSecretVersionResponse) XXX_Size() int {
598	return xxx_messageInfo_AccessSecretVersionResponse.Size(m)
599}
600func (m *AccessSecretVersionResponse) XXX_DiscardUnknown() {
601	xxx_messageInfo_AccessSecretVersionResponse.DiscardUnknown(m)
602}
603
604var xxx_messageInfo_AccessSecretVersionResponse proto.InternalMessageInfo
605
606func (m *AccessSecretVersionResponse) GetName() string {
607	if m != nil {
608		return m.Name
609	}
610	return ""
611}
612
613func (m *AccessSecretVersionResponse) GetPayload() *SecretPayload {
614	if m != nil {
615		return m.Payload
616	}
617	return nil
618}
619
620// Request message for [SecretManagerService.DeleteSecret][google.cloud.secrets.v1beta1.SecretManagerService.DeleteSecret].
621type DeleteSecretRequest struct {
622	// Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format
623	// `projects/*/secrets/*`.
624	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
625	XXX_NoUnkeyedLiteral struct{} `json:"-"`
626	XXX_unrecognized     []byte   `json:"-"`
627	XXX_sizecache        int32    `json:"-"`
628}
629
630func (m *DeleteSecretRequest) Reset()         { *m = DeleteSecretRequest{} }
631func (m *DeleteSecretRequest) String() string { return proto.CompactTextString(m) }
632func (*DeleteSecretRequest) ProtoMessage()    {}
633func (*DeleteSecretRequest) Descriptor() ([]byte, []int) {
634	return fileDescriptor_67a0e1a61a378c59, []int{11}
635}
636
637func (m *DeleteSecretRequest) XXX_Unmarshal(b []byte) error {
638	return xxx_messageInfo_DeleteSecretRequest.Unmarshal(m, b)
639}
640func (m *DeleteSecretRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
641	return xxx_messageInfo_DeleteSecretRequest.Marshal(b, m, deterministic)
642}
643func (m *DeleteSecretRequest) XXX_Merge(src proto.Message) {
644	xxx_messageInfo_DeleteSecretRequest.Merge(m, src)
645}
646func (m *DeleteSecretRequest) XXX_Size() int {
647	return xxx_messageInfo_DeleteSecretRequest.Size(m)
648}
649func (m *DeleteSecretRequest) XXX_DiscardUnknown() {
650	xxx_messageInfo_DeleteSecretRequest.DiscardUnknown(m)
651}
652
653var xxx_messageInfo_DeleteSecretRequest proto.InternalMessageInfo
654
655func (m *DeleteSecretRequest) GetName() string {
656	if m != nil {
657		return m.Name
658	}
659	return ""
660}
661
662// Request message for [SecretManagerService.DisableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DisableSecretVersion].
663type DisableSecretVersionRequest struct {
664	// Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format
665	// `projects/*/secrets/*/versions/*`.
666	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
667	XXX_NoUnkeyedLiteral struct{} `json:"-"`
668	XXX_unrecognized     []byte   `json:"-"`
669	XXX_sizecache        int32    `json:"-"`
670}
671
672func (m *DisableSecretVersionRequest) Reset()         { *m = DisableSecretVersionRequest{} }
673func (m *DisableSecretVersionRequest) String() string { return proto.CompactTextString(m) }
674func (*DisableSecretVersionRequest) ProtoMessage()    {}
675func (*DisableSecretVersionRequest) Descriptor() ([]byte, []int) {
676	return fileDescriptor_67a0e1a61a378c59, []int{12}
677}
678
679func (m *DisableSecretVersionRequest) XXX_Unmarshal(b []byte) error {
680	return xxx_messageInfo_DisableSecretVersionRequest.Unmarshal(m, b)
681}
682func (m *DisableSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
683	return xxx_messageInfo_DisableSecretVersionRequest.Marshal(b, m, deterministic)
684}
685func (m *DisableSecretVersionRequest) XXX_Merge(src proto.Message) {
686	xxx_messageInfo_DisableSecretVersionRequest.Merge(m, src)
687}
688func (m *DisableSecretVersionRequest) XXX_Size() int {
689	return xxx_messageInfo_DisableSecretVersionRequest.Size(m)
690}
691func (m *DisableSecretVersionRequest) XXX_DiscardUnknown() {
692	xxx_messageInfo_DisableSecretVersionRequest.DiscardUnknown(m)
693}
694
695var xxx_messageInfo_DisableSecretVersionRequest proto.InternalMessageInfo
696
697func (m *DisableSecretVersionRequest) GetName() string {
698	if m != nil {
699		return m.Name
700	}
701	return ""
702}
703
704// Request message for [SecretManagerService.EnableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.EnableSecretVersion].
705type EnableSecretVersionRequest struct {
706	// Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format
707	// `projects/*/secrets/*/versions/*`.
708	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
709	XXX_NoUnkeyedLiteral struct{} `json:"-"`
710	XXX_unrecognized     []byte   `json:"-"`
711	XXX_sizecache        int32    `json:"-"`
712}
713
714func (m *EnableSecretVersionRequest) Reset()         { *m = EnableSecretVersionRequest{} }
715func (m *EnableSecretVersionRequest) String() string { return proto.CompactTextString(m) }
716func (*EnableSecretVersionRequest) ProtoMessage()    {}
717func (*EnableSecretVersionRequest) Descriptor() ([]byte, []int) {
718	return fileDescriptor_67a0e1a61a378c59, []int{13}
719}
720
721func (m *EnableSecretVersionRequest) XXX_Unmarshal(b []byte) error {
722	return xxx_messageInfo_EnableSecretVersionRequest.Unmarshal(m, b)
723}
724func (m *EnableSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
725	return xxx_messageInfo_EnableSecretVersionRequest.Marshal(b, m, deterministic)
726}
727func (m *EnableSecretVersionRequest) XXX_Merge(src proto.Message) {
728	xxx_messageInfo_EnableSecretVersionRequest.Merge(m, src)
729}
730func (m *EnableSecretVersionRequest) XXX_Size() int {
731	return xxx_messageInfo_EnableSecretVersionRequest.Size(m)
732}
733func (m *EnableSecretVersionRequest) XXX_DiscardUnknown() {
734	xxx_messageInfo_EnableSecretVersionRequest.DiscardUnknown(m)
735}
736
737var xxx_messageInfo_EnableSecretVersionRequest proto.InternalMessageInfo
738
739func (m *EnableSecretVersionRequest) GetName() string {
740	if m != nil {
741		return m.Name
742	}
743	return ""
744}
745
746// Request message for [SecretManagerService.DestroySecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DestroySecretVersion].
747type DestroySecretVersionRequest struct {
748	// Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format
749	// `projects/*/secrets/*/versions/*`.
