blob: 6154b78d267d6e85c3189a00d1bb9d025b0a7055 [file] [log] [blame]
// Code generated by protoc-gen-go. DO NOT EDIT.
// source: google/cloud/secrets/v1beta1/service.proto
package secretmanager
import (
context "context"
fmt "fmt"
math "math"
proto "github.com/golang/protobuf/proto"
empty "github.com/golang/protobuf/ptypes/empty"
_ "google.golang.org/genproto/googleapis/api/annotations"
v1 "google.golang.org/genproto/googleapis/iam/v1"
field_mask "google.golang.org/genproto/protobuf/field_mask"
grpc "google.golang.org/grpc"
codes "google.golang.org/grpc/codes"
status "google.golang.org/grpc/status"
)
// Reference imports to suppress errors if they are not otherwise used.
var _ = proto.Marshal
var _ = fmt.Errorf
var _ = math.Inf
// This is a compile-time assertion to ensure that this generated file
// is compatible with the proto package it is being compiled against.
// A compilation error at this line likely means your copy of the
// proto package needs to be updated.
const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package
// Request message for [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets].
type ListSecretsRequest struct {
// Required. The resource name of the project associated with the
// [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
// Optional. The maximum number of results to be returned in a single page. If
// set to 0, the server decides the number of results to return. If the
// number is greater than 25000, it is capped at 25000.
PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"`
// Optional. Pagination token, returned earlier via
// [ListSecretsResponse.next_page_token][google.cloud.secrets.v1beta1.ListSecretsResponse.next_page_token].
PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *ListSecretsRequest) Reset() { *m = ListSecretsRequest{} }
func (m *ListSecretsRequest) String() string { return proto.CompactTextString(m) }
func (*ListSecretsRequest) ProtoMessage() {}
func (*ListSecretsRequest) Descriptor() ([]byte, []int) {
return fileDescriptor_67a0e1a61a378c59, []int{0}
}
func (m *ListSecretsRequest) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_ListSecretsRequest.Unmarshal(m, b)
}
func (m *ListSecretsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_ListSecretsRequest.Marshal(b, m, deterministic)
}
func (m *ListSecretsRequest) XXX_Merge(src proto.Message) {
xxx_messageInfo_ListSecretsRequest.Merge(m, src)
}
func (m *ListSecretsRequest) XXX_Size() int {
return xxx_messageInfo_ListSecretsRequest.Size(m)
}
func (m *ListSecretsRequest) XXX_DiscardUnknown() {
xxx_messageInfo_ListSecretsRequest.DiscardUnknown(m)
}
var xxx_messageInfo_ListSecretsRequest proto.InternalMessageInfo
func (m *ListSecretsRequest) GetParent() string {
if m != nil {
return m.Parent
}
return ""
}
func (m *ListSecretsRequest) GetPageSize() int32 {
if m != nil {
return m.PageSize
}
return 0
}
func (m *ListSecretsRequest) GetPageToken() string {
if m != nil {
return m.PageToken
}
return ""
}
// Response message for [SecretManagerService.ListSecrets][google.cloud.secrets.v1beta1.SecretManagerService.ListSecrets].
type ListSecretsResponse struct {
// The list of [Secrets][google.cloud.secrets.v1beta1.Secret] sorted in reverse by create_time (newest
// first).
Secrets []*Secret `protobuf:"bytes,1,rep,name=secrets,proto3" json:"secrets,omitempty"`
// A token to retrieve the next page of results. Pass this value in
// [ListSecretsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretsRequest.page_token] to retrieve the next page.
NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"`
// The total number of [Secrets][google.cloud.secrets.v1beta1.Secret].
TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *ListSecretsResponse) Reset() { *m = ListSecretsResponse{} }
func (m *ListSecretsResponse) String() string { return proto.CompactTextString(m) }
func (*ListSecretsResponse) ProtoMessage() {}
func (*ListSecretsResponse) Descriptor() ([]byte, []int) {
return fileDescriptor_67a0e1a61a378c59, []int{1}
}
func (m *ListSecretsResponse) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_ListSecretsResponse.Unmarshal(m, b)
}
func (m *ListSecretsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_ListSecretsResponse.Marshal(b, m, deterministic)
}
func (m *ListSecretsResponse) XXX_Merge(src proto.Message) {
xxx_messageInfo_ListSecretsResponse.Merge(m, src)
}
func (m *ListSecretsResponse) XXX_Size() int {
return xxx_messageInfo_ListSecretsResponse.Size(m)
}
func (m *ListSecretsResponse) XXX_DiscardUnknown() {
xxx_messageInfo_ListSecretsResponse.DiscardUnknown(m)
}
var xxx_messageInfo_ListSecretsResponse proto.InternalMessageInfo
func (m *ListSecretsResponse) GetSecrets() []*Secret {
if m != nil {
return m.Secrets
}
return nil
}
func (m *ListSecretsResponse) GetNextPageToken() string {
if m != nil {
return m.NextPageToken
}
return ""
}
func (m *ListSecretsResponse) GetTotalSize() int32 {
if m != nil {
return m.TotalSize
}
return 0
}
// Request message for [SecretManagerService.CreateSecret][google.cloud.secrets.v1beta1.SecretManagerService.CreateSecret].
type CreateSecretRequest struct {
// Required. The resource name of the project to associate with the
// [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`.
Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
// Required. This must be unique within the project.
SecretId string `protobuf:"bytes,2,opt,name=secret_id,json=secretId,proto3" json:"secret_id,omitempty"`
// A [Secret][google.cloud.secrets.v1beta1.Secret] with initial field values.
Secret *Secret `protobuf:"bytes,3,opt,name=secret,proto3" json:"secret,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *CreateSecretRequest) Reset() { *m = CreateSecretRequest{} }
func (m *CreateSecretRequest) String() string { return proto.CompactTextString(m) }
func (*CreateSecretRequest) ProtoMessage() {}
func (*CreateSecretRequest) Descriptor() ([]byte, []int) {
return fileDescriptor_67a0e1a61a378c59, []int{2}
}
func (m *CreateSecretRequest) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_CreateSecretRequest.Unmarshal(m, b)
}
func (m *CreateSecretRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_CreateSecretRequest.Marshal(b, m, deterministic)
}
func (m *CreateSecretRequest) XXX_Merge(src proto.Message) {
xxx_messageInfo_CreateSecretRequest.Merge(m, src)
}
func (m *CreateSecretRequest) XXX_Size() int {
return xxx_messageInfo_CreateSecretRequest.Size(m)
}
func (m *CreateSecretRequest) XXX_DiscardUnknown() {
xxx_messageInfo_CreateSecretRequest.DiscardUnknown(m)
}
var xxx_messageInfo_CreateSecretRequest proto.InternalMessageInfo
func (m *CreateSecretRequest) GetParent() string {
if m != nil {
return m.Parent
}
return ""
}
func (m *CreateSecretRequest) GetSecretId() string {
if m != nil {
return m.SecretId
}
return ""
}
func (m *CreateSecretRequest) GetSecret() *Secret {
if m != nil {
return m.Secret
}
return nil
}
// Request message for [SecretManagerService.AddSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AddSecretVersion].
type AddSecretVersionRequest struct {
// Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to associate with the
// [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format `projects/*/secrets/*`.
Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
// Required. The secret payload of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
Payload *SecretPayload `protobuf:"bytes,2,opt,name=payload,proto3" json:"payload,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *AddSecretVersionRequest) Reset() { *m = AddSecretVersionRequest{} }
func (m *AddSecretVersionRequest) String() string { return proto.CompactTextString(m) }
func (*AddSecretVersionRequest) ProtoMessage() {}
func (*AddSecretVersionRequest) Descriptor() ([]byte, []int) {
return fileDescriptor_67a0e1a61a378c59, []int{3}
}
func (m *AddSecretVersionRequest) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_AddSecretVersionRequest.Unmarshal(m, b)
}
func (m *AddSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_AddSecretVersionRequest.Marshal(b, m, deterministic)
}
func (m *AddSecretVersionRequest) XXX_Merge(src proto.Message) {
xxx_messageInfo_AddSecretVersionRequest.Merge(m, src)
}
func (m *AddSecretVersionRequest) XXX_Size() int {
return xxx_messageInfo_AddSecretVersionRequest.Size(m)
}
func (m *AddSecretVersionRequest) XXX_DiscardUnknown() {
xxx_messageInfo_AddSecretVersionRequest.DiscardUnknown(m)
}
var xxx_messageInfo_AddSecretVersionRequest proto.InternalMessageInfo
func (m *AddSecretVersionRequest) GetParent() string {
if m != nil {
return m.Parent
}
return ""
}
func (m *AddSecretVersionRequest) GetPayload() *SecretPayload {
if m != nil {
return m.Payload
}
return nil
}
// Request message for [SecretManagerService.GetSecret][google.cloud.secrets.v1beta1.SecretManagerService.GetSecret].
type GetSecretRequest struct {
// Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret], in the format `projects/*/secrets/*`.
Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *GetSecretRequest) Reset() { *m = GetSecretRequest{} }
func (m *GetSecretRequest) String() string { return proto.CompactTextString(m) }
func (*GetSecretRequest) ProtoMessage() {}
func (*GetSecretRequest) Descriptor() ([]byte, []int) {
return fileDescriptor_67a0e1a61a378c59, []int{4}
}
func (m *GetSecretRequest) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_GetSecretRequest.Unmarshal(m, b)
}
func (m *GetSecretRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_GetSecretRequest.Marshal(b, m, deterministic)
}
func (m *GetSecretRequest) XXX_Merge(src proto.Message) {
xxx_messageInfo_GetSecretRequest.Merge(m, src)
}
func (m *GetSecretRequest) XXX_Size() int {
return xxx_messageInfo_GetSecretRequest.Size(m)
}
func (m *GetSecretRequest) XXX_DiscardUnknown() {
xxx_messageInfo_GetSecretRequest.DiscardUnknown(m)
}
var xxx_messageInfo_GetSecretRequest proto.InternalMessageInfo
func (m *GetSecretRequest) GetName() string {
if m != nil {
return m.Name
}
return ""
}
// Request message for [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions].
type ListSecretVersionsRequest struct {
// Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] associated with the
// [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] to list, in the format
// `projects/*/secrets/*`.
Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"`
// Optional. The maximum number of results to be returned in a single page. If
// set to 0, the server decides the number of results to return. If the
// number is greater than 25000, it is capped at 25000.
PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"`
// Optional. Pagination token, returned earlier via
// ListSecretVersionsResponse.next_page_token][].
PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *ListSecretVersionsRequest) Reset() { *m = ListSecretVersionsRequest{} }
func (m *ListSecretVersionsRequest) String() string { return proto.CompactTextString(m) }
func (*ListSecretVersionsRequest) ProtoMessage() {}
func (*ListSecretVersionsRequest) Descriptor() ([]byte, []int) {
return fileDescriptor_67a0e1a61a378c59, []int{5}
}
func (m *ListSecretVersionsRequest) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_ListSecretVersionsRequest.Unmarshal(m, b)
}
func (m *ListSecretVersionsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_ListSecretVersionsRequest.Marshal(b, m, deterministic)
}
func (m *ListSecretVersionsRequest) XXX_Merge(src proto.Message) {
xxx_messageInfo_ListSecretVersionsRequest.Merge(m, src)
}
func (m *ListSecretVersionsRequest) XXX_Size() int {
return xxx_messageInfo_ListSecretVersionsRequest.Size(m)
}
func (m *ListSecretVersionsRequest) XXX_DiscardUnknown() {
xxx_messageInfo_ListSecretVersionsRequest.DiscardUnknown(m)
}
var xxx_messageInfo_ListSecretVersionsRequest proto.InternalMessageInfo
func (m *ListSecretVersionsRequest) GetParent() string {
if m != nil {
return m.Parent
}
return ""
}
func (m *ListSecretVersionsRequest) GetPageSize() int32 {
if m != nil {
return m.PageSize
}
return 0
}
func (m *ListSecretVersionsRequest) GetPageToken() string {
if m != nil {
return m.PageToken
}
return ""
}
// Response message for [SecretManagerService.ListSecretVersions][google.cloud.secrets.v1beta1.SecretManagerService.ListSecretVersions].
type ListSecretVersionsResponse struct {
// The list of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] sorted in reverse by
// create_time (newest first).
Versions []*SecretVersion `protobuf:"bytes,1,rep,name=versions,proto3" json:"versions,omitempty"`
// A token to retrieve the next page of results. Pass this value in
// [ListSecretVersionsRequest.page_token][google.cloud.secrets.v1beta1.ListSecretVersionsRequest.page_token] to retrieve the next page.
NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"`
// The total number of [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *ListSecretVersionsResponse) Reset() { *m = ListSecretVersionsResponse{} }
func (m *ListSecretVersionsResponse) String() string { return proto.CompactTextString(m) }
func (*ListSecretVersionsResponse) ProtoMessage() {}
func (*ListSecretVersionsResponse) Descriptor() ([]byte, []int) {
return fileDescriptor_67a0e1a61a378c59, []int{6}
}
func (m *ListSecretVersionsResponse) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_ListSecretVersionsResponse.Unmarshal(m, b)
}
func (m *ListSecretVersionsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_ListSecretVersionsResponse.Marshal(b, m, deterministic)
}
func (m *ListSecretVersionsResponse) XXX_Merge(src proto.Message) {
xxx_messageInfo_ListSecretVersionsResponse.Merge(m, src)
}
func (m *ListSecretVersionsResponse) XXX_Size() int {
return xxx_messageInfo_ListSecretVersionsResponse.Size(m)
}
func (m *ListSecretVersionsResponse) XXX_DiscardUnknown() {
xxx_messageInfo_ListSecretVersionsResponse.DiscardUnknown(m)
}
var xxx_messageInfo_ListSecretVersionsResponse proto.InternalMessageInfo
func (m *ListSecretVersionsResponse) GetVersions() []*SecretVersion {
if m != nil {
return m.Versions
}
return nil
}
func (m *ListSecretVersionsResponse) GetNextPageToken() string {
if m != nil {
return m.NextPageToken
}
return ""
}
func (m *ListSecretVersionsResponse) GetTotalSize() int32 {
if m != nil {
return m.TotalSize
}
return 0
}
// Request message for [SecretManagerService.GetSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.GetSecretVersion].
type GetSecretVersionRequest struct {
// Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
// `projects/*/secrets/*/versions/*`.
// `projects/*/secrets/*/versions/latest` is an alias to the `latest`
// [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *GetSecretVersionRequest) Reset() { *m = GetSecretVersionRequest{} }
func (m *GetSecretVersionRequest) String() string { return proto.CompactTextString(m) }
func (*GetSecretVersionRequest) ProtoMessage() {}
func (*GetSecretVersionRequest) Descriptor() ([]byte, []int) {
return fileDescriptor_67a0e1a61a378c59, []int{7}
}
func (m *GetSecretVersionRequest) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_GetSecretVersionRequest.Unmarshal(m, b)
}
func (m *GetSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_GetSecretVersionRequest.Marshal(b, m, deterministic)
}
func (m *GetSecretVersionRequest) XXX_Merge(src proto.Message) {
xxx_messageInfo_GetSecretVersionRequest.Merge(m, src)
}
func (m *GetSecretVersionRequest) XXX_Size() int {
return xxx_messageInfo_GetSecretVersionRequest.Size(m)
}
func (m *GetSecretVersionRequest) XXX_DiscardUnknown() {
xxx_messageInfo_GetSecretVersionRequest.DiscardUnknown(m)
}
var xxx_messageInfo_GetSecretVersionRequest proto.InternalMessageInfo
func (m *GetSecretVersionRequest) GetName() string {
if m != nil {
return m.Name
}
return ""
}
// Request message for [SecretManagerService.UpdateSecret][google.cloud.secrets.v1beta1.SecretManagerService.UpdateSecret].
type UpdateSecretRequest struct {
// Required. [Secret][google.cloud.secrets.v1beta1.Secret] with updated field values.
Secret *Secret `protobuf:"bytes,1,opt,name=secret,proto3" json:"secret,omitempty"`
// Required. Specifies the fields to be updated.
UpdateMask *field_mask.FieldMask `protobuf:"bytes,2,opt,name=update_mask,json=updateMask,proto3" json:"update_mask,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *UpdateSecretRequest) Reset() { *m = UpdateSecretRequest{} }
func (m *UpdateSecretRequest) String() string { return proto.CompactTextString(m) }
func (*UpdateSecretRequest) ProtoMessage() {}
func (*UpdateSecretRequest) Descriptor() ([]byte, []int) {
return fileDescriptor_67a0e1a61a378c59, []int{8}
}
func (m *UpdateSecretRequest) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_UpdateSecretRequest.Unmarshal(m, b)
}
func (m *UpdateSecretRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_UpdateSecretRequest.Marshal(b, m, deterministic)
}
func (m *UpdateSecretRequest) XXX_Merge(src proto.Message) {
xxx_messageInfo_UpdateSecretRequest.Merge(m, src)
}
func (m *UpdateSecretRequest) XXX_Size() int {
return xxx_messageInfo_UpdateSecretRequest.Size(m)
}
func (m *UpdateSecretRequest) XXX_DiscardUnknown() {
xxx_messageInfo_UpdateSecretRequest.DiscardUnknown(m)
}
var xxx_messageInfo_UpdateSecretRequest proto.InternalMessageInfo
func (m *UpdateSecretRequest) GetSecret() *Secret {
if m != nil {
return m.Secret
}
return nil
}
func (m *UpdateSecretRequest) GetUpdateMask() *field_mask.FieldMask {
if m != nil {
return m.UpdateMask
}
return nil
}
// Request message for [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion].
type AccessSecretVersionRequest struct {
// Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
// `projects/*/secrets/*/versions/*`.
Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *AccessSecretVersionRequest) Reset() { *m = AccessSecretVersionRequest{} }
func (m *AccessSecretVersionRequest) String() string { return proto.CompactTextString(m) }
func (*AccessSecretVersionRequest) ProtoMessage() {}
func (*AccessSecretVersionRequest) Descriptor() ([]byte, []int) {
return fileDescriptor_67a0e1a61a378c59, []int{9}
}
func (m *AccessSecretVersionRequest) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_AccessSecretVersionRequest.Unmarshal(m, b)
}
func (m *AccessSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_AccessSecretVersionRequest.Marshal(b, m, deterministic)
}
func (m *AccessSecretVersionRequest) XXX_Merge(src proto.Message) {
xxx_messageInfo_AccessSecretVersionRequest.Merge(m, src)
}
func (m *AccessSecretVersionRequest) XXX_Size() int {
return xxx_messageInfo_AccessSecretVersionRequest.Size(m)
}
func (m *AccessSecretVersionRequest) XXX_DiscardUnknown() {
xxx_messageInfo_AccessSecretVersionRequest.DiscardUnknown(m)
}
var xxx_messageInfo_AccessSecretVersionRequest proto.InternalMessageInfo
func (m *AccessSecretVersionRequest) GetName() string {
if m != nil {
return m.Name
}
return ""
}
// Response message for [SecretManagerService.AccessSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.AccessSecretVersion].
type AccessSecretVersionResponse struct {
// The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] in the format
// `projects/*/secrets/*/versions/*`.
Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
// Secret payload
Payload *SecretPayload `protobuf:"bytes,2,opt,name=payload,proto3" json:"payload,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *AccessSecretVersionResponse) Reset() { *m = AccessSecretVersionResponse{} }
func (m *AccessSecretVersionResponse) String() string { return proto.CompactTextString(m) }
func (*AccessSecretVersionResponse) ProtoMessage() {}
func (*AccessSecretVersionResponse) Descriptor() ([]byte, []int) {
return fileDescriptor_67a0e1a61a378c59, []int{10}
}
func (m *AccessSecretVersionResponse) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_AccessSecretVersionResponse.Unmarshal(m, b)
}
func (m *AccessSecretVersionResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_AccessSecretVersionResponse.Marshal(b, m, deterministic)
}
func (m *AccessSecretVersionResponse) XXX_Merge(src proto.Message) {
xxx_messageInfo_AccessSecretVersionResponse.Merge(m, src)
}
func (m *AccessSecretVersionResponse) XXX_Size() int {
return xxx_messageInfo_AccessSecretVersionResponse.Size(m)
}
func (m *AccessSecretVersionResponse) XXX_DiscardUnknown() {
xxx_messageInfo_AccessSecretVersionResponse.DiscardUnknown(m)
}
var xxx_messageInfo_AccessSecretVersionResponse proto.InternalMessageInfo
func (m *AccessSecretVersionResponse) GetName() string {
if m != nil {
return m.Name
}
return ""
}
func (m *AccessSecretVersionResponse) GetPayload() *SecretPayload {
if m != nil {
return m.Payload
}
return nil
}
// Request message for [SecretManagerService.DeleteSecret][google.cloud.secrets.v1beta1.SecretManagerService.DeleteSecret].
type DeleteSecretRequest struct {
// Required. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] to delete in the format
// `projects/*/secrets/*`.
Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *DeleteSecretRequest) Reset() { *m = DeleteSecretRequest{} }
func (m *DeleteSecretRequest) String() string { return proto.CompactTextString(m) }
func (*DeleteSecretRequest) ProtoMessage() {}
func (*DeleteSecretRequest) Descriptor() ([]byte, []int) {
return fileDescriptor_67a0e1a61a378c59, []int{11}
}
func (m *DeleteSecretRequest) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_DeleteSecretRequest.Unmarshal(m, b)
}
func (m *DeleteSecretRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_DeleteSecretRequest.Marshal(b, m, deterministic)
}
func (m *DeleteSecretRequest) XXX_Merge(src proto.Message) {
xxx_messageInfo_DeleteSecretRequest.Merge(m, src)
}
func (m *DeleteSecretRequest) XXX_Size() int {
return xxx_messageInfo_DeleteSecretRequest.Size(m)
}
func (m *DeleteSecretRequest) XXX_DiscardUnknown() {
xxx_messageInfo_DeleteSecretRequest.DiscardUnknown(m)
}
var xxx_messageInfo_DeleteSecretRequest proto.InternalMessageInfo
func (m *DeleteSecretRequest) GetName() string {
if m != nil {
return m.Name
}
return ""
}
// Request message for [SecretManagerService.DisableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DisableSecretVersion].
type DisableSecretVersionRequest struct {
// Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to disable in the format
// `projects/*/secrets/*/versions/*`.
Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *DisableSecretVersionRequest) Reset() { *m = DisableSecretVersionRequest{} }
func (m *DisableSecretVersionRequest) String() string { return proto.CompactTextString(m) }
func (*DisableSecretVersionRequest) ProtoMessage() {}
func (*DisableSecretVersionRequest) Descriptor() ([]byte, []int) {
return fileDescriptor_67a0e1a61a378c59, []int{12}
}
func (m *DisableSecretVersionRequest) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_DisableSecretVersionRequest.Unmarshal(m, b)
}
func (m *DisableSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_DisableSecretVersionRequest.Marshal(b, m, deterministic)
}
func (m *DisableSecretVersionRequest) XXX_Merge(src proto.Message) {
xxx_messageInfo_DisableSecretVersionRequest.Merge(m, src)
}
func (m *DisableSecretVersionRequest) XXX_Size() int {
return xxx_messageInfo_DisableSecretVersionRequest.Size(m)
}
func (m *DisableSecretVersionRequest) XXX_DiscardUnknown() {
xxx_messageInfo_DisableSecretVersionRequest.DiscardUnknown(m)
}
var xxx_messageInfo_DisableSecretVersionRequest proto.InternalMessageInfo
func (m *DisableSecretVersionRequest) GetName() string {
if m != nil {
return m.Name
}
return ""
}
// Request message for [SecretManagerService.EnableSecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.EnableSecretVersion].
type EnableSecretVersionRequest struct {
// Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to enable in the format
// `projects/*/secrets/*/versions/*`.
Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *EnableSecretVersionRequest) Reset() { *m = EnableSecretVersionRequest{} }
func (m *EnableSecretVersionRequest) String() string { return proto.CompactTextString(m) }
func (*EnableSecretVersionRequest) ProtoMessage() {}
func (*EnableSecretVersionRequest) Descriptor() ([]byte, []int) {
return fileDescriptor_67a0e1a61a378c59, []int{13}
}
func (m *EnableSecretVersionRequest) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_EnableSecretVersionRequest.Unmarshal(m, b)
}
func (m *EnableSecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_EnableSecretVersionRequest.Marshal(b, m, deterministic)
}
func (m *EnableSecretVersionRequest) XXX_Merge(src proto.Message) {
xxx_messageInfo_EnableSecretVersionRequest.Merge(m, src)
}
func (m *EnableSecretVersionRequest) XXX_Size() int {
return xxx_messageInfo_EnableSecretVersionRequest.Size(m)
}
func (m *EnableSecretVersionRequest) XXX_DiscardUnknown() {
xxx_messageInfo_EnableSecretVersionRequest.DiscardUnknown(m)
}
var xxx_messageInfo_EnableSecretVersionRequest proto.InternalMessageInfo
func (m *EnableSecretVersionRequest) GetName() string {
if m != nil {
return m.Name
}
return ""
}
// Request message for [SecretManagerService.DestroySecretVersion][google.cloud.secrets.v1beta1.SecretManagerService.DestroySecretVersion].
type DestroySecretVersionRequest struct {
// Required. The resource name of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to destroy in the format
// `projects/*/secrets/*/versions/*`.
Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *DestroySecretVersionRequest) Reset() { *m = DestroySecretVersionRequest{} }
func (m *DestroySecretVersionRequest) String() string { return proto.CompactTextString(m) }
func (*DestroySecretVersionRequest) ProtoMessage() {}
func (*DestroySecretVersionRequest) Descriptor() ([]byte, []int) {
return fileDescriptor_67a0e1a61a378c59, []int{14}
}
func (m *DestroySecretVersionRequest) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_DestroySecretVersionRequest.Unmarshal(m, b)
}
func (m *DestroySecretVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_DestroySecretVersionRequest.Marshal(b, m, deterministic)
}
func (m *DestroySecretVersionRequest) XXX_Merge(src proto.Message) {
xxx_messageInfo_DestroySecretVersionRequest.Merge(m, src)
}
func (m *DestroySecretVersionRequest) XXX_Size() int {
return xxx_messageInfo_DestroySecretVersionRequest.Size(m)
}
func (m *DestroySecretVersionRequest) XXX_DiscardUnknown() {
xxx_messageInfo_DestroySecretVersionRequest.DiscardUnknown(m)
}
var xxx_messageInfo_DestroySecretVersionRequest proto.InternalMessageInfo
func (m *DestroySecretVersionRequest) GetName() string {
if m != nil {
return m.Name
}
return ""
}
func init() {
proto.RegisterType((*ListSecretsRequest)(nil), "google.cloud.secrets.v1beta1.ListSecretsRequest")
proto.RegisterType((*ListSecretsResponse)(nil), "google.cloud.secrets.v1beta1.ListSecretsResponse")
proto.RegisterType((*CreateSecretRequest)(nil), "google.cloud.secrets.v1beta1.CreateSecretRequest")
proto.RegisterType((*AddSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.AddSecretVersionRequest")
proto.RegisterType((*GetSecretRequest)(nil), "google.cloud.secrets.v1beta1.GetSecretRequest")
proto.RegisterType((*ListSecretVersionsRequest)(nil), "google.cloud.secrets.v1beta1.ListSecretVersionsRequest")
proto.RegisterType((*ListSecretVersionsResponse)(nil), "google.cloud.secrets.v1beta1.ListSecretVersionsResponse")
proto.RegisterType((*GetSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.GetSecretVersionRequest")
proto.RegisterType((*UpdateSecretRequest)(nil), "google.cloud.secrets.v1beta1.UpdateSecretRequest")
proto.RegisterType((*AccessSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.AccessSecretVersionRequest")
proto.RegisterType((*AccessSecretVersionResponse)(nil), "google.cloud.secrets.v1beta1.AccessSecretVersionResponse")
proto.RegisterType((*DeleteSecretRequest)(nil), "google.cloud.secrets.v1beta1.DeleteSecretRequest")
proto.RegisterType((*DisableSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.DisableSecretVersionRequest")
proto.RegisterType((*EnableSecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.EnableSecretVersionRequest")
proto.RegisterType((*DestroySecretVersionRequest)(nil), "google.cloud.secrets.v1beta1.DestroySecretVersionRequest")
}
func init() {
proto.RegisterFile("google/cloud/secrets/v1beta1/service.proto", fileDescriptor_67a0e1a61a378c59)
}
var fileDescriptor_67a0e1a61a378c59 = []byte{
// 1369 bytes of a gzipped FileDescriptorProto
0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xbc, 0x58, 0xcb, 0x6f, 0x1b, 0x45,
0x18, 0xd7, 0x38, 0xf4, 0x91, 0x89, 0x81, 0x6a, 0x5c, 0x9a, 0x74, 0x5b, 0x20, 0x5a, 0xda, 0x2a,
0x38, 0xe9, 0x2e, 0x4e, 0x95, 0xb6, 0x6c, 0x1f, 0x64, 0x93, 0xa6, 0xa6, 0x40, 0xc0, 0xb2, 0x4b,
0x0e, 0xa8, 0x52, 0x34, 0xf1, 0x4e, 0xdd, 0xa5, 0xf6, 0xee, 0xb2, 0x33, 0x76, 0x69, 0x51, 0x2f,
0xc0, 0x01, 0x09, 0x89, 0x0b, 0x12, 0x07, 0xc4, 0x89, 0x03, 0xa8, 0x15, 0x17, 0x2e, 0x20, 0xae,
0x48, 0x20, 0xd1, 0x1b, 0x70, 0xcb, 0xa9, 0x07, 0x4e, 0xfc, 0x05, 0x88, 0x13, 0xda, 0x79, 0xd8,
0xbb, 0x7e, 0xae, 0xdb, 0x84, 0x53, 0x9c, 0xef, 0x31, 0xdf, 0xef, 0x7b, 0x7f, 0x36, 0xcc, 0xd7,
0x7c, 0xbf, 0x56, 0x27, 0x66, 0xb5, 0xee, 0x37, 0x1d, 0x93, 0x92, 0x6a, 0x48, 0x18, 0x35, 0x5b,
0x85, 0x2d, 0xc2, 0x70, 0xc1, 0xa4, 0x24, 0x6c, 0xb9, 0x55, 0x62, 0x04, 0xa1, 0xcf, 0x7c, 0x74,
0x54, 0xc8, 0x1a, 0x5c, 0xd6, 0x90, 0xb2, 0x86, 0x94, 0xd5, 0x24, 0xd7, 0xc4, 0x81, 0x6b, 0x62,
0xcf, 0xf3, 0x19, 0x66, 0xae, 0xef, 0x51, 0xa1, 0xab, 0x4d, 0xc7, 0xb8, 0xd5, 0xba, 0x4b, 0x3c,
0x26, 0x19, 0xcf, 0xc7, 0x18, 0xd7, 0x5d, 0x52, 0x77, 0x36, 0xb7, 0xc8, 0x0d, 0xdc, 0x72, 0xfd,
0x50, 0x0a, 0x1c, 0x8e, 0x09, 0x84, 0x84, 0xfa, 0xcd, 0x50, 0x01, 0xd2, 0x16, 0x86, 0x82, 0x57,
0xc2, 0x0a, 0xc2, 0x73, 0x52, 0xda, 0xc5, 0x0d, 0xb3, 0x55, 0x88, 0xfe, 0x6c, 0x06, 0x7e, 0xdd,
0xad, 0xde, 0x96, 0x7c, 0x2d, 0xc9, 0x4f, 0xf0, 0x8e, 0x48, 0x1e, 0xff, 0x6f, 0xab, 0x79, 0xdd,
0x24, 0x8d, 0x80, 0x29, 0xe6, 0x6c, 0x37, 0x53, 0xf8, 0xd1, 0xc0, 0xf4, 0xa6, 0x90, 0xd0, 0xbf,
0x05, 0x10, 0xbd, 0xe1, 0x52, 0x56, 0x11, 0x10, 0xcb, 0xe4, 0xbd, 0x26, 0xa1, 0x0c, 0xbd, 0x0e,
0xf7, 0x06, 0x38, 0x24, 0x1e, 0x9b, 0x01, 0xb3, 0x60, 0x6e, 0x72, 0xe5, 0xd4, 0x43, 0x3b, 0xf3,
0xaf, 0x7d, 0x12, 0xce, 0x73, 0x87, 0x14, 0xfe, 0x06, 0xf6, 0x70, 0x8d, 0x84, 0x86, 0xb0, 0x82,
0x03, 0x97, 0x1a, 0x55, 0xbf, 0x61, 0x96, 0x42, 0xff, 0x5d, 0x52, 0x65, 0x65, 0xf9, 0x04, 0x9a,
0x85, 0x93, 0x01, 0xae, 0x91, 0x4d, 0xea, 0xde, 0x21, 0x33, 0x99, 0x59, 0x30, 0xb7, 0x67, 0x65,
0xe2, 0xa1, 0x0d, 0xca, 0xfb, 0x23, 0x6a, 0xc5, 0xbd, 0x43, 0x90, 0x0e, 0x21, 0x97, 0x60, 0xfe,
