google-cloud-secret_manager-v1 0.1.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/.yardopts +12 -0
- data/AUTHENTICATION.md +169 -0
- data/LICENSE.md +201 -0
- data/README.md +24 -0
- data/lib/google-cloud-secret_manager-v1.rb +1 -0
- data/lib/google/cloud/common_resources_pb.rb +15 -0
- data/lib/google/cloud/secret_manager/v1.rb +19 -0
- data/lib/google/cloud/secret_manager/v1/secret_manager_service.rb +20 -0
- data/lib/google/cloud/secret_manager/v1/secret_manager_service/client.rb +1442 -0
- data/lib/google/cloud/secret_manager/v1/secret_manager_service/credentials.rb +52 -0
- data/lib/google/cloud/secret_manager/v1/secret_manager_service/paths.rb +81 -0
- data/lib/google/cloud/secret_manager/v1/version.rb +28 -0
- data/lib/google/cloud/secretmanager/v1/resources_pb.rb +65 -0
- data/lib/google/cloud/secretmanager/v1/service_pb.rb +100 -0
- data/lib/google/cloud/secretmanager/v1/service_services_pb.rb +112 -0
- data/proto_docs/README.md +4 -0
- data/proto_docs/google/api/field_behavior.rb +59 -0
- data/proto_docs/google/api/resource.rb +247 -0
- data/proto_docs/google/cloud/secretmanager/v1/resources.rb +162 -0
- data/proto_docs/google/cloud/secretmanager/v1/service.rb +224 -0
- data/proto_docs/google/iam/v1/iam_policy.rb +79 -0
- data/proto_docs/google/iam/v1/policy.rb +156 -0
- data/proto_docs/google/protobuf/empty.rb +36 -0
- data/proto_docs/google/protobuf/field_mask.rb +237 -0
- data/proto_docs/google/protobuf/timestamp.rb +116 -0
- metadata +194 -0
@@ -0,0 +1,52 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2020 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
require "googleauth"
|
20
|
+
|
21
|
+
|
22
|
+
module Google
|
23
|
+
module Cloud
|
24
|
+
module SecretManager
|
25
|
+
module V1
|
26
|
+
module SecretManagerService
|
27
|
+
# Credentials for the SecretManagerService API.
|
28
|
+
class Credentials < Google::Auth::Credentials
|
29
|
+
self.scope = [
|
30
|
+
"https://www.googleapis.com/auth/cloud-platform"
|
31
|
+
]
|
32
|
+
self.env_vars = [
|
33
|
+
"SECRET_MANAGER_CREDENTIALS",
|
34
|
+
"SECRET_MANAGER_KEYFILE",
|
35
|
+
"GOOGLE_CLOUD_CREDENTIALS",
|
36
|
+
"GOOGLE_CLOUD_KEYFILE",
|
37
|
+
"GCLOUD_KEYFILE",
|
38
|
+
"SECRET_MANAGER_CREDENTIALS_JSON",
|
39
|
+
"SECRET_MANAGER_KEYFILE_JSON",
|
40
|
+
"GOOGLE_CLOUD_CREDENTIALS_JSON",
|
41
|
+
"GOOGLE_CLOUD_KEYFILE_JSON",
|
42
|
+
"GCLOUD_KEYFILE_JSON"
|
43
|
+
]
|
44
|
+
self.paths = [
|
45
|
+
"~/.config/google_cloud/application_default_credentials.json"
|
46
|
+
]
|
47
|
+
end
|
48
|
+
end
|
49
|
+
end
|
50
|
+
end
|
51
|
+
end
|
52
|
+
end
|
@@ -0,0 +1,81 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2020 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