750	Name                 string   `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
751	XXX_NoUnkeyedLiteral struct{} `json:"-"`
752	XXX_unrecognized     []byte   `json:"-"`
753	XXX_sizecache        int32    `json:"-"`
754}
755
756func (m *DestroySecretVersionRequest) Reset()         { *m = DestroySecretVersionRequest{} }
757func (m *DestroySecretVersionRequest) String() string { return proto.CompactTextString(m) }
758func (*DestroySecretVersionRequest) ProtoMessage()    {}
759func (*DestroySecretVersionRequest) Descriptor() ([]byte, []int) {
760	return fileDescriptor_67a0e1a61a378c59, []int{14}
761}
762
763func (m *DestroySecretVersionRequest) XXX_Unmarshal(b []byte) error {
764	return xxx_messageInfo_DestroySecretVersionRequest.Unmarshal(m, b)
765}
766func (m *DestroySecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
767	return xxx_messageInfo_DestroySecretVersionRequest.Marshal(b, m, deterministic)
768}
769func (m *DestroySecretVersionRequest) XXX_Merge(src proto.Message) {
770	xxx_messageInfo_DestroySecretVersionRequest.Merge(m, src)
771}
772func (m *DestroySecretVersionRequest) XXX_Size() int {
773	return xxx_messageInfo_DestroySecretVersionRequest.Size(m)
774}
775func (m *DestroySecretVersionRequest) XXX_DiscardUnknown() {
776	xxx_messageInfo_DestroySecretVersionRequest.DiscardUnknown(m)
777}
778
779var xxx_messageInfo_DestroySecretVersionRequest proto.InternalMessageInfo
780
781func (m *DestroySecretVersionRequest) GetName() string {
782	if m != nil {
783		return m.Name
784	}
785	return ""
786}
787
788func init() {
789	proto.RegisterType((*ListSecretsRequest)(nil), "google.cloud.secrets.v1beta1.ListSecretsRequest")
790	proto.RegisterType((*ListSecretsResponse)(nil), "google.cloud.secrets.v1beta1.ListSecretsResponse")
791	proto.RegisterType((*CreateSecretRequest)(nil), "google.cloud.secrets.v1beta1.CreateSecretRequest")
792	proto.RegisterType((*AddSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.AddSecretVersionRequest")
793	proto.RegisterType((*GetSecretRequest)(nil), "google.cloud.secrets.v1beta1.GetSecretRequest")
794	proto.RegisterType((*ListSecretVersionsRequest)(nil), "google.cloud.secrets.v1beta1.ListSecretVersionsRequest")
795	proto.RegisterType((*ListSecretVersionsResponse)(nil), "google.cloud.secrets.v1beta1.ListSecretVersionsResponse")
796	proto.RegisterType((*GetSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.GetSecretVersionRequest")
797	proto.RegisterType((*UpdateSecretRequest)(nil), "google.cloud.secrets.v1beta1.UpdateSecretRequest")
798	proto.RegisterType((*AccessSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.AccessSecretVersionRequest")
799	proto.RegisterType((*AccessSecretVersionResponse)(nil), "google.cloud.secrets.v1beta1.AccessSecretVersionResponse")
800	proto.RegisterType((*DeleteSecretRequest)(nil), "google.cloud.secrets.v1beta1.DeleteSecretRequest")
801	proto.RegisterType((*DisableSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.DisableSecretVersionRequest")
802	proto.RegisterType((*EnableSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.EnableSecretVersionRequest")
803	proto.RegisterType((*DestroySecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.DestroySecretVersionRequest")
804}
805
806func init() {
807	proto.RegisterFile("google/cloud/secrets/v1beta1/service.proto", fileDescriptor_67a0e1a61a378c59)
808}
809
810var fileDescriptor_67a0e1a61a378c59 = []byte{
811	// 1346 bytes of a gzipped FileDescriptorProto
812	0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xbc, 0x58, 0xcd, 0x6f, 0x1b, 0x45,
813	0x1b, 0xd7, 0x38, 0x6f, 0xd3, 0x64, 0xe2, 0x17, 0xaa, 0x71, 0x69, 0xd2, 0x4d, 0x00, 0x6b, 0x29,
814	0x55, 0x70, 0xd2, 0x5d, 0x9c, 0x28, 0x4d, 0x71, 0xda, 0x92, 0x4d, 0x9a, 0x98, 0x00, 0x41, 0x96,
815	0x5d, 0x72, 0x40, 0x91, 0xa2, 0x89, 0x77, 0xe2, 0x2c, 0xb1, 0x77, 0x97, 0x9d, 0xb1, 0x43, 0x8a,
816	0x7a, 0x81, 0x0b, 0x12, 0x12, 0x17, 0x24, 0x0e, 0x88, 0x13, 0x07, 0x50, 0x2b, 0x2e, 0x5c, 0x40,