0x4d, 0xe2, 0xcd, 0x4c, 0x70, 0x93, 0x5c, 0x84, 0x2b, 0x5e, 0x8d, 0xa8, 0xfa, 0x57, 0x00, 0xe6,
0x12, 0x48, 0x69, 0xe0, 0x7b, 0x94, 0xa0, 0x8b, 0x70, 0x9f, 0x8c, 0xef, 0x0c, 0x98, 0x9d, 0x98,
0x9b, 0x5a, 0x3c, 0x66, 0x0c, 0xab, 0x06, 0x43, 0xe8, 0x97, 0x95, 0x12, 0x3a, 0x01, 0x9f, 0xf6,
0xc8, 0xfb, 0x6c, 0x33, 0x06, 0x20, 0xc2, 0x38, 0x59, 0x7e, 0x32, 0x22, 0x97, 0x94, 0x7d, 0xf4,
0x2c, 0x84, 0xcc, 0x67, 0xb8, 0x2e, 0xdc, 0x88, 0x30, 0xee, 0x29, 0x4f, 0x72, 0x4a, 0xe4, 0x82,
0xfe, 0x33, 0x80, 0xb9, 0xd5, 0x90, 0x60, 0x46, 0xa4, 0x81, 0x5d, 0x8a, 0xa4, 0x80, 0xbd, 0xe9,
0x3a, 0x02, 0x65, 0x14, 0xa6, 0x4c, 0x79, 0xbf, 0xa0, 0x5e, 0x71, 0xd0, 0x79, 0xb8, 0x57, 0x7c,
0xe6, 0x08, 0xd3, 0x06, 0x43, 0xea, 0xe8, 0xf7, 0x01, 0x9c, 0xb6, 0x1d, 0x47, 0x50, 0x37, 0x48,
0x48, 0x5d, 0xdf, 0x53, 0x8e, 0xac, 0x76, 0x39, 0x32, 0xcf, 0x1d, 0x39, 0x0e, 0x5f, 0x10, 0xba,
0x03, 0x3c, 0x50, 0x06, 0xa4, 0x03, 0xaf, 0xc1, 0x7d, 0x01, 0xbe, 0x5d, 0xf7, 0xb1, 0x80, 0x3f,
0xb5, 0x38, 0x9f, 0x06, 0x5f, 0x49, 0xa8, 0x08, 0x5f, 0xd5, 0x03, 0x7a, 0x05, 0x1e, 0x28, 0x12,
0x96, 0x8c, 0xf6, 0x2b, 0xf0, 0x09, 0x0f, 0x37, 0xc8, 0xa3, 0x40, 0xe4, 0x8a, 0xfa, 0x37, 0x00,
0x1e, 0xee, 0x54, 0x99, 0x0c, 0x01, 0xdd, 0xd1, 0x18, 0xec, 0x4c, 0x3b, 0x7c, 0x07, 0xa0, 0xd6,
0x0f, 0xa8, 0xec, 0x8a, 0x22, 0xdc, 0xdf, 0x92, 0x34, 0xd9, 0x16, 0xa9, 0x22, 0xad, 0x72, 0xde,
0x56, 0xde, 0xa9, 0xf6, 0xc0, 0x70, 0xba, 0x9d, 0xac, 0xae, 0xc2, 0xba, 0x9c, 0xc8, 0xd9, 0x22,
0x0f, 0xe9, 0x02, 0xcc, 0xa7, 0x08, 0xa9, 0x7a, 0x48, 0xa4, 0xee, 0x4b, 0x00, 0x73, 0x6f, 0x07,
0x4e, 0x4f, 0x07, 0xda, 0xed, 0x96, 0x00, 0xe9, 0x5b, 0x42, 0xd4, 0x9a, 0x54, 0x44, 0xcb, 0x70,
0xaa, 0xc9, 0x5f, 0xe6, 0xa3, 0x53, 0x96, 0xae, 0xa6, 0xde, 0x51, 0xd3, 0xd5, 0xb8, 0x1c, 0x4d,
0xd7, 0x75, 0x4c, 0x6f, 0x0a, 0x6d, 0x28, 0x74, 0x22, 0x82, 0xee, 0x40, 0xcd, 0xae, 0x56, 0x09,
0xa5, 0xbb, 0x1a, 0x82, 0x7b, 0x00, 0x1e, 0xe9, 0x6b, 0x46, 0x56, 0xc5, 0x6a, 0xc2, 0x8e, 0xf9,
0x48, 0x46, 0xd0, 0xda, 0xe3, 0xf4, 0x70, 0xa7, 0x7d, 0x37, 0x60, 0xee, 0x12, 0xa9, 0x93, 0xee,
0x6c, 0x3d, 0x76, 0x07, 0x13, 0x78, 0xe4, 0x92, 0x4b, 0xf1, 0x56, 0x9d, 0xec, 0x6a, 0xa8, 0x1d,
0xa8, 0xad, 0x79, 0xbb, 0x6e, 0x25, 0x72, 0x86, 0x50, 0x16, 0xfa, 0xb7, 0x77, 0xd3, 0xcc, 0xe2,
0x47, 0x87, 0xe0, 0x41, 0x41, 0x5f, 0x17, 0x4a, 0x15, 0x71, 0x5e, 0xa1, 0x7b, 0x00, 0x4e, 0xc5,
0x96, 0x2e, 0x7a, 0x69, 0x78, 0xaa, 0x7b, 0x2f, 0x09, 0xad, 0x30, 0x86, 0x86, 0xa8, 0x52, 0x7d,
0x69, 0xdb, 0x96, 0xb3, 0xf2, 0xc3, 0x3f, 0xff, 0xfa, 0x3c, 0x73, 0x02, 0x1d, 0x6b, 0x5f, 0x4e,
0x1f, 0x08, 0xfa, 0x85, 0x40, 0x2c, 0x46, 0x6a, 0xe6, 0xef, 0xaa, 0xeb, 0x0a, 0xfd, 0x08, 0x60,
0x36, 0xbe, 0x81, 0xd1, 0x08, 0xd3, 0x7d, 0xb6, 0xb5, 0x96, 0x6a, 0x36, 0xe8, 0x6f, 0x6e, 0xdb,
0xd3, 0x02, 0xc8, 0x42, 0x7b, 0x1d, 0xcb, 0x4f, 0x1c, 0xb1, 0xa1, 0xa7, 0x42, 0x6c, 0xa9, 0xf1,
0xf2, 0x0b, 0x80, 0x07, 0xba, 0xd7, 0x2e, 0x5a, 0x1a, 0x0e, 0x65, 0xc0, 0x9a, 0xd6, 0xc6, 0x19,
0xf3, 0xfa, 0xfa, 0xb6, 0xfd, 0x94, 0x74, 0x44, 0xb6, 0x25, 0xc7, 0x7f, 0x5a, 0x2f, 0x0c, 0xc1,
0xdf, 0x3e, 0x67, 0xf3, 0x77, 0x2d, 0xec, 0x38, 0xf2, 0x2d, 0x0b, 0xe4, 0xd1, 0x17, 0x00, 0x4e,
0xb6, 0xa7, 0x3c, 0x32, 0x86, 0x23, 0xe9, 0xde, 0xdd, 0x29, 0x63, 0x7f, 0x6a, 0xdb, 0xe6, 0x35,
0xdb, 0x5b, 0x1a, 0x11, 0xb5, 0x3f, 0x4c, 0xf4, 0x13, 0x80, 0xd9, 0xf8, 0x6a, 0x18, 0x55, 0x1a,
0x7d, 0xd6, 0x48, 0x4a, 0x78, 0xa5, 0x6d, 0x1b, 0x09, 0xd6, 0x42, 0x6c, 0x63, 0x70, 0xb0, 0x4b,
0x8b, 0xf3, 0x1d, 0xb0, 0x42, 0xc6, 0x18, 0x8c, 0xb9, 0x5d, 0x1c, 0x9f, 0x01, 0x98, 0x8d, 0x0f,
0xca, 0x51, 0xd8, 0xfb, 0x0c, 0x55, 0xed, 0x50, 0xcf, 0xaa, 0x5a, 0x8b, 0xbe, 0x25, 0x74, 0x05,
0x33, 0x9f, 0x2e, 0x98, 0xbf, 0x25, 0xbe, 0x32, 0xa8, 0xcb, 0x03, 0x9d, 0x49, 0xdb, 0xe8, 0x5d,
0x47, 0x95, 0x76, 0x76, 0x7c, 0x45, 0x39, 0x28, 0x96, 0x93, 0x83, 0xa2, 0x80, 0xcc, 0x74, 0x65,
0x6b, 0xb6, 0xaf, 0x9b, 0x1f, 0x40, 0xec, 0x88, 0x4c, 0xd9, 0x79, 0x03, 0xee, 0x98, 0xf1, 0x3a,
0xef, 0x62, 0x3c, 0xf2, 0x09, 0xe0, 0x03, 0x23, 0xdf, 0x46, 0x1d, 0x25, 0xe1, 0x77, 0x00, 0x73,
0x7d, 0x36, 0x3d, 0x1a, 0x11, 0xcc, 0xc1, 0x37, 0x88, 0xf6, 0xf2, 0x23, 0x68, 0xca, 0x3c, 0xac,
0xc5, 0x9d, 0x39, 0x8b, 0x4e, 0x8f, 0xe9, 0x8c, 0x85, 0xf9, 0xdb, 0x51, 0x61, 0x1d, 0xec, 0xb7,
0xba, 0xd1, 0x08, 0x68, 0x43, 0xd6, 0xfd, 0x78, 0x49, 0xb9, 0x12, 0xf7, 0xe3, 0xbc, 0x7e, 0x66,
0x5c, 0x3f, 0x1c, 0x01, 0x24, 0x1a, 0x85, 0xbf, 0x02, 0x98, 0xeb, 0x73, 0x1f, 0x8c, 0xca, 0xcf,
0xe0, 0x93, 0x62, 0x3c, 0x4f, 0x5e, 0x8d, 0x7b, 0x72, 0x4e, 0x1f, 0x3b, 0x23, 0xc4, 0x53, 0x8e,
0xf0, 0xa4, 0xf4, 0x39, 0x41, 0x46, 0x26, 0x65, 0xf0, 0xd9, 0xf2, 0x3f, 0x27, 0x45, 0x00, 0x89,
0x7c, 0xf9, 0x14, 0xc0, 0x6c, 0x85, 0xb0, 0x2b, 0xb8, 0x51, 0xe2, 0x3f, 0xa1, 0x20, 0x5d, 0x01,
0x71, 0x71, 0xc3, 0x68, 0x45, 0x96, 0x3b, 0x4c, 0x05, 0xf6, 0x99, 0x2e, 0x19, 0xc1, 0xd5, 0x97,
0x39, 0x1e, 0x4b, 0x5f, 0xea, 0xe0, 0x51, 0x5f, 0xe6, 0x07, 0x0c, 0x74, 0x1a, 0x7b, 0x3c, 0x42,
0xf3, 0x09, 0x80, 0xd9, 0xe2, 0x30, 0x34, 0xc5, 0xf4, 0x68, 0x2e, 0x70, 0x34, 0x67, 0x50, 0x7a,
0x34, 0xb5, 0xb8, 0xe5, 0xef, 0x01, 0x44, 0x57, 0x09, 0xe5, 0x14, 0x12, 0x36, 0x5c, 0x2a, 0xa6,
0xe3, 0x5c, 0x97, 0xb1, 0x5e, 0x11, 0x05, 0xeb, 0xc5, 0x14, 0x92, 0x72, 0x58, 0x5c, 0xe6, 0x50,
0x97, 0xf5, 0x73, 0xa9, 0xa1, 0xb2, 0x9e, 0xc7, 0x2c, 0x90, 0xd7, 0x4a, 0x0f, 0xec, 0xa3, 0xc3,