|
20
|
+
module Google
|
21
|
+
module Cloud
|
22
|
+
module SecretManager
|
23
|
+
module V1
|
24
|
+
module SecretManagerService
|
25
|
+
# Path helper methods for the SecretManagerService API.
|
26
|
+
module Paths
|
27
|
+
##
|
28
|
+
# Create a fully-qualified Project resource string.
|
29
|
+
#
|
30
|
+
# The resource will be in the following format:
|
31
|
+
#
|
32
|
+
# `projects/{project}`
|
33
|
+
#
|
34
|
+
# @param project [String]
|
35
|
+
#
|
36
|
+
# @return [String]
|
37
|
+
def project_path project:
|
38
|
+
"projects/#{project}"
|
39
|
+
end
|
40
|
+
|
41
|
+
##
|
42
|
+
# Create a fully-qualified Secret resource string.
|
43
|
+
#
|
44
|
+
# The resource will be in the following format:
|
45
|
+
#
|
46
|
+
# `projects/{project}/secrets/{secret}`
|
47
|
+
#
|
48
|
+
# @param project [String]
|
49
|
+
# @param secret [String]
|
50
|
+
#
|
51
|
+
# @return [String]
|
52
|
+
def secret_path project:, secret:
|
53
|
+
raise ArgumentError, "project cannot contain /" if project.to_s.include? "/"
|
54
|
+
|
55
|
+
"projects/#{project}/secrets/#{secret}"
|
56
|
+
end
|
57
|
+
|
58
|
+
##
|
59
|
+
# Create a fully-qualified SecretVersion resource string.
|
60
|
+
#
|
61
|
+
# The resource will be in the following format:
|
62
|
+
#
|
63
|
+
# `projects/{project}/secrets/{secret}/versions/{secret_version}`
|
64
|
+
#
|
65
|
+
# @param project [String]
|
66
|
+
# @param secret [String]
|
67
|
+
# @param secret_version [String]
|
68
|
+
#
|
69
|
+
# @return [String]
|
70
|
+
def secret_version_path project:, secret:, secret_version:
|
71
|
+
raise ArgumentError, "project cannot contain /" if project.to_s.include? "/"
|
72
|
+
raise ArgumentError, "secret cannot contain /" if secret.to_s.include? "/"
|
73
|
+
|
74
|
+
"projects/#{project}/secrets/#{secret}/versions/#{secret_version}"
|
75
|
+
end
|
76
|
+
end
|
77
|
+
end
|
78
|
+
end
|
79
|
+
end
|
80
|
+
end
|
81
|
+
end
|
@@ -0,0 +1,28 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2020 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
|
20
|
+
module Google
|
21
|
+
module Cloud
|
22
|
+
module SecretManager
|
23
|
+
module V1
|
24
|
+
VERSION = "0.1.0"
|
25
|
+
end
|
26
|
+
end
|
27
|
+
end
|
28
|
+
end
|
@@ -0,0 +1,65 @@
|
|
1
|
+
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
|
+
# source: google/cloud/secretmanager/v1/resources.proto
|
3
|
+
|
4
|
+
require 'google/protobuf'
|
5
|
+
|
6
|
+
require 'google/api/field_behavior_pb'
|
7
|
+
require 'google/api/resource_pb'
|
8
|
+
require 'google/protobuf/timestamp_pb'
|
9
|
+
require 'google/api/annotations_pb'
|
10
|
+
Google::Protobuf::DescriptorPool.generated_pool.build do
|
11
|
+
add_file("google/cloud/secretmanager/v1/resources.proto", :syntax => :proto3) do
|
12
|
+
add_message "google.cloud.secretmanager.v1.Secret" do
|
13
|
+
optional :name, :string, 1
|
14
|
+
optional :replication, :message, 2, "google.cloud.secretmanager.v1.Replication"
|
15
|
+
optional :create_time, :message, 3, "google.protobuf.Timestamp"
|
16
|
+
map :labels, :string, :string, 4
|
17
|
+
end
|
18
|
+
add_message "google.cloud.secretmanager.v1.SecretVersion" do
|
19
|
+
optional :name, :string, 1
|
20
|
+
optional :create_time, :message, 2, "google.protobuf.Timestamp"
|
21
|
+
optional :destroy_time, :message, 3, "google.protobuf.Timestamp"
|
22
|
+
optional :state, :enum, 4, "google.cloud.secretmanager.v1.SecretVersion.State"
|
23
|
+
end
|
24
|
+
add_enum "google.cloud.secretmanager.v1.SecretVersion.State" do
|
25
|
+
value :STATE_UNSPECIFIED, 0
|
26
|
+
value :ENABLED, 1
|
27
|
+
value :DISABLED, 2
|
28
|
+
value :DESTROYED, 3
|
29
|
+
end
|
30
|