817	0x5c, 0x38, 0x20, 0x81, 0x44, 0x6f, 0xc0, 0x2d, 0xa7, 0x1e, 0xf8, 0x23, 0x10, 0x27, 0xb4, 0x33,
818	0xb3, 0xf6, 0xfa, 0x7b, 0x9d, 0x26, 0x9c, 0x12, 0x3f, 0x1f, 0xf3, 0xfc, 0x9e, 0xef, 0xc7, 0x86,
819	0xa9, 0x92, 0xe3, 0x94, 0xca, 0x44, 0x2f, 0x96, 0x9d, 0xaa, 0xa9, 0x53, 0x52, 0xf4, 0x08, 0xa3,
820	0x7a, 0x2d, 0xbd, 0x4b, 0x18, 0x4e, 0xeb, 0x94, 0x78, 0x35, 0xab, 0x48, 0x34, 0xd7, 0x73, 0x98,
821	0x83, 0xa6, 0x84, 0xac, 0xc6, 0x65, 0x35, 0x29, 0xab, 0x49, 0x59, 0x45, 0x72, 0x75, 0xec, 0x5a,
822	0x3a, 0xb6, 0x6d, 0x87, 0x61, 0x66, 0x39, 0x36, 0x15, 0xba, 0xca, 0x78, 0x88, 0x5b, 0x2c, 0x5b,
823	0xc4, 0x66, 0x92, 0xf1, 0x7c, 0x88, 0xb1, 0x67, 0x91, 0xb2, 0xb9, 0xb3, 0x4b, 0xf6, 0x71, 0xcd,
824	0x72, 0x3c, 0x29, 0x70, 0x39, 0x24, 0xe0, 0x11, 0xea, 0x54, 0xbd, 0x00, 0x90, 0x32, 0xdb, 0x13,
825	0x7c, 0x20, 0x1c, 0x40, 0x78, 0x4e, 0x4a, 0x5b, 0xb8, 0xa2, 0xd7, 0xd2, 0xfe, 0x9f, 0x1d, 0xd7,
826	0x29, 0x5b, 0xc5, 0x23, 0xc9, 0x57, 0x9a, 0xf9, 0x4d, 0xbc, 0x49, 0xc9, 0xe3, 0x9f, 0x76, 0xab,
827	0x7b, 0x3a, 0xa9, 0xb8, 0x2c, 0x60, 0x26, 0x5b, 0x99, 0xc2, 0x8f, 0x0a, 0xa6, 0x07, 0x42, 0x42,
828	0xfd, 0x06, 0x40, 0xf4, 0xa6, 0x45, 0x59, 0x41, 0x40, 0xcc, 0x93, 0xf7, 0xaa, 0x84, 0x32, 0xf4,
829	0x06, 0x1c, 0x76, 0xb1, 0x47, 0x6c, 0x36, 0x01, 0x92, 0x60, 0x7a, 0x74, 0x65, 0xfe, 0xb1, 0x11,
830	0xfb, 0xc7, 0xb8, 0x06, 0x67, 0xb8, 0x43, 0x01, 0xfe, 0x0a, 0xb6, 0x71, 0x89, 0x78, 0x9a, 0xb0,
831	0x82, 0x5d, 0x8b, 0x6a, 0x45, 0xa7, 0xa2, 0xe7, 0x3c, 0xe7, 0x5d, 0x52, 0x64, 0x79, 0xf9, 0x04,
832	0x4a, 0xc2, 0x51, 0x17, 0x97, 0xc8, 0x0e, 0xb5, 0xee, 0x91, 0x89, 0x58, 0x12, 0x4c, 0x9f, 0x5b,
833	0x19, 0x7a, 0x6c, 0x80, 0xfc, 0x88, 0x4f, 0x2d, 0x58, 0xf7, 0x08, 0x52, 0x21, 0xe4, 0x12, 0xcc,
834	0x39, 0x20, 0xf6, 0xc4, 0x10, 0x37, 0xc9, 0x45, 0xb8, 0xe2, 0x5d, 0x9f, 0xaa, 0x7e, 0x09, 0x60,
835	0xa2, 0x09, 0x29, 0x75, 0x1d, 0x9b, 0x12, 0x74, 0x1b, 0x9e, 0x97, 0xf1, 0x9d, 0x00, 0xc9, 0xa1,
836	0xe9, 0xb1, 0xb9, 0x2b, 0x5a, 0xaf, 0x6a, 0xd0, 0x84, 0x7e, 0x3e, 0x50, 0x42, 0x57, 0xe1, 0xd3,
837	0x36, 0x79, 0x9f, 0xed, 0x84, 0x00, 0xf8, 0x18, 0x47, 0xf3, 0xff, 0xf7, 0xc9, 0xb9, 0xc0, 0x3e,
838	0x7a, 0x16, 0x42, 0xe6, 0x30, 0x5c, 0x16, 0x6e, 0xf8, 0x18, 0xcf, 0xe5, 0x47, 0x39, 0xc5, 0x77,
839	0x41, 0xfd, 0x19, 0xc0, 0xc4, 0xaa, 0x47, 0x30, 0x23, 0xd2, 0xc0, 0x19, 0x45, 0x52, 0xc0, 0xde,
840	0xb1, 0x4c, 0x81, 0xd2, 0x0f, 0x53, 0x2c, 0x3f, 0x22, 0xa8, 0x1b, 0x26, 0xba, 0x09, 0x87, 0xc5,
841	0xff, 0x1c, 0x61, 0xd4, 0x60, 0x48, 0x1d, 0xf5, 0x21, 0x80, 0xe3, 0x86, 0x69, 0x0a, 0xea, 0x16,
842	0xf1, 0xa8, 0xe5, 0xd8, 0x81, 0x23, 0xab, 0x2d, 0x8e, 0xcc, 0x70, 0x47, 0x5e, 0x84, 0x2f, 0x08,
843	0xdd, 0x2e, 0x1e, 0x04, 0x06, 0xa4, 0x03, 0xaf, 0xc3, 0xf3, 0x2e, 0x3e, 0x2a, 0x3b, 0x58, 0xc0,
844	0x1f, 0x9b, 0x9b, 0x89, 0x82, 0x2f, 0x27, 0x54, 0x84, 0xaf, 0xc1, 0x03, 0x6a, 0x01, 0x5e, 0xc8,
845	0x12, 0xd6, 0x1c, 0xed, 0x57, 0xe1, 0xff, 0x6c, 0x5c, 0x21, 0x27, 0x81, 0xc8, 0x15, 0xd5, 0xaf,
846	0x01, 0xbc, 0xdc, 0xa8, 0x32, 0x19, 0x02, 0x7a, 0xaa, 0x31, 0x38, 0x9d, 0x76, 0xf8, 0x16, 0x40,
847	0xa5, 0x13, 0x50, 0xd9, 0x15, 0x59, 0x38, 0x52, 0x93, 0x34, 0xd9, 0x16, 0x91, 0x22, 0x1d, 0xe4,
848	0xbc, 0xae, 0x7c, 0x5a, 0xed, 0x81, 0xe1, 0x78, 0x3d, 0x59, 0x2d, 0x85, 0xb5, 0xde, 0x94, 0xb3,
849	0x39, 0x1e, 0xd2, 0x59, 0x98, 0x8a, 0x10, 0xd2, 0xe0, 0x21, 0x91, 0xba, 0x2f, 0x00, 0x4c, 0xbc,
850	0xed, 0x9a, 0x6d, 0x1d, 0x68, 0xd4, 0x5b, 0x02, 0x44, 0x6f, 0x09, 0x51, 0x6b, 0x52, 0x11, 0x2d,
851	0xc3, 0xb1, 0x2a, 0x7f, 0x99, 0x8f, 0x4e, 0x59, 0xba, 0x4a, 0xf0, 0x4e, 0x30, 0x5d, 0xb5, 0x75,
852	0x7f, 0xba, 0x6e, 0x62, 0x7a, 0x20, 0xb4, 0xa1, 0xd0, 0xf1, 0x09, 0xaa, 0x09, 0x15, 0xa3, 0x58,
853	0x24, 0x94, 0x9e, 0x69, 0x08, 0x1e, 0x00, 0x38, 0xd9, 0xd1, 0x8c, 0xac, 0x8a, 0xd5, 0x26, 0x3b,
854	0xfa, 0x89, 0x8c, 0xa0, 0xb5, 0x27, 0xe9, 0xe1, 0x46, 0xfb, 0x6e, 0xc1, 0xc4, 0x1d, 0x52, 0x26,
855	0xad, 0xd9, 0x7a, 0xe2, 0x0e, 0x26, 0x70, 0xf2, 0x8e, 0x45, 0xf1, 0x6e, 0x99, 0x9c, 0x69, 0xa8,
856	0x4d, 0xa8, 0xac, 0xd9, 0x67, 0x6e, 0xc5, 0x77, 0x86, 0x50, 0xe6, 0x39, 0x47, 0x67, 0x69, 0x66,
