google-cloud-secret_manager-v1 0.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/.yardopts +12 -0
- data/AUTHENTICATION.md +169 -0
- data/LICENSE.md +201 -0
- data/README.md +24 -0
- data/lib/google-cloud-secret_manager-v1.rb +1 -0
- data/lib/google/cloud/common_resources_pb.rb +15 -0
- data/lib/google/cloud/secret_manager/v1.rb +19 -0
- data/lib/google/cloud/secret_manager/v1/secret_manager_service.rb +20 -0
- data/lib/google/cloud/secret_manager/v1/secret_manager_service/client.rb +1442 -0
- data/lib/google/cloud/secret_manager/v1/secret_manager_service/credentials.rb +52 -0
- data/lib/google/cloud/secret_manager/v1/secret_manager_service/paths.rb +81 -0
- data/lib/google/cloud/secret_manager/v1/version.rb +28 -0
- data/lib/google/cloud/secretmanager/v1/resources_pb.rb +65 -0
- data/lib/google/cloud/secretmanager/v1/service_pb.rb +100 -0
- data/lib/google/cloud/secretmanager/v1/service_services_pb.rb +112 -0
- data/proto_docs/README.md +4 -0
- data/proto_docs/google/api/field_behavior.rb +59 -0
- data/proto_docs/google/api/resource.rb +247 -0
- data/proto_docs/google/cloud/secretmanager/v1/resources.rb +162 -0
- data/proto_docs/google/cloud/secretmanager/v1/service.rb +224 -0
- data/proto_docs/google/iam/v1/iam_policy.rb +79 -0
- data/proto_docs/google/iam/v1/policy.rb +156 -0
- data/proto_docs/google/protobuf/empty.rb +36 -0
- data/proto_docs/google/protobuf/field_mask.rb +237 -0
- data/proto_docs/google/protobuf/timestamp.rb +116 -0
- metadata +194 -0
@@ -0,0 +1,52 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2020 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
require "googleauth"
|
20
|
+
|
21
|
+
|
22
|
+
module Google
|
23
|
+
module Cloud
|
24
|
+
module SecretManager
|
25
|
+
module V1
|
26
|
+
module SecretManagerService
|
27
|
+
# Credentials for the SecretManagerService API.
|
28
|
+
class Credentials < Google::Auth::Credentials
|
29
|
+
self.scope = [
|
30
|
+
"https://www.googleapis.com/auth/cloud-platform"
|
31
|
+
]
|
32
|
+
self.env_vars = [
|
33
|
+
"SECRET_MANAGER_CREDENTIALS",
|
34
|
+
"SECRET_MANAGER_KEYFILE",
|
35
|
+
"GOOGLE_CLOUD_CREDENTIALS",
|
36
|
+
"GOOGLE_CLOUD_KEYFILE",
|
37
|
+
"GCLOUD_KEYFILE",
|
38
|
+
"SECRET_MANAGER_CREDENTIALS_JSON",
|
39
|
+
"SECRET_MANAGER_KEYFILE_JSON",
|
40
|
+
"GOOGLE_CLOUD_CREDENTIALS_JSON",
|
41
|
+
"GOOGLE_CLOUD_KEYFILE_JSON",
|
42
|
+
"GCLOUD_KEYFILE_JSON"
|
43
|
+
]
|
44
|
+
self.paths = [
|
45
|
+
"~/.config/google_cloud/application_default_credentials.json"
|
46
|
+
]
|
47
|
+
end
|
48
|
+
end
|
49
|
+
end
|
50
|
+
end
|
51
|
+
end
|
52
|
+
end
|
@@ -0,0 +1,81 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2020 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