0x0e, 0xdd, 0x3f, 0x6c, 0xe3, 0x06, 0x63, 0x01, 0xb5, 0x4c, 0xf3, 0xd6, 0xad, 0x5b, 0xdd, 0x57,
0x30, 0x6e, 0xb2, 0x1b, 0xe2, 0xd7, 0xb9, 0x93, 0x41, 0x1d, 0xb3, 0xeb, 0x7e, 0xd8, 0x58, 0xf9,
0x38, 0x03, 0x4f, 0x54, 0xfd, 0x46, 0xbf, 0xe2, 0x54, 0x26, 0x24, 0xe4, 0x95, 0xac, 0x3c, 0x90,
0x4b, 0xd1, 0x3e, 0x2d, 0x81, 0x77, 0xde, 0x92, 0x3a, 0x35, 0xbf, 0x8e, 0xbd, 0x9a, 0xe1, 0x87,
0x35, 0xb3, 0x46, 0x3c, 0xbe, 0x6d, 0xcd, 0x8e, 0xe5, 0xc4, 0xcf, 0x81, 0xf2, 0x49, 0x15, 0x85,
0x73, 0x09, 0xea, 0x3f, 0x00, 0x7c, 0x9d, 0x99, 0x28, 0x56, 0xd6, 0xef, 0x67, 0xf4, 0xa2, 0x78,
0x7a, 0x95, 0xc3, 0x49, 0x5c, 0xe9, 0xc6, 0x46, 0x61, 0x25, 0xd2, 0x7d, 0xa0, 0x84, 0xae, 0x71,
0xa1, 0x6b, 0x09, 0xa1, 0x6b, 0x1b, 0xc2, 0xc0, 0xdf, 0x99, 0xe3, 0x42, 0xc8, 0xb2, 0xb8, 0x94,
0x65, 0x25, 0xc4, 0x2c, 0x4b, 0xca, 0x6d, 0xed, 0xe5, 0xb0, 0x4f, 0xfd, 0x17, 0x00, 0x00, 0xff,
0xff, 0xdd, 0x02, 0x7b, 0x01, 0x81, 0x15, 0x00, 0x00,
}
// Reference imports to suppress errors if they are not otherwise used.
var _ context.Context
var _ grpc.ClientConnInterface
// This is a compile-time assertion to ensure that this generated file
// is compatible with the grpc package it is being compiled against.
const _ = grpc.SupportPackageIsVersion6
// SecretManagerServiceClient is the client API for SecretManagerService service.
//
// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream.
type SecretManagerServiceClient interface {
// Lists [Secrets][google.cloud.secrets.v1beta1.Secret].
ListSecrets(ctx context.Context, in *ListSecretsRequest, opts ...grpc.CallOption) (*ListSecretsResponse, error)
// Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
CreateSecret(ctx context.Context, in *CreateSecretRequest, opts ...grpc.CallOption) (*Secret, error)
// Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret data and attaches
// it to an existing [Secret][google.cloud.secrets.v1beta1.Secret].
AddSecretVersion(ctx context.Context, in *AddSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error)
// Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret].
GetSecret(ctx context.Context, in *GetSecretRequest, opts ...grpc.CallOption) (*Secret, error)
// Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret].
UpdateSecret(ctx context.Context, in *UpdateSecretRequest, opts ...grpc.CallOption) (*Secret, error)
// Deletes a [Secret][google.cloud.secrets.v1beta1.Secret].
DeleteSecret(ctx context.Context, in *DeleteSecretRequest, opts ...grpc.CallOption) (*empty.Empty, error)
// Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return secret
// data.
ListSecretVersions(ctx context.Context, in *ListSecretVersionsRequest, opts ...grpc.CallOption) (*ListSecretVersionsResponse, error)
// Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
//
// `projects/*/secrets/*/versions/latest` is an alias to the `latest`
// [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
GetSecretVersion(ctx context.Context, in *GetSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error)
// Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the secret data.
//
// `projects/*/secrets/*/versions/latest` is an alias to the `latest`
// [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
AccessSecretVersion(ctx context.Context, in *AccessSecretVersionRequest, opts ...grpc.CallOption) (*AccessSecretVersionResponse, error)
// Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
//
// Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
// [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED].
DisableSecretVersion(ctx context.Context, in *DisableSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error)
// Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
//
// Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
// [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED].
EnableSecretVersion(ctx context.Context, in *EnableSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error)
// Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
//
// Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
// [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably destroys the
// secret data.
DestroySecretVersion(ctx context.Context, in *DestroySecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error)
// Sets the access control policy on the specified secret. Replaces any
// existing policy.
//
// Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced according
// to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret].
SetIamPolicy(ctx context.Context, in *v1.SetIamPolicyRequest, opts ...grpc.CallOption) (*v1.Policy, error)
// Gets the access control policy for a secret.
// Returns empty policy if the secret exists and does not have a policy set.
GetIamPolicy(ctx context.Context, in *v1.GetIamPolicyRequest, opts ...grpc.CallOption) (*v1.Policy, error)
// Returns permissions that a caller has for the specified secret.
// If the secret does not exist, this call returns an empty set of
// permissions, not a NOT_FOUND error.
//
// Note: This operation is designed to be used for building permission-aware
// UIs and command-line tools, not for authorization checking. This operation
// may "fail open" without warning.