857	0xee, 0xa3, 0x4b, 0xf0, 0xa2, 0xa0, 0x6f, 0x0a, 0xa5, 0x82, 0x38, 0xaf, 0xd0, 0x03, 0x00, 0xc7,
858	0x42, 0x4b, 0x17, 0xbd, 0xdc, 0x3b, 0xd5, 0xed, 0x97, 0x84, 0x92, 0x1e, 0x40, 0x43, 0x54, 0xa9,
859	0xba, 0x70, 0x6c, 0xc8, 0x59, 0xf9, 0xe1, 0x9f, 0x7f, 0x7d, 0x16, 0xbb, 0x8a, 0xae, 0xd4, 0x2f,
860	0xa7, 0x0f, 0x04, 0xfd, 0x96, 0x2b, 0x16, 0x23, 0xd5, 0x53, 0xf7, 0x83, 0xeb, 0x0a, 0xfd, 0x00,
861	0x60, 0x3c, 0xbc, 0x81, 0x51, 0x1f, 0xd3, 0x1d, 0xb6, 0xb5, 0x12, 0x69, 0x36, 0xa8, 0x6f, 0x1d,
862	0x1b, 0xe3, 0x02, 0xc8, 0x6c, 0x7d, 0x1d, 0xcb, 0xff, 0x38, 0x62, 0x4d, 0x8d, 0x84, 0x38, 0x13,
863	0x8c, 0x97, 0x5f, 0x00, 0xbc, 0xd0, 0xba, 0x76, 0xd1, 0x42, 0x6f, 0x28, 0x5d, 0xd6, 0xb4, 0x32,
864	0xc8, 0x98, 0x57, 0x37, 0x8f, 0x8d, 0xa7, 0xa4, 0x23, 0xb2, 0x2d, 0x39, 0xfe, 0xeb, 0x6a, 0xba,
865	0x07, 0xfe, 0xfa, 0x39, 0x9b, 0xba, 0x9f, 0xc1, 0xa6, 0x29, 0xdf, 0xca, 0x80, 0x14, 0xfa, 0x1c,
866	0xc0, 0xd1, 0xfa, 0x94, 0x47, 0x5a, 0x6f, 0x24, 0xad, 0xbb, 0x3b, 0x62, 0xec, 0xe7, 0x8f, 0x0d,
867	0x5e, 0xb3, 0xed, 0xa5, 0xe1, 0x53, 0x3b, 0xc3, 0x44, 0x3f, 0x02, 0x18, 0x0f, 0xaf, 0x86, 0x7e,
868	0xa5, 0xd1, 0x61, 0x8d, 0x44, 0x84, 0x97, 0x3b, 0x36, 0x90, 0x60, 0xcd, 0x86, 0x36, 0x06, 0x07,
869	0xbb, 0x30, 0x37, 0xd3, 0x00, 0x2b, 0x64, 0xb4, 0xee, 0x98, 0xeb, 0xc5, 0xf1, 0x29, 0x80, 0xf1,
870	0xf0, 0xa0, 0xec, 0x87, 0xbd, 0xc3, 0x50, 0x55, 0x2e, 0xb5, 0xad, 0xaa, 0x35, 0xff, 0x5b, 0x42,
871	0x4b, 0x30, 0x53, 0xd1, 0x82, 0xf9, 0x5b, 0xd3, 0x57, 0x86, 0xe0, 0xf2, 0x40, 0x8b, 0x51, 0x1b,
872	0xbd, 0xe5, 0xa8, 0x52, 0x6e, 0x0c, 0xae, 0x28, 0x07, 0xc5, 0x72, 0xf3, 0xa0, 0x48, 0x23, 0x3d,
873	0x5a, 0xd9, 0xea, 0xf5, 0xeb, 0xe6, 0x7b, 0x10, 0x3a, 0x22, 0x23, 0x76, 0x5e, 0x97, 0x3b, 0x66,
874	0xb0, 0xce, 0xbb, 0x1d, 0x8e, 0x7c, 0x13, 0xf0, 0xae, 0x91, 0xaf, 0xa3, 0xf6, 0x93, 0xf0, 0x3b,
875	0x80, 0x89, 0x0e, 0x9b, 0x1e, 0xf5, 0x09, 0x66, 0xf7, 0x1b, 0x44, 0x79, 0xe5, 0x04, 0x9a, 0x32,
876	0x0f, 0x6b, 0x61, 0x67, 0x6e, 0xa0, 0xeb, 0x03, 0x3a, 0x93, 0xc1, 0xfc, 0x6d, 0xbf, 0xb0, 0x2e,
877	0x76, 0x5a, 0xdd, 0xa8, 0x0f, 0xb4, 0x1e, 0xeb, 0x7e, 0xb0, 0xa4, 0x6c, 0x84, 0xfd, 0xb8, 0xa9,
878	0x2e, 0x0e, 0xea, 0x87, 0x29, 0x80, 0xf8, 0xa3, 0xf0, 0x57, 0x00, 0x13, 0x1d, 0xee, 0x83, 0x7e,
879	0xf9, 0xe9, 0x7e, 0x52, 0x0c, 0xe6, 0xc9, 0x6b, 0x61, 0x4f, 0x96, 0xd4, 0x81, 0x33, 0x42, 0xec,
880	0xc0, 0x11, 0x9e, 0x94, 0x0e, 0x27, 0x48, 0xdf, 0xa4, 0x74, 0x3f, 0x5b, 0xfe, 0xe3, 0xa4, 0x08,
881	0x20, 0xbe, 0x2f, 0x9f, 0x00, 0x18, 0x2f, 0x10, 0xb6, 0x81, 0x2b, 0x39, 0xfe, 0x13, 0x0a, 0x52,
882	0x03, 0x20, 0x16, 0xae, 0x68, 0x35, 0xdf, 0x72, 0x83, 0x19, 0x80, 0x7d, 0xa6, 0x45, 0x46, 0x70,
883	0xd5, 0x65, 0x8e, 0x27, 0xa3, 0x2e, 0x34, 0xf0, 0x04, 0x5f, 0xe6, 0xbb, 0x0c, 0x74, 0x1a, 0x7a,
884	0xdc, 0x47, 0xf3, 0x31, 0x80, 0xf1, 0x6c, 0x2f, 0x34, 0xd9, 0xe8, 0x68, 0x6e, 0x71, 0x34, 0x8b,
885	0x28, 0x3a, 0x9a, 0x52, 0xd8, 0xf2, 0x77, 0x00, 0xa2, 0xbb, 0x84, 0x72, 0x0a, 0xf1, 0x2a, 0x16,
886	0x15, 0xd3, 0x71, 0xba, 0xc5, 0x58, 0xbb, 0x48, 0x00, 0xeb, 0xa5, 0x08, 0x92, 0x72, 0x58, 0xac,
887	0x73, 0xa8, 0xcb, 0xea, 0x52, 0x64, 0xa8, 0xac, 0xed, 0xb1, 0x0c, 0x48, 0x29, 0xb9, 0x47, 0xc6,
888	0x54, 0xaf, 0x43, 0xf7, 0x0f, 0x43, 0xdb, 0x67, 0xcc, 0xa5, 0x19, 0x5d, 0x3f, 0x3c, 0x3c, 0x6c,
889	0xbd, 0x82, 0x71, 0x95, 0xed, 0x8b, 0x5f, 0xe7, 0xae, 0xb9, 0x65, 0xcc, 0xf6, 0x1c, 0xaf, 0xb2,
890	0xf2, 0x13, 0x80, 0xc9, 0xa2, 0x53, 0xe9, 0x59, 0x9c, 0x2b, 0x71, 0x79, 0xad, 0xe6, 0xfc, 0x4d,
891	0x9a, 0x03, 0xef, 0xac, 0x4a, 0xe9, 0x92, 0x53, 0xc6, 0x76, 0x49, 0x73, 0xbc, 0x92, 0x5e, 0x22,
892	0x36, 0xdf, 0xb3, 0x7a, 0xc3, 0x66, 0xe7, 0x1f, 0x02, 0x97, 0xe4, 0xe7, 0xbf, 0x01, 0xf8, 0x2a,
893	0x36, 0x94, 0x2d, 0x6c, 0x3e, 0x8c, 0x4d, 0x65, 0xc5, 0x73, 0xab, 0xdc, 0xb8, 0xb4, 0xa5, 0x6d,
894	0xa5, 0x57, 0x7c, 0xf9, 0x47, 0x01, 0x7b, 0x9b, 0xb3, 0xb7, 0x25, 0x7b, 0x7b, 0x4b, 0x3c, 0xb7,
895	0x3b, 0xcc, 0xcd, 0xce, 0xff, 0x1b, 0x00, 0x00, 0xff, 0xff, 0xab, 0x76, 0x41, 0xdf, 0x3b, 0x15,
896	0x00, 0x00,
897}
898
899// Reference imports to suppress errors if they are not otherwise used.