+
add_message "google.cloud.secretmanager.v1.Replication" do
|
31
|
+
oneof :replication do
|
32
|
+
optional :automatic, :message, 1, "google.cloud.secretmanager.v1.Replication.Automatic"
|
33
|
+
optional :user_managed, :message, 2, "google.cloud.secretmanager.v1.Replication.UserManaged"
|
34
|
+
end
|
35
|
+
end
|
36
|
+
add_message "google.cloud.secretmanager.v1.Replication.Automatic" do
|
37
|
+
end
|
38
|
+
add_message "google.cloud.secretmanager.v1.Replication.UserManaged" do
|
39
|
+
repeated :replicas, :message, 1, "google.cloud.secretmanager.v1.Replication.UserManaged.Replica"
|
40
|
+
end
|
41
|
+
add_message "google.cloud.secretmanager.v1.Replication.UserManaged.Replica" do
|
42
|
+
optional :location, :string, 1
|
43
|
+
end
|
44
|
+
add_message "google.cloud.secretmanager.v1.SecretPayload" do
|
45
|
+
optional :data, :bytes, 1
|
46
|
+
end
|
47
|
+
end
|
48
|
+
end
|
49
|
+
|
50
|
+
module Google
|
51
|
+
module Cloud
|
52
|
+
module SecretManager
|
53
|
+
module V1
|
54
|
+
Secret = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Secret").msgclass
|
55
|
+
SecretVersion = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.SecretVersion").msgclass
|
56
|
+
SecretVersion::State = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.SecretVersion.State").enummodule
|
57
|
+
Replication = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication").msgclass
|
58
|
+
Replication::Automatic = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication.Automatic").msgclass
|
59
|
+
Replication::UserManaged = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication.UserManaged").msgclass
|
60
|
+
Replication::UserManaged::Replica = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication.UserManaged.Replica").msgclass
|
61
|
+
SecretPayload = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.SecretPayload").msgclass
|
62
|
+
end
|
63
|
+
end
|
64
|
+
end
|
65
|
+
end
|
@@ -0,0 +1,100 @@
|
|
1
|
+
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
|
+
# source: google/cloud/secretmanager/v1/service.proto
|
3
|
+
|
4
|
+
require 'google/protobuf'
|
5
|
+
|
6
|
+
require 'google/api/annotations_pb'
|
7
|
+
require 'google/api/client_pb'
|
8
|
+
require 'google/api/field_behavior_pb'
|
9
|
+
require 'google/api/resource_pb'
|
10
|
+
require 'google/cloud/secretmanager/v1/resources_pb'
|
11
|
+
require 'google/iam/v1/iam_policy_pb'
|
12
|
+
require 'google/iam/v1/policy_pb'
|
13
|
+
require 'google/protobuf/empty_pb'
|
14
|
+
require 'google/protobuf/field_mask_pb'
|
15
|
+
Google::Protobuf::DescriptorPool.generated_pool.build do
|
16
|
+
add_file("google/cloud/secretmanager/v1/service.proto", :syntax => :proto3) do
|
17
|
+
add_message "google.cloud.secretmanager.v1.ListSecretsRequest" do
|
18
|
+
optional :parent, :string, 1
|
19
|
+
optional :page_size, :int32, 2
|
20
|
+
optional :page_token, :string, 3
|
21
|
+
end
|
22
|
+
add_message "google.cloud.secretmanager.v1.ListSecretsResponse" do
|
23
|
+
repeated :secrets, :message, 1, "google.cloud.secretmanager.v1.Secret"
|
24
|
+
optional :next_page_token, :string, 2
|
25
|
+
optional :total_size, :int32, 3
|
26
|
+
end
|
27
|
+
add_message "google.cloud.secretmanager.v1.CreateSecretRequest" do
|
28
|
+
optional :parent, :string, 1
|
29
|
+
optional :secret_id, :string, 2
|
30
|
+
optional :secret, :message, 3, "google.cloud.secretmanager.v1.Secret"
|
31
|
+
end
|
32
|
+
add_message "google.cloud.secretmanager.v1.AddSecretVersionRequest" do
|
33
|
+
optional :parent, :string, 1
|
34
|
+
optional :payload, :message, 2, "google.cloud.secretmanager.v1.SecretPayload"
|
35
|
+
end
|
36
|