|
20
|
+
module Google
|
21
|
+
module Cloud
|
22
|
+
module SecretManager
|
23
|
+
module V1
|
24
|
+
module SecretManagerService
|
25
|
+
# Path helper methods for the SecretManagerService API.
|
26
|
+
module Paths
|
27
|
+
##
|
28
|
+
# Create a fully-qualified Project resource string.
|
29
|
+
#
|
30
|
+
# The resource will be in the following format:
|
31
|
+
#
|
32
|
+
# `projects/{project}`
|
33
|
+
#
|
34
|
+
# @param project [String]
|
35
|
+
#
|
36
|
+
# @return [String]
|
37
|
+
def project_path project:
|
38
|
+
"projects/#{project}"
|
39
|
+
end
|
40
|
+
|
41
|
+
##
|
42
|
+
# Create a fully-qualified Secret resource string.
|
43
|
+
#
|
44
|
+
# The resource will be in the following format:
|
45
|
+
#
|
46
|
+
# `projects/{project}/secrets/{secret}`
|
47
|
+
#
|
48
|
+
# @param project [String]
|
49
|
+
# @param secret [String]
|
50
|
+
#
|
51
|
+
# @return [String]
|
52
|
+
def secret_path project:, secret:
|
53
|
+
raise ArgumentError, "project cannot contain /" if project.to_s.include? "/"
|
54
|
+
|
55
|
+
"projects/#{project}/secrets/#{secret}"
|
56
|
+
end
|
57
|
+
|
58
|
+
##
|
59
|
+
# Create a fully-qualified SecretVersion resource string.
|
60
|
+
#
|
61
|
+
# The resource will be in the following format:
|
62
|
+
#
|
63
|
+
# `projects/{project}/secrets/{secret}/versions/{secret_version}`
|
64
|
+
#
|
65
|
+
# @param project [String]
|
66
|
+
# @param secret [String]
|
67
|
+
# @param secret_version [String]
|
68
|
+
#
|
69
|
+
# @return [String]
|
70
|
+
def secret_version_path project:, secret:, secret_version:
|
71
|
+
raise ArgumentError, "project cannot contain /" if project.to_s.include? "/"
|
72
|
+
raise ArgumentError, "secret cannot contain /" if secret.to_s.include? "/"
|
73
|
+
|
74
|
+
"projects/#{project}/secrets/#{secret}/versions/#{secret_version}"
|
75
|
+
end
|
76
|
+
end
|
77
|
+
end
|
78
|
+
end
|
79
|
+
end
|
80
|
+
end
|
81
|
+
end
|
@@ -0,0 +1,28 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2020 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
|
20
|
+
module Google
|
21
|
+
module Cloud
|
22
|
+
module SecretManager
|
23
|
+
module V1
|
24
|
+
VERSION = "0.1.0"
|
25
|
+
end
|
26
|
+
end
|
27
|
+
end
|
28
|
+
end
|
@@ -0,0 +1,65 @@
|
|
1
|
+
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
|
+
# source: google/cloud/secretmanager/v1/resources.proto
|
3
|
+
|
4
|
+
require 'google/protobuf'
|
5
|
+
|
6
|
+
require 'google/api/field_behavior_pb'
|
7
|
+
require 'google/api/resource_pb'
|
8
|
+
require 'google/protobuf/timestamp_pb'
|
9
|
+
require 'google/api/annotations_pb'
|
10
|
+
Google::Protobuf::DescriptorPool.generated_pool.build do
|
11
|
+
add_file("google/cloud/secretmanager/v1/resources.proto", :syntax => :proto3) do
|
12
|
+
add_message "google.cloud.secretmanager.v1.Secret" do
|
13
|
+
optional :name, :string, 1
|
14
|
+
optional :replication, :message, 2, "google.cloud.secretmanager.v1.Replication"
|
15
|
+
optional :create_time, :message, 3, "google.protobuf.Timestamp"
|
16
|
+
map :labels, :string, :string, 4
|
17
|
+
end
|
18
|
+
add_message "google.cloud.secretmanager.v1.SecretVersion" do
|
19
|
+
optional :name, :string, 1
|
20
|
+
optional :create_time, :message, 2, "google.protobuf.Timestamp"
|
21
|
+
optional :destroy_time, :message, 3, "google.protobuf.Timestamp"
|
22
|
+
optional :state, :enum, 4, "google.cloud.secretmanager.v1.SecretVersion.State"
|
23
|
+
end
|
24
|
+
add_enum "google.cloud.secretmanager.v1.SecretVersion.State" do
|
25
|
+
value :STATE_UNSPECIFIED, 0
|
26
|
+
value :ENABLED, 1
|
27
|
+
value :DISABLED, 2
|
28
|
+
value :DESTROYED, 3
|
29
|
+
end
|
30
|