TestIamPermissions(ctx context.Context, in *v1.TestIamPermissionsRequest, opts ...grpc.CallOption) (*v1.TestIamPermissionsResponse, error)
}
type secretManagerServiceClient struct {
cc grpc.ClientConnInterface
}
func NewSecretManagerServiceClient(cc grpc.ClientConnInterface) SecretManagerServiceClient {
return &secretManagerServiceClient{cc}
}
func (c *secretManagerServiceClient) ListSecrets(ctx context.Context, in *ListSecretsRequest, opts ...grpc.CallOption) (*ListSecretsResponse, error) {
out := new(ListSecretsResponse)
err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/ListSecrets", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *secretManagerServiceClient) CreateSecret(ctx context.Context, in *CreateSecretRequest, opts ...grpc.CallOption) (*Secret, error) {
out := new(Secret)
err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/CreateSecret", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *secretManagerServiceClient) AddSecretVersion(ctx context.Context, in *AddSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) {
out := new(SecretVersion)
err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/AddSecretVersion", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *secretManagerServiceClient) GetSecret(ctx context.Context, in *GetSecretRequest, opts ...grpc.CallOption) (*Secret, error) {
out := new(Secret)
err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/GetSecret", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *secretManagerServiceClient) UpdateSecret(ctx context.Context, in *UpdateSecretRequest, opts ...grpc.CallOption) (*Secret, error) {
out := new(Secret)
err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/UpdateSecret", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *secretManagerServiceClient) DeleteSecret(ctx context.Context, in *DeleteSecretRequest, opts ...grpc.CallOption) (*empty.Empty, error) {
out := new(empty.Empty)
err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/DeleteSecret", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *secretManagerServiceClient) ListSecretVersions(ctx context.Context, in *ListSecretVersionsRequest, opts ...grpc.CallOption) (*ListSecretVersionsResponse, error) {
out := new(ListSecretVersionsResponse)
err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/ListSecretVersions", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *secretManagerServiceClient) GetSecretVersion(ctx context.Context, in *GetSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) {
out := new(SecretVersion)
err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/GetSecretVersion", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *secretManagerServiceClient) AccessSecretVersion(ctx context.Context, in *AccessSecretVersionRequest, opts ...grpc.CallOption) (*AccessSecretVersionResponse, error) {
out := new(AccessSecretVersionResponse)
err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/AccessSecretVersion", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *secretManagerServiceClient) DisableSecretVersion(ctx context.Context, in *DisableSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) {
out := new(SecretVersion)
err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/DisableSecretVersion", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *secretManagerServiceClient) EnableSecretVersion(ctx context.Context, in *EnableSecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) {
out := new(SecretVersion)
err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/EnableSecretVersion", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *secretManagerServiceClient) DestroySecretVersion(ctx context.Context, in *DestroySecretVersionRequest, opts ...grpc.CallOption) (*SecretVersion, error) {
out := new(SecretVersion)
err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/DestroySecretVersion", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *secretManagerServiceClient) SetIamPolicy(ctx context.Context, in *v1.SetIamPolicyRequest, opts ...grpc.CallOption) (*v1.Policy, error) {
out := new(v1.Policy)
err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/SetIamPolicy", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *secretManagerServiceClient) GetIamPolicy(ctx context.Context, in *v1.GetIamPolicyRequest, opts ...grpc.CallOption) (*v1.Policy, error) {
out := new(v1.Policy)
err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/GetIamPolicy", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
func (c *secretManagerServiceClient) TestIamPermissions(ctx context.Context, in *v1.TestIamPermissionsRequest, opts ...grpc.CallOption) (*v1.TestIamPermissionsResponse, error) {
out := new(v1.TestIamPermissionsResponse)
err := c.cc.Invoke(ctx, "/google.cloud.secrets.v1beta1.SecretManagerService/TestIamPermissions", in, out, opts...)
if err != nil {
return nil, err
}
return out, nil
}
// SecretManagerServiceServer is the server API for SecretManagerService service.
type SecretManagerServiceServer interface {
// Lists [Secrets][google.cloud.secrets.v1beta1.Secret].
ListSecrets(context.Context, *ListSecretsRequest) (*ListSecretsResponse, error)
// Creates a new [Secret][google.cloud.secrets.v1beta1.Secret] containing no [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion].
CreateSecret(context.Context, *CreateSecretRequest) (*Secret, error)
// Creates a new [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] containing secret data and attaches
// it to an existing [Secret][google.cloud.secrets.v1beta1.Secret].
AddSecretVersion(context.Context, *AddSecretVersionRequest) (*SecretVersion, error)
// Gets metadata for a given [Secret][google.cloud.secrets.v1beta1.Secret].
GetSecret(context.Context, *GetSecretRequest) (*Secret, error)
// Updates metadata of an existing [Secret][google.cloud.secrets.v1beta1.Secret].
UpdateSecret(context.Context, *UpdateSecretRequest) (*Secret, error)
// Deletes a [Secret][google.cloud.secrets.v1beta1.Secret].
DeleteSecret(context.Context, *DeleteSecretRequest) (*empty.Empty, error)
// Lists [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion]. This call does not return secret
// data.
ListSecretVersions(context.Context, *ListSecretVersionsRequest) (*ListSecretVersionsResponse, error)
// Gets metadata for a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
//
// `projects/*/secrets/*/versions/latest` is an alias to the `latest`
// [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
GetSecretVersion(context.Context, *GetSecretVersionRequest) (*SecretVersion, error)
// Accesses a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion]. This call returns the secret data.
//
// `projects/*/secrets/*/versions/latest` is an alias to the `latest`
// [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
AccessSecretVersion(context.Context, *AccessSecretVersionRequest) (*AccessSecretVersionResponse, error)
// Disables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
//
// Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
// [DISABLED][google.cloud.secrets.v1beta1.SecretVersion.State.DISABLED].
DisableSecretVersion(context.Context, *DisableSecretVersionRequest) (*SecretVersion, error)
// Enables a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
//
// Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
// [ENABLED][google.cloud.secrets.v1beta1.SecretVersion.State.ENABLED].
EnableSecretVersion(context.Context, *EnableSecretVersionRequest) (*SecretVersion, error)
// Destroys a [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion].
//
// Sets the [state][google.cloud.secrets.v1beta1.SecretVersion.state] of the [SecretVersion][google.cloud.secrets.v1beta1.SecretVersion] to
// [DESTROYED][google.cloud.secrets.v1beta1.SecretVersion.State.DESTROYED] and irrevocably destroys the
// secret data.
DestroySecretVersion(context.Context, *DestroySecretVersionRequest) (*SecretVersion, error)
// Sets the access control policy on the specified secret. Replaces any
// existing policy.
//
// Permissions on [SecretVersions][google.cloud.secrets.v1beta1.SecretVersion] are enforced according
// to the policy set on the associated [Secret][google.cloud.secrets.v1beta1.Secret].
SetIamPolicy(context.Context, *v1.SetIamPolicyRequest) (*v1.Policy, error)
// Gets the access control policy for a secret.
// Returns empty policy if the secret exists and does not have a policy set.
GetIamPolicy(context.Context, *v1.GetIamPolicyRequest) (*v1.Policy, error)
// Returns permissions that a caller has for the specified secret.
// If the secret does not exist, this call returns an empty set of
// permissions, not a NOT_FOUND error.
//
// Note: This operation is designed to be used for building permission-aware
// UIs and command-line tools, not for authorization checking. This operation
// may "fail open" without warning.
TestIamPermissions(context.Context, *v1.TestIamPermissionsRequest) (*v1.TestIamPermissionsResponse, error)
}
// UnimplementedSecretManagerServiceServer can be embedded to have forward compatible implementations.