900var _ context.Context
901var _ grpc.ClientConn
902
903// This is a compile-time assertion to ensure that this generated file
904// is compatible with the grpc package it is being compiled against.
905const _ = grpc.SupportPackageIsVersion4
906
907// SecretManagerServiceClient is the client API for SecretManagerService service.
908//
909// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream.
910type SecretManagerServiceClient interface {
911	// Lists [Secrets][google.cloud.secrets.v1beta1.Secret].
912	ListSecrets(ctx context.Context, in *ListSecretsRequest, opts ...grpc.CallOption) (*ListSecretsResponse, error)
913	// Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
914	CreateSecret(ctx context.Context, in *CreateSecretRequest, opts ...grpc.CallOption) (*Secret, error)
915	// Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret data and attaches
916	// it to an existing [Secret][google.cloud.secrets.v1beta1.Secret].
917	AddSecretVersion(ctx context.Context, in *AddSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error)
918	// Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret].
919	GetSecret(ctx context.Context, in *GetSecretRequest, opts ...grpc.CallOption) (*Secret, error)
920	// Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret].
921	UpdateSecret(ctx context.Context, in *UpdateSecretRequest, opts ...grpc.CallOption) (*Secret, error)
922	// Deletes a [Secret][google.cloud.secrets.v1beta1.Secret].
923	DeleteSecret(ctx context.Context, in *DeleteSecretRequest, opts ...grpc.CallOption) (*empty.Empty, error)
924	// Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return secret
925	// data.
926	ListSecretVersions(ctx context.Context, in *ListSecretVersionsRequest, opts ...grpc.CallOption) (*ListSecretVersionsResponse, error)
927	// Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
928	//
929	// `projects/*/secrets/*/versions/latest` is an alias to the `latest`
930	// [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
931	GetSecretVersion(ctx context.Context, in *GetSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error)
932	// Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the secret data.
933	//
934	// `projects/*/secrets/*/versions/latest` is an alias to the `latest`
935	// [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
936	AccessSecretVersion(ctx context.Context, in *AccessSecretVersionRequest, opts ...grpc.CallOption) (*AccessSecretVersionResponse, error)
937	// Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
938	//
939	// Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
940	// [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED].
941	DisableSecretVersion(ctx context.Context, in *DisableSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error)
942	// Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
943	//
944	// Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
945	// [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED].
946	EnableSecretVersion(ctx context.Context, in *EnableSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error)
947	// Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
948	//
949	// Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
950	// [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably destroys the
951	// secret data.
952	DestroySecretVersion(ctx context.Context, in *DestroySecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error)
953	// Sets the access control policy on the specified secret. Replaces any
954	// existing policy.
955	//
956	// Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced according
957	// to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret].
958	SetIamPolicy(ctx context.Context, in *v1.SetIamPolicyRequest, opts ...grpc.CallOption) (*v1.Policy, error)
959	// Gets the access control policy for a secret.
960	// Returns empty policy if the secret exists and does not have a policy set.
961	GetIamPolicy(ctx context.Context, in *v1.GetIamPolicyRequest, opts ...grpc.CallOption) (*v1.Policy, error)
962	// Returns permissions that a caller has for the specified secret.
963	// If the secret does not exist, this call returns an empty set of
964	// permissions, not a NOT_FOUND error.
965	//
966	// Note: This operation is designed to be used for building permission-aware
967	// UIs and command-line tools, not for authorization checking. This operation
968	// may "fail open" without warning.
969	TestIamPermissions(ctx context.Context, in *v1.TestIamPermissionsRequest, opts ...grpc.CallOption) (*v1.TestIamPermissionsResponse, error)
970}
971
972type secretManagerServiceClient struct {
973	cc *grpc.ClientConn
974}
975
976func NewSecretManagerServiceClient(cc *grpc.ClientConn) SecretManagerServiceClient {
977	return &secretManagerServiceClient{cc}
978}
979
980func (c *secretManagerServiceClient) ListSecrets(ctx context.Context, in *ListSecretsRequest, opts ...grpc.CallOption) (*ListSecretsResponse, error) {
981	out := new(ListSecretsResponse)
982	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/ListSecrets", in, out, opts...)
983	if err != nil {
984		return nil, err
985	}
986	return out, nil
987}
988
989func (c *secretManagerServiceClient) CreateSecret(ctx context.Context, in *CreateSecretRequest, opts ...grpc.CallOption) (*Secret, error) {
990	out := new(Secret)
991	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/CreateSecret", in, out, opts...)
992	if err != nil {
993		return nil, err
994	}
995	return out, nil
996}
997
998func (c *secretManagerServiceClient) AddSecretVersion(ctx context.Context, in *AddSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) {
999	out := new(SecretVersion)
1000	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/AddSecretVersion", in, out, opts...)
1001	if err != nil {
1002		return nil, err
1003	}
1004	return out, nil
1005}
1006
1007func (c *secretManagerServiceClient) GetSecret(ctx context.Context, in *GetSecretRequest, opts ...grpc.CallOption) (*Secret, error) {
1008	out := new(Secret)
1009	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/GetSecret", in, out, opts...)
1010	if err != nil {
1011		return nil, err
1012	}
1013	return out, nil
1014}
1015
1016func (c *secretManagerServiceClient) UpdateSecret(ctx context.Context, in *UpdateSecretRequest, opts ...grpc.CallOption) (*Secret, error) {
1017	out := new(Secret)
1018	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/UpdateSecret", in, out, opts...)
1019	if err != nil {
1020		return nil, err
1021	}
1022	return out, nil
1023}
1024
1025func (c *secretManagerServiceClient) DeleteSecret(ctx context.Context, in *DeleteSecretRequest, opts ...grpc.CallOption) (*empty.Empty, error) {
1026	out := new(empty.Empty)
1027	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/DeleteSecret", in, out, opts...)
1028	if err != nil {
1029		return nil, err
1030	}
1031	return out, nil
1032}
1033
1034func (c *secretManagerServiceClient) ListSecretVersions(ctx context.Context, in *ListSecretVersionsRequest, opts ...grpc.CallOption) (*ListSecretVersionsResponse, error) {
1035	out := new(ListSecretVersionsResponse)
1036	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/ListSecretVersions", in, out, opts...)
1037	if err != nil {
1038		return nil, err
1039	}
1040	return out, nil
1041}
1042
1043func (c *secretManagerServiceClient) GetSecretVersion(ctx context.Context, in *GetSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) {
1044	out := new(SecretVersion)
1045	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/GetSecretVersion", in, out, opts...)
1046	if err != nil {
1047		return nil, err
1048	}
1049	return out, nil
1050}
1051
1052func (c *secretManagerServiceClient) AccessSecretVersion(ctx context.Context, in *AccessSecretVersionRequest, opts ...grpc.CallOption) (*AccessSecretVersionResponse, error) {
1053	out := new(AccessSecretVersionResponse)
1054	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/AccessSecretVersion", in, out, opts...)
1055	if err != nil {
1056		return nil, err
1057	}
1058	return out, nil
1059}
1060
1061func (c *secretManagerServiceClient) DisableSecretVersion(ctx context.Context, in *DisableSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) {
1062	out := new(SecretVersion)
1063	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/DisableSecretVersion", in, out, opts...)