+
add_message "google.cloud.secretmanager.v1.Replication" do
|
31
|
+
oneof :replication do
|
32
|
+
optional :automatic, :message, 1, "google.cloud.secretmanager.v1.Replication.Automatic"
|
33
|
+
optional :user_managed, :message, 2, "google.cloud.secretmanager.v1.Replication.UserManaged"
|
34
|
+
end
|
35
|
+
end
|
36
|
+
add_message "google.cloud.secretmanager.v1.Replication.Automatic" do
|
37
|
+
end
|
38
|
+
add_message "google.cloud.secretmanager.v1.Replication.UserManaged" do
|
39
|
+
repeated :replicas, :message, 1, "google.cloud.secretmanager.v1.Replication.UserManaged.Replica"
|
40
|
+
end
|
41
|
+
add_message "google.cloud.secretmanager.v1.Replication.UserManaged.Replica" do
|
42
|
+
optional :location, :string, 1
|
43
|
+
end
|
44
|
+
add_message "google.cloud.secretmanager.v1.SecretPayload" do
|
45
|
+
optional :data, :bytes, 1
|
46
|
+
end
|
47
|
+
end
|
48
|
+
end
|
49
|
+
|
50
|
+
module Google
|
51
|
+
module Cloud
|
52
|
+
module SecretManager
|
53
|
+
module V1
|
54
|
+
Secret = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Secret").msgclass
|
55
|
+
SecretVersion = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.SecretVersion").msgclass
|
56
|
+
SecretVersion::State = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.SecretVersion.State").enummodule
|
57
|
+
Replication = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication").msgclass
|
58
|
+
Replication::Automatic = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication.Automatic").msgclass
|
59
|
+
Replication::UserManaged = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication.UserManaged").msgclass
|
60
|
+
Replication::UserManaged::Replica = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication.UserManaged.Replica").msgclass
|
61
|
+
SecretPayload = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.SecretPayload").msgclass
|
62
|
+
end
|
63
|
+
end
|
64
|
+
end
|
65
|
+
end
|
@@ -0,0 +1,100 @@
|
|
1
|
+
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
|
+
# source: google/cloud/secretmanager/v1/service.proto
|
3
|
+
|
4
|
+
require 'google/protobuf'
|
5
|
+
|
6
|
+
require 'google/api/annotations_pb'
|
7
|
+
require 'google/api/client_pb'
|
8
|
+
require 'google/api/field_behavior_pb'
|
9
|
+
require 'google/api/resource_pb'
|
10
|
+
require 'google/cloud/secretmanager/v1/resources_pb'
|
11
|
+
require 'google/iam/v1/iam_policy_pb'
|
12
|
+
require 'google/iam/v1/policy_pb'
|
13
|
+
require 'google/protobuf/empty_pb'
|
14
|
+
require 'google/protobuf/field_mask_pb'
|
15
|
+
Google::Protobuf::DescriptorPool.generated_pool.build do
|
16
|
+
add_file("google/cloud/secretmanager/v1/service.proto", :syntax => :proto3) do
|
17
|
+
add_message "google.cloud.secretmanager.v1.ListSecretsRequest" do
|
18
|
+
optional :parent, :string, 1
|
19
|
+
optional :page_size, :int32, 2
|
20
|
+
optional :page_token, :string, 3
|
21
|
+
end
|
22
|
+
add_message "google.cloud.secretmanager.v1.ListSecretsResponse" do
|
23
|
+
repeated :secrets, :message, 1, "google.cloud.secretmanager.v1.Secret"
|
24
|
+
optional :next_page_token, :string, 2
|
25
|
+
optional :total_size, :int32, 3
|
26
|
+
end
|
27
|
+
add_message "google.cloud.secretmanager.v1.CreateSecretRequest" do
|
28
|
+
optional :parent, :string, 1
|
29
|
+
optional :secret_id, :string, 2
|
30
|
+
optional :secret, :message, 3, "google.cloud.secretmanager.v1.Secret"
|
31
|
+
end
|
32
|
+
add_message "google.cloud.secretmanager.v1.AddSecretVersionRequest" do
|
33
|
+
optional :parent, :string, 1
|
34
|
+
optional :payload, :message, 2, "google.cloud.secretmanager.v1.SecretPayload"
|
35
|
+
end
|
36
|