+
add_message "google.cloud.secretmanager.v1.GetSecretRequest" do
|
37
|
+
optional :name, :string, 1
|
38
|
+
end
|
39
|
+
add_message "google.cloud.secretmanager.v1.ListSecretVersionsRequest" do
|
40
|
+
optional :parent, :string, 1
|
41
|
+
optional :page_size, :int32, 2
|
42
|
+
optional :page_token, :string, 3
|
43
|
+
end
|
44
|
+
add_message "google.cloud.secretmanager.v1.ListSecretVersionsResponse" do
|
45
|
+
repeated :versions, :message, 1, "google.cloud.secretmanager.v1.SecretVersion"
|
46
|
+
optional :next_page_token, :string, 2
|
47
|
+
optional :total_size, :int32, 3
|
48
|
+
end
|
49
|
+
add_message "google.cloud.secretmanager.v1.GetSecretVersionRequest" do
|
50
|
+
optional :name, :string, 1
|
51
|
+
end
|
52
|
+
add_message "google.cloud.secretmanager.v1.UpdateSecretRequest" do
|
53
|
+
optional :secret, :message, 1, "google.cloud.secretmanager.v1.Secret"
|
54
|
+
optional :update_mask, :message, 2, "google.protobuf.FieldMask"
|
55
|
+
end
|
56
|
+
add_message "google.cloud.secretmanager.v1.AccessSecretVersionRequest" do
|
57
|
+
optional :name, :string, 1
|
58
|
+
end
|
59
|
+
add_message "google.cloud.secretmanager.v1.AccessSecretVersionResponse" do
|
60
|
+
optional :name, :string, 1
|
61
|
+
optional :payload, :message, 2, "google.cloud.secretmanager.v1.SecretPayload"
|
62
|
+
end
|
63
|
+
add_message "google.cloud.secretmanager.v1.DeleteSecretRequest" do
|
64
|
+
optional :name, :string, 1
|
65
|
+
end
|
66
|
+
add_message "google.cloud.secretmanager.v1.DisableSecretVersionRequest" do
|
67
|
+
optional :name, :string, 1
|
68
|
+
end
|
69
|
+
add_message "google.cloud.secretmanager.v1.EnableSecretVersionRequest" do
|
70
|
+
optional :name, :string, 1
|
71
|
+
end
|
72
|
+
add_message "google.cloud.secretmanager.v1.DestroySecretVersionRequest" do
|
73
|
+
optional :name, :string, 1
|
74
|
+
end
|
75
|
+
end
|
76
|
+
end
|
77
|
+
|
78
|
+
module Google
|
79
|
+
module Cloud
|
80
|
+
module SecretManager
|
81
|
+
module V1
|
82
|
+
ListSecretsRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ListSecretsRequest").msgclass
|
83
|
+
ListSecretsResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ListSecretsResponse").msgclass
|
84
|
+
CreateSecretRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.CreateSecretRequest").msgclass
|
85
|
+
AddSecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.AddSecretVersionRequest").msgclass
|
86
|
+
GetSecretRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.GetSecretRequest").msgclass
|
87
|
+
ListSecretVersionsRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ListSecretVersionsRequest").msgclass
|
88
|
+
ListSecretVersionsResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ListSecretVersionsResponse").msgclass
|
89
|
+
GetSecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.GetSecretVersionRequest").msgclass
|
90
|
+
UpdateSecretRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.UpdateSecretRequest").msgclass
|
91
|
+
AccessSecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.AccessSecretVersionRequest").msgclass
|
92
|
+
AccessSecretVersionResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.AccessSecretVersionResponse").msgclass
|
93
|
+
DeleteSecretRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.DeleteSecretRequest").msgclass
|
94
|
+
DisableSecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.DisableSecretVersionRequest").msgclass
|
95
|
+
EnableSecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.EnableSecretVersionRequest").msgclass
|
96
|
+
DestroySecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.DestroySecretVersionRequest").msgclass