1064	if err != nil {
1065		return nil, err
1066	}
1067	return out, nil
1068}
1069
1070func (c *secretManagerServiceClient) EnableSecretVersion(ctx context.Context, in *EnableSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) {
1071	out := new(SecretVersion)
1072	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/EnableSecretVersion", in, out, opts...)
1073	if err != nil {
1074		return nil, err
1075	}
1076	return out, nil
1077}
1078
1079func (c *secretManagerServiceClient) DestroySecretVersion(ctx context.Context, in *DestroySecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) {
1080	out := new(SecretVersion)
1081	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/DestroySecretVersion", in, out, opts...)
1082	if err != nil {
1083		return nil, err
1084	}
1085	return out, nil
1086}
1087
1088func (c *secretManagerServiceClient) SetIamPolicy(ctx context.Context, in *v1.SetIamPolicyRequest, opts ...grpc.CallOption) (*v1.Policy, error) {
1089	out := new(v1.Policy)
1090	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/SetIamPolicy", in, out, opts...)
1091	if err != nil {
1092		return nil, err
1093	}
1094	return out, nil
1095}
1096
1097func (c *secretManagerServiceClient) GetIamPolicy(ctx context.Context, in *v1.GetIamPolicyRequest, opts ...grpc.CallOption) (*v1.Policy, error) {
1098	out := new(v1.Policy)
1099	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/GetIamPolicy", in, out, opts...)
1100	if err != nil {
1101		return nil, err
1102	}
1103	return out, nil
1104}
1105
1106func (c *secretManagerServiceClient) TestIamPermissions(ctx context.Context, in *v1.TestIamPermissionsRequest, opts ...grpc.CallOption) (*v1.TestIamPermissionsResponse, error) {
1107	out := new(v1.TestIamPermissionsResponse)
1108	err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/TestIamPermissions", in, out, opts...)
1109	if err != nil {
1110		return nil, err
1111	}
1112	return out, nil
1113}
1114
1115// SecretManagerServiceServer is the server API for SecretManagerService service.
1116type SecretManagerServiceServer interface {
1117	// Lists [Secrets][google.cloud.secrets.v1beta1.Secret].
1118	ListSecrets(context.Context, *ListSecretsRequest) (*ListSecretsResponse, error)
1119	// Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
1120	CreateSecret(context.Context, *CreateSecretRequest) (*Secret, error)
1121	// Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret data and attaches
1122	// it to an existing [Secret][google.cloud.secrets.v1beta1.Secret].
1123	AddSecretVersion(context.Context, *AddSecretVersionRequest) (*SecretVersion, error)
1124	// Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret].
1125	GetSecret(context.Context, *GetSecretRequest) (*Secret, error)
1126	// Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret].
1127	UpdateSecret(context.Context, *UpdateSecretRequest) (*Secret, error)
1128	// Deletes a [Secret][google.cloud.secrets.v1beta1.Secret].
1129	DeleteSecret(context.Context, *DeleteSecretRequest) (*empty.Empty, error)
1130	// Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return secret
1131	// data.
1132	ListSecretVersions(context.Context, *ListSecretVersionsRequest) (*ListSecretVersionsResponse, error)
1133	// Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
1134	//
1135	// `projects/*/secrets/*/versions/latest` is an alias to the `latest`
1136	// [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
1137	GetSecretVersion(context.Context, *GetSecretVersionRequest) (*SecretVersion, error)
1138	// Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the secret data.
1139	//
1140	// `projects/*/secrets/*/versions/latest` is an alias to the `latest`
1141	// [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
1142	AccessSecretVersion(context.Context, *AccessSecretVersionRequest) (*AccessSecretVersionResponse, error)
1143	// Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
1144	//
1145	// Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
1146	// [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED].
1147	DisableSecretVersion(context.Context, *DisableSecretVersionRequest) (*SecretVersion, error)
1148	// Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
1149	//
1150	// Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
1151	// [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED].
1152	EnableSecretVersion(context.Context, *EnableSecretVersionRequest) (*SecretVersion, error)
1153	// Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
1154	//
1155	// Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
1156	// [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably destroys the
1157	// secret data.
1158	DestroySecretVersion(context.Context, *DestroySecretVersionRequest) (*SecretVersion, error)
1159	// Sets the access control policy on the specified secret. Replaces any
1160	// existing policy.
1161	//
1162	// Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced according
1163	// to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret].
1164	SetIamPolicy(context.Context, *v1.SetIamPolicyRequest) (*v1.Policy, error)
1165	// Gets the access control policy for a secret.
1166	// Returns empty policy if the secret exists and does not have a policy set.
1167	GetIamPolicy(context.Context, *v1.GetIamPolicyRequest) (*v1.Policy, error)
1168	// Returns permissions that a caller has for the specified secret.
1169	// If the secret does not exist, this call returns an empty set of
1170	// permissions, not a NOT_FOUND error.
1171	//
1172	// Note: This operation is designed to be used for building permission-aware
1173	// UIs and command-line tools, not for authorization checking. This operation
1174	// may "fail open" without warning.
1175	TestIamPermissions(context.Context, *v1.TestIamPermissionsRequest) (*v1.TestIamPermissionsResponse, error)
1176}
1177
1178// UnimplementedSecretManagerServiceServer can be embedded to have forward compatible implementations.
1179type UnimplementedSecretManagerServiceServer struct {
1180}
1181
1182func (*UnimplementedSecretManagerServiceServer) ListSecrets(ctx context.Context, req *ListSecretsRequest) (*ListSecretsResponse, error) {
1183	return nil, status.Errorf(codes.Unimplemented, "method ListSecrets not implemented")
1184}
1185func (*UnimplementedSecretManagerServiceServer) CreateSecret(ctx context.Context, req *CreateSecretRequest) (*Secret, error) {
1186	return nil, status.Errorf(codes.Unimplemented, "method CreateSecret not implemented")
1187}
1188func (*UnimplementedSecretManagerServiceServer) AddSecretVersion(ctx context.Context, req *AddSecretVersionRequest) (*SecretVersion, error) {
1189	return nil, status.Errorf(codes.Unimplemented, "method AddSecretVersion not implemented")
1190}
1191func (*UnimplementedSecretManagerServiceServer) GetSecret(ctx context.Context, req *GetSecretRequest) (*Secret, error) {
1192	return nil, status.Errorf(codes.Unimplemented, "method GetSecret not implemented")
1193}
1194func (*UnimplementedSecretManagerServiceServer) UpdateSecret(ctx context.Context, req *UpdateSecretRequest) (*Secret, error) {
1195	return nil, status.Errorf(codes.Unimplemented, "method UpdateSecret not implemented")
1196}
1197func (*UnimplementedSecretManagerServiceServer) DeleteSecret(ctx context.Context, req *DeleteSecretRequest) (*empty.Empty, error) {
1198	return nil, status.Errorf(codes.Unimplemented, "method DeleteSecret not implemented")