+
add_message "google.cloud.secretmanager.v1.GetSecretRequest" do
|
37
|
+
optional :name, :string, 1
|
38
|
+
end
|
39
|
+
add_message "google.cloud.secretmanager.v1.ListSecretVersionsRequest" do
|
40
|
+
optional :parent, :string, 1
|
41
|
+
optional :page_size, :int32, 2
|
42
|
+
optional :page_token, :string, 3
|
43
|
+
end
|
44
|
+
add_message "google.cloud.secretmanager.v1.ListSecretVersionsResponse" do
|
45
|
+
repeated :versions, :message, 1, "google.cloud.secretmanager.v1.SecretVersion"
|
46
|
+
optional :next_page_token, :string, 2
|
47
|
+
optional :total_size, :int32, 3
|
48
|
+
end
|
49
|
+
add_message "google.cloud.secretmanager.v1.GetSecretVersionRequest" do
|
50
|
+
optional :name, :string, 1
|
51
|
+
end
|
52
|
+
add_message "google.cloud.secretmanager.v1.UpdateSecretRequest" do
|
53
|
+
optional :secret, :message, 1, "google.cloud.secretmanager.v1.Secret"
|
54
|
+
optional :update_mask, :message, 2, "google.protobuf.FieldMask"
|
55
|
+
end
|
56
|
+
add_message "google.cloud.secretmanager.v1.AccessSecretVersionRequest" do
|
57
|
+
optional :name, :string, 1
|
58
|
+
end
|
59
|
+
add_message "google.cloud.secretmanager.v1.AccessSecretVersionResponse" do
|
60
|
+
optional :name, :string, 1
|
61
|
+
optional :payload, :message, 2, "google.cloud.secretmanager.v1.SecretPayload"
|
62
|
+
end
|
63
|
+
add_message "google.cloud.secretmanager.v1.DeleteSecretRequest" do
|
64
|
+
optional :name, :string, 1
|
65
|
+
end
|
66
|
+
add_message "google.cloud.secretmanager.v1.DisableSecretVersionRequest" do
|
67
|
+
optional :name, :string, 1
|
68
|
+
end
|
69
|
+
add_message "google.cloud.secretmanager.v1.EnableSecretVersionRequest" do
|
70
|
+
optional :name, :string, 1
|
71
|
+
end
|
72
|
+
add_message "google.cloud.secretmanager.v1.DestroySecretVersionRequest" do
|
73
|
+
optional :name, :string, 1
|
74
|
+
end
|
75
|
+
end
|
76
|
+
end
|
77
|
+
|
78
|
+
module Google
|
79
|
+
module Cloud
|
80
|
+
module SecretManager
|
81
|
+
module V1
|
82
|
+
ListSecretsRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ListSecretsRequest").msgclass
|
83
|
+
ListSecretsResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ListSecretsResponse").msgclass
|
84
|
+
CreateSecretRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.CreateSecretRequest").msgclass
|
85
|
+
AddSecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.AddSecretVersionRequest").msgclass
|
86
|
+
GetSecretRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.GetSecretRequest").msgclass
|
87
|
+
ListSecretVersionsRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ListSecretVersionsRequest").msgclass
|
88
|
+
ListSecretVersionsResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ListSecretVersionsResponse").msgclass
|
89
|
+
GetSecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.GetSecretVersionRequest").msgclass
|
90
|
+
UpdateSecretRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.UpdateSecretRequest").msgclass
|
91
|
+
AccessSecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.AccessSecretVersionRequest").msgclass
|
92
|
+
AccessSecretVersionResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.AccessSecretVersionResponse").msgclass
|
93
|
+
DeleteSecretRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.DeleteSecretRequest").msgclass
|
94
|
+
DisableSecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.DisableSecretVersionRequest").msgclass
|
95
|
+
EnableSecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.EnableSecretVersionRequest").msgclass
|
96
|
+
DestroySecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.DestroySecretVersionRequest").msgclass