type UnimplementedSecretManagerServiceServer struct {
}
func (*UnimplementedSecretManagerServiceServer) ListSecrets(ctx context.Context, req *ListSecretsRequest) (*ListSecretsResponse, error) {
return nil, status.Errorf(codes.Unimplemented, "method ListSecrets not implemented")
}
func (*UnimplementedSecretManagerServiceServer) CreateSecret(ctx context.Context, req *CreateSecretRequest) (*Secret, error) {
return nil, status.Errorf(codes.Unimplemented, "method CreateSecret not implemented")
}
func (*UnimplementedSecretManagerServiceServer) AddSecretVersion(ctx context.Context, req *AddSecretVersionRequest) (*SecretVersion, error) {
return nil, status.Errorf(codes.Unimplemented, "method AddSecretVersion not implemented")
}
func (*UnimplementedSecretManagerServiceServer) GetSecret(ctx context.Context, req *GetSecretRequest) (*Secret, error) {
return nil, status.Errorf(codes.Unimplemented, "method GetSecret not implemented")
}
func (*UnimplementedSecretManagerServiceServer) UpdateSecret(ctx context.Context, req *UpdateSecretRequest) (*Secret, error) {
return nil, status.Errorf(codes.Unimplemented, "method UpdateSecret not implemented")
}
func (*UnimplementedSecretManagerServiceServer) DeleteSecret(ctx context.Context, req *DeleteSecretRequest) (*empty.Empty, error) {
return nil, status.Errorf(codes.Unimplemented, "method DeleteSecret not implemented")
}
func (*UnimplementedSecretManagerServiceServer) ListSecretVersions(ctx context.Context, req *ListSecretVersionsRequest) (*ListSecretVersionsResponse, error) {
return nil, status.Errorf(codes.Unimplemented, "method ListSecretVersions not implemented")
}
func (*UnimplementedSecretManagerServiceServer) GetSecretVersion(ctx context.Context, req *GetSecretVersionRequest) (*SecretVersion, error) {
return nil, status.Errorf(codes.Unimplemented, "method GetSecretVersion not implemented")
}
func (*UnimplementedSecretManagerServiceServer) AccessSecretVersion(ctx context.Context, req *AccessSecretVersionRequest) (*AccessSecretVersionResponse, error) {
return nil, status.Errorf(codes.Unimplemented, "method AccessSecretVersion not implemented")
}
func (*UnimplementedSecretManagerServiceServer) DisableSecretVersion(ctx context.Context, req *DisableSecretVersionRequest) (*SecretVersion, error) {
return nil, status.Errorf(codes.Unimplemented, "method DisableSecretVersion not implemented")
}
func (*UnimplementedSecretManagerServiceServer) EnableSecretVersion(ctx context.Context, req *EnableSecretVersionRequest) (*SecretVersion, error) {
return nil, status.Errorf(codes.Unimplemented, "method EnableSecretVersion not implemented")
}
func (*UnimplementedSecretManagerServiceServer) DestroySecretVersion(ctx context.Context, req *DestroySecretVersionRequest) (*SecretVersion, error) {
return nil, status.Errorf(codes.Unimplemented, "method DestroySecretVersion not implemented")
}
func (*UnimplementedSecretManagerServiceServer) SetIamPolicy(ctx context.Context, req *v1.SetIamPolicyRequest) (*v1.Policy, error) {
return nil, status.Errorf(codes.Unimplemented, "method SetIamPolicy not implemented")
}
func (*UnimplementedSecretManagerServiceServer) GetIamPolicy(ctx context.Context, req *v1.GetIamPolicyRequest) (*v1.Policy, error) {
return nil, status.Errorf(codes.Unimplemented, "method GetIamPolicy not implemented")
}
func (*UnimplementedSecretManagerServiceServer) TestIamPermissions(ctx context.Context, req *v1.TestIamPermissionsRequest) (*v1.TestIamPermissionsResponse, error) {
return nil, status.Errorf(codes.Unimplemented, "method TestIamPermissions not implemented")
}
func RegisterSecretManagerServiceServer(s *grpc.Server, srv SecretManagerServiceServer) {
s.RegisterService(&_SecretManagerService_serviceDesc, srv)
}
func _SecretManagerService_ListSecrets_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(ListSecretsRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(SecretManagerServiceServer).ListSecrets(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/ListSecrets",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(SecretManagerServiceServer).ListSecrets(ctx, req.(*ListSecretsRequest))
}
return interceptor(ctx, in, info, handler)
}
func _SecretManagerService_CreateSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(CreateSecretRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(SecretManagerServiceServer).CreateSecret(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/CreateSecret",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(SecretManagerServiceServer).CreateSecret(ctx, req.(*CreateSecretRequest))
}
return interceptor(ctx, in, info, handler)
}
func _SecretManagerService_AddSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(AddSecretVersionRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(SecretManagerServiceServer).AddSecretVersion(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/AddSecretVersion",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(SecretManagerServiceServer).AddSecretVersion(ctx, req.(*AddSecretVersionRequest))
}
return interceptor(ctx, in, info, handler)
}
func _SecretManagerService_GetSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(GetSecretRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(SecretManagerServiceServer).GetSecret(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/GetSecret",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(SecretManagerServiceServer).GetSecret(ctx, req.(*GetSecretRequest))
}
return interceptor(ctx, in, info, handler)
}
func _SecretManagerService_UpdateSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(UpdateSecretRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(SecretManagerServiceServer).UpdateSecret(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/UpdateSecret",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(SecretManagerServiceServer).UpdateSecret(ctx, req.(*UpdateSecretRequest))
}
return interceptor(ctx, in, info, handler)
}
func _SecretManagerService_DeleteSecret_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(DeleteSecretRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(SecretManagerServiceServer).DeleteSecret(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/DeleteSecret",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(SecretManagerServiceServer).DeleteSecret(ctx, req.(*DeleteSecretRequest))
}
return interceptor(ctx, in, info, handler)
}
func _SecretManagerService_ListSecretVersions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(ListSecretVersionsRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(SecretManagerServiceServer).ListSecretVersions(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/ListSecretVersions",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(SecretManagerServiceServer).ListSecretVersions(ctx, req.(*ListSecretVersionsRequest))
}
return interceptor(ctx, in, info, handler)
}
func _SecretManagerService_GetSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(GetSecretVersionRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(SecretManagerServiceServer).GetSecretVersion(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/GetSecretVersion",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(SecretManagerServiceServer).GetSecretVersion(ctx, req.(*GetSecretVersionRequest))
}
return interceptor(ctx, in, info, handler)
}
func _SecretManagerService_AccessSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(AccessSecretVersionRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(SecretManagerServiceServer).AccessSecretVersion(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/AccessSecretVersion",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(SecretManagerServiceServer).AccessSecretVersion(ctx, req.(*AccessSecretVersionRequest))
}
return interceptor(ctx, in, info, handler)
}
func _SecretManagerService_DisableSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(DisableSecretVersionRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(SecretManagerServiceServer).DisableSecretVersion(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/DisableSecretVersion",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(SecretManagerServiceServer).DisableSecretVersion(ctx, req.(*DisableSecretVersionRequest))
}
return interceptor(ctx, in, info, handler)
}
func _SecretManagerService_EnableSecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(EnableSecretVersionRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(SecretManagerServiceServer).EnableSecretVersion(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/EnableSecretVersion",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(SecretManagerServiceServer).EnableSecretVersion(ctx, req.(*EnableSecretVersionRequest))
}
return interceptor(ctx, in, info, handler)
}
func _SecretManagerService_DestroySecretVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(DestroySecretVersionRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(SecretManagerServiceServer).DestroySecretVersion(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/DestroySecretVersion",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(SecretManagerServiceServer).DestroySecretVersion(ctx, req.(*DestroySecretVersionRequest))
}
return interceptor(ctx, in, info, handler)
}
func _SecretManagerService_SetIamPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(v1.SetIamPolicyRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(SecretManagerServiceServer).SetIamPolicy(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/SetIamPolicy",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(SecretManagerServiceServer).SetIamPolicy(ctx, req.(*v1.SetIamPolicyRequest))
}
return interceptor(ctx, in, info, handler)
}
func _SecretManagerService_GetIamPolicy_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(v1.GetIamPolicyRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(SecretManagerServiceServer).GetIamPolicy(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/GetIamPolicy",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(SecretManagerServiceServer).GetIamPolicy(ctx, req.(*v1.GetIamPolicyRequest))
}
return interceptor(ctx, in, info, handler)
}
func _SecretManagerService_TestIamPermissions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
in := new(v1.TestIamPermissionsRequest)
if err := dec(in); err != nil {
return nil, err
}
if interceptor == nil {
return srv.(SecretManagerServiceServer).TestIamPermissions(ctx, in)
}
info := &grpc.UnaryServerInfo{
Server: srv,
FullMethod: "/google.cloud.secrets.v1beta1.SecretManagerService/TestIamPermissions",
}
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
return srv.(SecretManagerServiceServer).TestIamPermissions(ctx, req.(*v1.TestIamPermissionsRequest))
}
return interceptor(ctx, in, info, handler)
}
var _SecretManagerService_serviceDesc = grpc.ServiceDesc{
ServiceName: "google.cloud.secrets.v1beta1.SecretManagerService",
HandlerType: (*SecretManagerServiceServer)(nil),
Methods: []grpc.MethodDesc{
{
MethodName: "ListSecrets",
Handler: _SecretManagerService_ListSecrets_Handler,
},
{
MethodName: "CreateSecret",
Handler: _SecretManagerService_CreateSecret_Handler,
},
{
MethodName: "AddSecretVersion",
Handler: _SecretManagerService_AddSecretVersion_Handler,
},
{
MethodName: "GetSecret",
Handler: _SecretManagerService_GetSecret_Handler,
},
{
MethodName: "UpdateSecret",
Handler: _SecretManagerService_UpdateSecret_Handler,
},
{
MethodName: "DeleteSecret",
Handler: _SecretManagerService_DeleteSecret_Handler,
},
{
MethodName: "ListSecretVersions",
Handler: _SecretManagerService_ListSecretVersions_Handler,
},
{
MethodName: "GetSecretVersion",
Handler: _SecretManagerService_GetSecretVersion_Handler,
},
{
MethodName: "AccessSecretVersion",
Handler: _SecretManagerService_AccessSecretVersion_Handler,
},
{
MethodName: "DisableSecretVersion",
Handler: _SecretManagerService_DisableSecretVersion_Handler,
},
{
MethodName: "EnableSecretVersion",
Handler: _SecretManagerService_EnableSecretVersion_Handler,
},
{
MethodName: "DestroySecretVersion",
Handler: _SecretManagerService_DestroySecretVersion_Handler,
},
{
MethodName: "SetIamPolicy",
Handler: _SecretManagerService_SetIamPolicy_Handler,
},
{
MethodName: "GetIamPolicy",
Handler: _SecretManagerService_GetIamPolicy_Handler,
},
{
MethodName: "TestIamPermissions",
Handler: _SecretManagerService_TestIamPermissions_Handler,
},
},
Streams: []grpc.StreamDesc{},
Metadata: "google/cloud/secrets/v1beta1/service.proto",
}