1199}
1200func (*UnimplementedSecretManagerServiceServer) ListSecretVersions(ctx context.Context, req *ListSecretVersionsRequest) (*ListSecretVersionsResponse, error) {
1201	return nil, status.Errorf(codes.Unimplemented, "method ListSecretVersions not implemented")
1202}
1203func (*UnimplementedSecretManagerServiceServer) GetSecretVersion(ctx context.Context, req *GetSecretVersionRequest) (*SecretVersion, error) {
1204	return nil, status.Errorf(codes.Unimplemented, "method GetSecretVersion not implemented")
1205}
1206func (*UnimplementedSecretManagerServiceServer) AccessSecretVersion(ctx context.Context, req *AccessSecretVersionRequest) (*AccessSecretVersionResponse, error) {
1207	return nil, status.Errorf(codes.Unimplemented, "method AccessSecretVersion not implemented")
1208}
1209func (*UnimplementedSecretManagerServiceServer) DisableSecretVersion(ctx context.Context, req *DisableSecretVersionRequest) (*SecretVersion, error) {
1210	return nil, status.Errorf(codes.Unimplemented, "method DisableSecretVersion not implemented")
1211}
1212func (*UnimplementedSecretManagerServiceServer) EnableSecretVersion(ctx context.Context, req *EnableSecretVersionRequest) (*SecretVersion, error) {
1213	return nil, status.Errorf(codes.Unimplemented, "method EnableSecretVersion not implemented")
1214}
1215func (*UnimplementedSecretManagerServiceServer) DestroySecretVersion(ctx context.Context, req *DestroySecretVersionRequest) (*SecretVersion, error) {
1216	return nil, status.Errorf(codes.Unimplemented, "method DestroySecretVersion not implemented")
1217}
1218func (*UnimplementedSecretManagerServiceServer) SetIamPolicy(ctx context.Context, req *v1.SetIamPolicyRequest) (*v1.Policy, error) {
1219	return nil, status.Errorf(codes.Unimplemented, "method SetIamPolicy not implemented")
1220}
1221func (*UnimplementedSecretManagerServiceServer) GetIamPolicy(ctx context.Context, req *v1.GetIamPolicyRequest) (*v1.Policy, error) {
1222	return nil, status.Errorf(codes.Unimplemented, "method GetIamPolicy not implemented")
1223}
1224func (*UnimplementedSecretManagerServiceServer) TestIamPermissions(ctx context.Context, req *v1.TestIamPermissionsRequest) (*v1.TestIamPermissionsResponse, error) {
1225	return nil, status.Errorf(codes.Unimplemented, "method TestIamPermissions not implemented")
1226}
1227
1228func RegisterSecretManagerServiceServer(s *grpc.Server, srv SecretManagerServiceServer) {
1229	s.RegisterService(&_SecretManagerService_serviceDesc, srv)
1230}
1231
1232func _SecretManagerService_ListSecrets_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1233	in := new(ListSecretsRequest)
1234	if err := dec(in); err != nil {
1235		return nil, err
1236	}
1237	if interceptor == nil {
1238		return srv.(SecretManagerServiceServer).ListSecrets(ctx, in)
1239	}
1240	info := &grpc.UnaryServerInfo{
1241		Server:     srv,
1242		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/ListSecrets",
1243	}
1244	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1245		return srv.(SecretManagerServiceServer).ListSecrets(ctx, req.(*ListSecretsRequest))
1246	}
1247	return interceptor(ctx, in, info, handler)
1248}
1249
1250func _SecretManagerService_CreateSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1251	in := new(CreateSecretRequest)
1252	if err := dec(in); err != nil {
1253		return nil, err
1254	}
1255	if interceptor == nil {
1256		return srv.(SecretManagerServiceServer).CreateSecret(ctx, in)
1257	}
1258	info := &grpc.UnaryServerInfo{
1259		Server:     srv,
1260		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/CreateSecret",
1261	}
1262	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1263		return srv.(SecretManagerServiceServer).CreateSecret(ctx, req.(*CreateSecretRequest))
1264	}
1265	return interceptor(ctx, in, info, handler)
1266}
1267
1268func _SecretManagerService_AddSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1269	in := new(AddSecretVersionRequest)
1270	if err := dec(in); err != nil {
1271		return nil, err
1272	}
1273	if interceptor == nil {
1274		return srv.(SecretManagerServiceServer).AddSecretVersion(ctx, in)
1275	}
1276	info := &grpc.UnaryServerInfo{
1277		Server:     srv,
1278		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/AddSecretVersion",
1279	}
1280	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1281		return srv.(SecretManagerServiceServer).AddSecretVersion(ctx, req.(*AddSecretVersionRequest))
1282	}
1283	return interceptor(ctx, in, info, handler)
1284}
1285
1286func _SecretManagerService_GetSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1287	in := new(GetSecretRequest)
1288	if err := dec(in); err != nil {
1289		return nil, err
1290	}
1291	if interceptor == nil {
1292		return srv.(SecretManagerServiceServer).GetSecret(ctx, in)
1293	}
1294	info := &grpc.UnaryServerInfo{
1295		Server:     srv,
1296		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/GetSecret",
1297	}
1298	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1299		return srv.(SecretManagerServiceServer).GetSecret(ctx, req.(*GetSecretRequest))
1300	}
1301	return interceptor(ctx, in, info, handler)
1302}
1303
1304func _SecretManagerService_UpdateSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1305	in := new(UpdateSecretRequest)
1306	if err := dec(in); err != nil {
1307		return nil, err
1308	}
1309	if interceptor == nil {
1310		return srv.(SecretManagerServiceServer).UpdateSecret(ctx, in)
1311	}
1312	info := &grpc.UnaryServerInfo{
1313		Server:     srv,
1314		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/UpdateSecret",
1315	}
1316	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1317		return srv.(SecretManagerServiceServer).UpdateSecret(ctx, req.(*UpdateSecretRequest))
1318	}
1319	return interceptor(ctx, in, info, handler)
1320}
1321
1322func _SecretManagerService_DeleteSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1323	in := new(DeleteSecretRequest)
1324	if err := dec(in); err != nil {
1325		return nil, err
1326	}
1327	if interceptor == nil {
1328		return srv.(SecretManagerServiceServer).DeleteSecret(ctx, in)
1329	}
1330	info := &grpc.UnaryServerInfo{
1331		Server:     srv,
1332		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/DeleteSecret",
1333	}
1334	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1335		return srv.(SecretManagerServiceServer).DeleteSecret(ctx, req.(*DeleteSecretRequest))
1336	}
1337	return interceptor(ctx, in, info, handler)
1338}
1339
1340func _SecretManagerService_ListSecretVersions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1341	in := new(ListSecretVersionsRequest)
1342	if err := dec(in); err != nil {
1343		return nil, err
1344	}
1345	if interceptor == nil {
1346		return srv.(SecretManagerServiceServer).ListSecretVersions(ctx, in)
1347	}
1348	info := &grpc.UnaryServerInfo{
1349		Server:     srv,
1350		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/ListSecretVersions",
1351	}
1352	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1353		return srv.(SecretManagerServiceServer).ListSecretVersions(ctx, req.(*ListSecretVersionsRequest))
1354	}
1355	return interceptor(ctx, in, info, handler)
1356}
1357
1358func _SecretManagerService_GetSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1359	in := new(GetSecretVersionRequest)
1360	if err := dec(in); err != nil {
1361		return nil, err
1362	}
1363	if interceptor == nil {
1364		return srv.(SecretManagerServiceServer).GetSecretVersion(ctx, in)