|
97
|
+
end
|
98
|
+
end
|
99
|
+
end
|
100
|
+
end
|
@@ -0,0 +1,112 @@
|
|
1
|
+
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
|
+
# Source: google/cloud/secretmanager/v1/service.proto for package 'Google.Cloud.SecretManager.V1'
|
3
|
+
# Original file comments:
|
4
|
+
# Copyright 2019 Google LLC.
|
5
|
+
#
|
6
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
7
|
+
# you may not use this file except in compliance with the License.
|
8
|
+
# You may obtain a copy of the License at
|
9
|
+
#
|
10
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
11
|
+
#
|
12
|
+
# Unless required by applicable law or agreed to in writing, software
|
13
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
14
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
15
|
+
# See the License for the specific language governing permissions and
|
16
|
+
# limitations under the License.
|
17
|
+
#
|
18
|
+
#
|
19
|
+
|
20
|
+
require 'grpc'
|
21
|
+
require 'google/cloud/secretmanager/v1/service_pb'
|
22
|
+
|
23
|
+
module Google
|
24
|
+
module Cloud
|
25
|
+
module SecretManager
|
26
|
+
module V1
|
27
|
+
module SecretManagerService
|
28
|
+
# `projects/*/secrets/*/versions/latest` is an alias to the `latest`
|
29
|
+
# [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
30
|
+
#
|
31
|
+
# Secret Manager Service
|
32
|
+
#
|
33
|
+
# Manages secrets and operations using those secrets. Implements a REST
|
34
|
+
# model with the following objects:
|
35
|
+
#
|
36
|
+
# * [Secret][google.cloud.secretmanager.v1.Secret]
|
37
|
+
# * [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
|
38
|
+
class Service
|
39
|
+
|
40
|
+
include GRPC::GenericService
|
41
|
+
|
42
|
+
self.marshal_class_method = :encode
|
43
|
+
self.unmarshal_class_method = :decode
|
44
|
+
self.service_name = 'google.cloud.secretmanager.v1.SecretManagerService'
|
45
|
+
|
46
|
+
# Lists [Secrets][google.cloud.secretmanager.v1.Secret].
|
47
|
+
rpc :ListSecrets, Google::Cloud::SecretManager::V1::ListSecretsRequest, Google::Cloud::SecretManager::V1::ListSecretsResponse
|
48
|
+
# Creates a new [Secret][google.cloud.secretmanager.v1.Secret] containing no [SecretVersions][google.cloud.secretmanager.v1.SecretVersion].
|
49
|
+
rpc :CreateSecret, Google::Cloud::SecretManager::V1::CreateSecretRequest, Google::Cloud::SecretManager::V1::Secret
|
50
|
+
# Creates a new [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] containing secret data and attaches
|
51
|
+
# it to an existing [Secret][google.cloud.secretmanager.v1.Secret].
|
52
|
+
rpc :AddSecretVersion, Google::Cloud::SecretManager::V1::AddSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
|
53
|
+
# Gets metadata for a given [Secret][google.cloud.secretmanager.v1.Secret].
|
54
|
+
rpc :GetSecret, Google::Cloud::SecretManager::V1::GetSecretRequest, Google::Cloud::SecretManager::V1::Secret