|
97
|
+
end
|
98
|
+
end
|
99
|
+
end
|
100
|
+
end
|
@@ -0,0 +1,112 @@
|
|
1
|
+
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
|
+
# Source: google/cloud/secretmanager/v1/service.proto for package 'Google.Cloud.SecretManager.V1'
|
3
|
+
# Original file comments:
|
4
|
+
# Copyright 2019 Google LLC.
|
5
|
+
#
|
6
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
7
|
+
# you may not use this file except in compliance with the License.
|
8
|
+
# You may obtain a copy of the License at
|
9
|
+
#
|
10
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
11
|
+
#
|
12
|
+
# Unless required by applicable law or agreed to in writing, software
|
13
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
14
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
15
|
+
# See the License for the specific language governing permissions and
|
16
|
+
# limitations under the License.
|
17
|
+
#
|
18
|
+
#
|
19
|
+
|
20
|
+
require 'grpc'
|
21
|
+
require 'google/cloud/secretmanager/v1/service_pb'
|
22
|
+
|
23
|
+
module Google
|
24
|
+
module Cloud
|
25
|
+
module SecretManager
|
26
|
+
module V1
|
27
|
+
module SecretManagerService
|
28
|
+
# `projects/*/secrets/*/versions/latest` is an alias to the `latest`
|
29
|
+
# [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
30
|
+
#
|
31
|
+
# Secret Manager Service
|
32
|
+
#
|
33
|
+
# Manages secrets and operations using those secrets. Implements a REST
|
34
|
+
# model with the following objects:
|
35
|
+
#
|
36
|
+
# * [Secret][google.cloud.secretmanager.v1.Secret]
|
37
|
+
# * [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
|
38
|
+
class Service
|
39
|
+
|
40
|
+
include GRPC::GenericService
|
41
|
+
|
42
|
+
self.marshal_class_method = :encode
|
43
|
+
self.unmarshal_class_method = :decode
|
44
|
+
self.service_name = 'google.cloud.secretmanager.v1.SecretManagerService'
|
45
|
+
|
46
|
+
# Lists [Secrets][google.cloud.secretmanager.v1.Secret].
|
47
|
+
rpc :ListSecrets, Google::Cloud::SecretManager::V1::ListSecretsRequest, Google::Cloud::SecretManager::V1::ListSecretsResponse
|
48
|
+
# Creates a new [Secret][google.cloud.secretmanager.v1.Secret] containing no [SecretVersions][google.cloud.secretmanager.v1.SecretVersion].
|
49
|
+
rpc :CreateSecret, Google::Cloud::SecretManager::V1::CreateSecretRequest, Google::Cloud::SecretManager::V1::Secret
|
50
|
+
# Creates a new [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] containing secret data and attaches
|
51
|
+
# it to an existing [Secret][google.cloud.secretmanager.v1.Secret].
|
52
|
+
rpc :AddSecretVersion, Google::Cloud::SecretManager::V1::AddSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
|
53
|
+
# Gets metadata for a given [Secret][google.cloud.secretmanager.v1.Secret].
|
54
|
+
rpc :GetSecret, Google::Cloud::SecretManager::V1::GetSecretRequest, Google::Cloud::SecretManager::V1::Secret