1365	}
1366	info := &grpc.UnaryServerInfo{
1367		Server:     srv,
1368		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/GetSecretVersion",
1369	}
1370	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1371		return srv.(SecretManagerServiceServer).GetSecretVersion(ctx, req.(*GetSecretVersionRequest))
1372	}
1373	return interceptor(ctx, in, info, handler)
1374}
1375
1376func _SecretManagerService_AccessSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1377	in := new(AccessSecretVersionRequest)
1378	if err := dec(in); err != nil {
1379		return nil, err
1380	}
1381	if interceptor == nil {
1382		return srv.(SecretManagerServiceServer).AccessSecretVersion(ctx, in)
1383	}
1384	info := &grpc.UnaryServerInfo{
1385		Server:     srv,
1386		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/AccessSecretVersion",
1387	}
1388	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1389		return srv.(SecretManagerServiceServer).AccessSecretVersion(ctx, req.(*AccessSecretVersionRequest))
1390	}
1391	return interceptor(ctx, in, info, handler)
1392}
1393
1394func _SecretManagerService_DisableSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1395	in := new(DisableSecretVersionRequest)
1396	if err := dec(in); err != nil {
1397		return nil, err
1398	}
1399	if interceptor == nil {
1400		return srv.(SecretManagerServiceServer).DisableSecretVersion(ctx, in)
1401	}
1402	info := &grpc.UnaryServerInfo{
1403		Server:     srv,
1404		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/DisableSecretVersion",
1405	}
1406	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1407		return srv.(SecretManagerServiceServer).DisableSecretVersion(ctx, req.(*DisableSecretVersionRequest))
1408	}
1409	return interceptor(ctx, in, info, handler)
1410}
1411
1412func _SecretManagerService_EnableSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1413	in := new(EnableSecretVersionRequest)
1414	if err := dec(in); err != nil {
1415		return nil, err
1416	}
1417	if interceptor == nil {
1418		return srv.(SecretManagerServiceServer).EnableSecretVersion(ctx, in)
1419	}
1420	info := &grpc.UnaryServerInfo{
1421		Server:     srv,
1422		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/EnableSecretVersion",
1423	}
1424	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1425		return srv.(SecretManagerServiceServer).EnableSecretVersion(ctx, req.(*EnableSecretVersionRequest))
1426	}
1427	return interceptor(ctx, in, info, handler)
1428}
1429
1430func _SecretManagerService_DestroySecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1431	in := new(DestroySecretVersionRequest)
1432	if err := dec(in); err != nil {
1433		return nil, err
1434	}
1435	if interceptor == nil {
1436		return srv.(SecretManagerServiceServer).DestroySecretVersion(ctx, in)
1437	}
1438	info := &grpc.UnaryServerInfo{
1439		Server:     srv,
1440		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/DestroySecretVersion",
1441	}
1442	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1443		return srv.(SecretManagerServiceServer).DestroySecretVersion(ctx, req.(*DestroySecretVersionRequest))
1444	}
1445	return interceptor(ctx, in, info, handler)
1446}
1447
1448func _SecretManagerService_SetIamPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1449	in := new(v1.SetIamPolicyRequest)
1450	if err := dec(in); err != nil {
1451		return nil, err
1452	}
1453	if interceptor == nil {
1454		return srv.(SecretManagerServiceServer).SetIamPolicy(ctx, in)
1455	}
1456	info := &grpc.UnaryServerInfo{
1457		Server:     srv,
1458		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/SetIamPolicy",
1459	}
1460	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1461		return srv.(SecretManagerServiceServer).SetIamPolicy(ctx, req.(*v1.SetIamPolicyRequest))
1462	}
1463	return interceptor(ctx, in, info, handler)
1464}
1465
1466func _SecretManagerService_GetIamPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1467	in := new(v1.GetIamPolicyRequest)
1468	if err := dec(in); err != nil {
1469		return nil, err
1470	}
1471	if interceptor == nil {
1472		return srv.(SecretManagerServiceServer).GetIamPolicy(ctx, in)
1473	}
1474	info := &grpc.UnaryServerInfo{
1475		Server:     srv,
1476		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/GetIamPolicy",
1477	}
1478	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1479		return srv.(SecretManagerServiceServer).GetIamPolicy(ctx, req.(*v1.GetIamPolicyRequest))
1480	}
1481	return interceptor(ctx, in, info, handler)
1482}
1483
1484func _SecretManagerService_TestIamPermissions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
1485	in := new(v1.TestIamPermissionsRequest)
1486	if err := dec(in); err != nil {
1487		return nil, err
1488	}
1489	if interceptor == nil {
1490		return srv.(SecretManagerServiceServer).TestIamPermissions(ctx, in)
1491	}
1492	info := &grpc.UnaryServerInfo{
1493		Server:     srv,
1494		FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/TestIamPermissions",
1495	}
1496	handler := func(ctx context.Context, req interface{}) (interface{}, error) {
1497		return srv.(SecretManagerServiceServer).TestIamPermissions(ctx, req.(*v1.TestIamPermissionsRequest))
1498	}
1499	return interceptor(ctx, in, info, handler)
1500}
1501
1502var _SecretManagerService_serviceDesc = grpc.ServiceDesc{
1503	ServiceName: "google.cloud.secrets.v1beta1.SecretManagerService",
1504	HandlerType: (*SecretManagerServiceServer)(nil),
1505	Methods: []grpc.MethodDesc{
1506		{
1507			MethodName: "ListSecrets",
1508			Handler:    _SecretManagerService_ListSecrets_Handler,
1509		},
1510		{
1511			MethodName: "CreateSecret",
1512			Handler:    _SecretManagerService_CreateSecret_Handler,
1513		},
1514		{
1515			MethodName: "AddSecretVersion",
1516			Handler:    _SecretManagerService_AddSecretVersion_Handler,
1517		},
1518		{
1519			MethodName: "GetSecret",
1520			Handler:    _SecretManagerService_GetSecret_Handler,
1521		},
1522		{
1523			MethodName: "UpdateSecret",
1524			Handler:    _SecretManagerService_UpdateSecret_Handler,
1525		},
1526		{
1527			MethodName: "DeleteSecret",
1528			Handler:    _SecretManagerService_DeleteSecret_Handler,
1529		},
1530		{
1531			MethodName: "ListSecretVersions",
1532			Handler:    _SecretManagerService_ListSecretVersions_Handler,
1533		},
1534		{
1535			MethodName: "GetSecretVersion",
1536			Handler:    _SecretManagerService_GetSecretVersion_Handler,
1537		},
1538		{
1539			MethodName: "AccessSecretVersion",
1540			Handler:    _SecretManagerService_AccessSecretVersion_Handler,
1541		},
1542		{
1543			MethodName: "DisableSecretVersion",
1544			Handler:    _SecretManagerService_DisableSecretVersion_Handler,
1545		},
1546		{
1547			MethodName: "EnableSecretVersion",
1548			Handler:    _SecretManagerService_EnableSecretVersion_Handler,
1549		},
1550		{
1551			MethodName: "DestroySecretVersion",
1552			Handler:    _SecretManagerService_DestroySecretVersion_Handler,
1553		},
1554		{
1555			MethodName: "SetIamPolicy",
1556			Handler:    _SecretManagerService_SetIamPolicy_Handler,
1557		},
1558		{
1559			MethodName: "GetIamPolicy",
1560			Handler:    _SecretManagerService_GetIamPolicy_Handler,
1561		},
1562		{
1563			MethodName: "TestIamPermissions",
1564			Handler:    _SecretManagerService_TestIamPermissions_Handler,
1565		},
1566	},
1567	Streams:  []grpc.StreamDesc{},
1568	Metadata: "google/cloud/secrets/v1beta1/service.proto",
1569}
1570