|
55
|
+
# Updates metadata of an existing [Secret][google.cloud.secretmanager.v1.Secret].
|
56
|
+
rpc :UpdateSecret, Google::Cloud::SecretManager::V1::UpdateSecretRequest, Google::Cloud::SecretManager::V1::Secret
|
57
|
+
# Deletes a [Secret][google.cloud.secretmanager.v1.Secret].
|
58
|
+
rpc :DeleteSecret, Google::Cloud::SecretManager::V1::DeleteSecretRequest, Google::Protobuf::Empty
|
59
|
+
# Lists [SecretVersions][google.cloud.secretmanager.v1.SecretVersion]. This call does not return secret
|
60
|
+
# data.
|
61
|
+
rpc :ListSecretVersions, Google::Cloud::SecretManager::V1::ListSecretVersionsRequest, Google::Cloud::SecretManager::V1::ListSecretVersionsResponse
|
62
|
+
# Gets metadata for a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
63
|
+
#
|
64
|
+
# `projects/*/secrets/*/versions/latest` is an alias to the `latest`
|
65
|
+
# [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
66
|
+
rpc :GetSecretVersion, Google::Cloud::SecretManager::V1::GetSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
|
67
|
+
# Accesses a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. This call returns the secret data.
|
68
|
+
#
|
69
|
+
# `projects/*/secrets/*/versions/latest` is an alias to the `latest`
|
70
|
+
# [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
71
|
+
rpc :AccessSecretVersion, Google::Cloud::SecretManager::V1::AccessSecretVersionRequest, Google::Cloud::SecretManager::V1::AccessSecretVersionResponse
|
72
|
+
# Disables a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
73
|
+
#
|
74
|
+
# Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
|
75
|
+
# [DISABLED][google.cloud.secretmanager.v1.SecretVersion.State.DISABLED].
|
76
|
+
rpc :DisableSecretVersion, Google::Cloud::SecretManager::V1::DisableSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
|
77
|
+
# Enables a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
78
|
+
#
|
79
|
+
# Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
|
80
|
+
# [ENABLED][google.cloud.secretmanager.v1.SecretVersion.State.ENABLED].
|
81
|
+
rpc :EnableSecretVersion, Google::Cloud::SecretManager::V1::EnableSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
|
82
|
+
# Destroys a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
83
|
+
#
|
84
|
+
# Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
|
85
|
+
# [DESTROYED][google.cloud.secretmanager.v1.SecretVersion.State.DESTROYED] and irrevocably destroys the
|
86
|
+
# secret data.
|
87
|
+
rpc :DestroySecretVersion, Google::Cloud::SecretManager::V1::DestroySecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
|
88
|
+
# Sets the access control policy on the specified secret. Replaces any
|
89
|
+
# existing policy.
|
90
|
+
#
|
91
|
+
# Permissions on [SecretVersions][google.cloud.secretmanager.v1.SecretVersion] are enforced according
|
92
|
+
# to the policy set on the associated [Secret][google.cloud.secretmanager.v1.Secret].
|
93
|
+
rpc :SetIamPolicy, Google::Iam::V1::SetIamPolicyRequest, Google::Iam::V1::Policy
|
94
|
+
# Gets the access control policy for a secret.
|
95
|
+
# Returns empty policy if the secret exists and does not have a policy set.
|
96
|
+
rpc :GetIamPolicy, Google::Iam::V1::GetIamPolicyRequest, Google::Iam::V1::Policy
|
97
|
+
# Returns permissions that a caller has for the specified secret.
|
98
|
+
# If the secret does not exist, this call returns an empty set of
|
99
|
+
# permissions, not a NOT_FOUND error.
|
100
|
+
#
|
101
|
+
# Note: This operation is designed to be used for building permission-aware
|
102
|
+
# UIs and command-line tools, not for authorization checking. This operation
|
103
|
+
# may "fail open" without warning.
|
104
|
+
rpc :TestIamPermissions, Google::Iam::V1::TestIamPermissionsRequest, Google::Iam::V1::TestIamPermissionsResponse
|
105
|
+
end
|
106
|
+
|
107
|
+
Stub = Service.rpc_stub_class
|
108
|
+
end
|
109
|
+
end
|
110
|
+
end
|
111
|
+
end
|
112
|
+
end
|