|
55
|
+
# Updates metadata of an existing [Secret][google.cloud.secretmanager.v1.Secret].
|
56
|
+
rpc :UpdateSecret, Google::Cloud::SecretManager::V1::UpdateSecretRequest, Google::Cloud::SecretManager::V1::Secret
|
57
|
+
# Deletes a [Secret][google.cloud.secretmanager.v1.Secret].
|
58
|
+
rpc :DeleteSecret, Google::Cloud::SecretManager::V1::DeleteSecretRequest, Google::Protobuf::Empty
|
59
|
+
# Lists [SecretVersions][google.cloud.secretmanager.v1.SecretVersion]. This call does not return secret
|
60
|
+
# data.
|
61
|
+
rpc :ListSecretVersions, Google::Cloud::SecretManager::V1::ListSecretVersionsRequest, Google::Cloud::SecretManager::V1::ListSecretVersionsResponse
|
62
|
+
# Gets metadata for a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
63
|
+
#
|
64
|
+
# `projects/*/secrets/*/versions/latest` is an alias to the `latest`
|
65
|
+
# [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
66
|
+
rpc :GetSecretVersion, Google::Cloud::SecretManager::V1::GetSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
|
67
|
+
# Accesses a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. This call returns the secret data.
|
68
|
+
#
|
69
|
+
# `projects/*/secrets/*/versions/latest` is an alias to the `latest`
|
70
|
+
# [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
71
|
+
rpc :AccessSecretVersion, Google::Cloud::SecretManager::V1::AccessSecretVersionRequest, Google::Cloud::SecretManager::V1::AccessSecretVersionResponse
|
72
|
+
# Disables a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
73
|
+
#
|
74
|
+
# Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
|
75
|
+
# [DISABLED][google.cloud.secretmanager.v1.SecretVersion.State.DISABLED].
|
76
|
+
rpc :DisableSecretVersion, Google::Cloud::SecretManager::V1::DisableSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
|
77
|
+
# Enables a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
78
|
+
#
|
79
|
+
# Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
|
80
|
+
# [ENABLED][google.cloud.secretmanager.v1.SecretVersion.State.ENABLED].
|
81
|
+
rpc :EnableSecretVersion, Google::Cloud::SecretManager::V1::EnableSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
|
82
|
+
# Destroys a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
83
|
+
#
|
84
|
+
# Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
|
85
|
+
# [DESTROYED][google.cloud.secretmanager.v1.SecretVersion.State.DESTROYED] and irrevocably destroys the
|
86
|
+
# secret data.
|
87
|
+
rpc :DestroySecretVersion, Google::Cloud::SecretManager::V1::DestroySecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
|
88
|
+
# Sets the access control policy on the specified secret. Replaces any
|
89
|
+
# existing policy.
|
90
|
+
#
|
91
|
+
# Permissions on [SecretVersions][google.cloud.secretmanager.v1.SecretVersion] are enforced according
|
92
|
+
# to the policy set on the associated [Secret][google.cloud.secretmanager.v1.Secret].
|
93
|
+
rpc :SetIamPolicy, Google::Iam::V1::SetIamPolicyRequest, Google::Iam::V1::Policy
|
94
|
+
# Gets the access control policy for a secret.
|
95
|
+
# Returns empty policy if the secret exists and does not have a policy set.
|
96
|
+
rpc :GetIamPolicy, Google::Iam::V1::GetIamPolicyRequest, Google::Iam::V1::Policy
|
97
|
+
# Returns permissions that a caller has for the specified secret.
|
98
|
+
# If the secret does not exist, this call returns an empty set of
|
99
|
+
# permissions, not a NOT_FOUND error.
|
100
|
+
#
|
101
|
+
# Note: This operation is designed to be used for building permission-aware
|
102
|
+
# UIs and command-line tools, not for authorization checking. This operation
|
103
|
+
# may "fail open" without warning.
|
104
|
+
rpc :TestIamPermissions, Google::Iam::V1::TestIamPermissionsRequest, Google::Iam::V1::TestIamPermissionsResponse
|
105
|
+
end
|
106
|
+
|
107
|
+
Stub = Service.rpc_stub_class
|
108
|
+
end
|
109
|
+
end
|
110
|
+
end
|
111
|
+
end
|
112
|
+
end
|