google-cloud-secret_manager-v1 0.1.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -0,0 +1,52 @@
1
+ # frozen_string_literal: true
2
+
3
+ # Copyright 2020 Google LLC
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # https://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+
17
+ # Auto-generated by gapic-generator-ruby. DO NOT EDIT!
18
+
19
+ require "googleauth"
20
+
21
+
22
+ module Google
23
+ module Cloud
24
+ module SecretManager
25
+ module V1
26
+ module SecretManagerService
27
+ # Credentials for the SecretManagerService API.
28
+ class Credentials < Google::Auth::Credentials
29
+ self.scope = [
30
+ "https://www.googleapis.com/auth/cloud-platform"
31
+ ]
32
+ self.env_vars = [
33
+ "SECRET_MANAGER_CREDENTIALS",
34
+ "SECRET_MANAGER_KEYFILE",
35
+ "GOOGLE_CLOUD_CREDENTIALS",
36
+ "GOOGLE_CLOUD_KEYFILE",
37
+ "GCLOUD_KEYFILE",
38
+ "SECRET_MANAGER_CREDENTIALS_JSON",
39
+ "SECRET_MANAGER_KEYFILE_JSON",
40
+ "GOOGLE_CLOUD_CREDENTIALS_JSON",
41
+ "GOOGLE_CLOUD_KEYFILE_JSON",
42
+ "GCLOUD_KEYFILE_JSON"
43
+ ]
44
+ self.paths = [
45
+ "~/.config/google_cloud/application_default_credentials.json"
46
+ ]
47
+ end
48
+ end
49
+ end
50
+ end
51
+ end
52
+ end
@@ -0,0 +1,81 @@
1
+ # frozen_string_literal: true
2
+
3
+ # Copyright 2020 Google LLC
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # https://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+
17
+ # Auto-generated by gapic-generator-ruby. DO NOT EDIT!
18
+
19
+
20
+ module Google
21
+ module Cloud
22
+ module SecretManager
23
+ module V1
24
+ module SecretManagerService
25
+ # Path helper methods for the SecretManagerService API.
26
+ module Paths
27
+ ##
28
+ # Create a fully-qualified Project resource string.
29
+ #
30
+ # The resource will be in the following format:
31
+ #
32
+ # `projects/{project}`
33
+ #
34
+ # @param project [String]
35
+ #
36
+ # @return [String]
37
+ def project_path project:
38
+ "projects/#{project}"
39
+ end
40
+
41
+ ##
42
+ # Create a fully-qualified Secret resource string.
43
+ #
44
+ # The resource will be in the following format:
45
+ #
46
+ # `projects/{project}/secrets/{secret}`
47
+ #
48
+ # @param project [String]
49
+ # @param secret [String]
50
+ #
51
+ # @return [String]
52
+ def secret_path project:, secret:
53
+ raise ArgumentError, "project cannot contain /" if project.to_s.include? "/"
54
+
55
+ "projects/#{project}/secrets/#{secret}"
56
+ end
57
+
58
+ ##
59
+ # Create a fully-qualified SecretVersion resource string.
60
+ #
61
+ # The resource will be in the following format:
62
+ #
63
+ # `projects/{project}/secrets/{secret}/versions/{secret_version}`
64
+ #
65
+ # @param project [String]
66
+ # @param secret [String]
67
+ # @param secret_version [String]
68
+ #
69
+ # @return [String]
70
+ def secret_version_path project:, secret:, secret_version:
71
+ raise ArgumentError, "project cannot contain /" if project.to_s.include? "/"
72
+ raise ArgumentError, "secret cannot contain /" if secret.to_s.include? "/"
73
+
74
+ "projects/#{project}/secrets/#{secret}/versions/#{secret_version}"
75
+ end
76
+ end
77
+ end
78
+ end
79
+ end
80
+ end
81
+ end
@@ -0,0 +1,28 @@
1
+ # frozen_string_literal: true
2
+
3
+ # Copyright 2020 Google LLC
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # https://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+
17
+ # Auto-generated by gapic-generator-ruby. DO NOT EDIT!
18
+
19
+
20
+ module Google
21
+ module Cloud
22
+ module SecretManager
23
+ module V1
24
+ VERSION = "0.1.0"
25
+ end
26
+ end
27
+ end
28
+ end
@@ -0,0 +1,65 @@
1
+ # Generated by the protocol buffer compiler. DO NOT EDIT!
2
+ # source: google/cloud/secretmanager/v1/resources.proto
3
+
4
+ require 'google/protobuf'
5
+
6
+ require 'google/api/field_behavior_pb'
7
+ require 'google/api/resource_pb'
8
+ require 'google/protobuf/timestamp_pb'
9
+ require 'google/api/annotations_pb'
10
+ Google::Protobuf::DescriptorPool.generated_pool.build do
11
+ add_file("google/cloud/secretmanager/v1/resources.proto", :syntax => :proto3) do
12
+ add_message "google.cloud.secretmanager.v1.Secret" do
13
+ optional :name, :string, 1
14
+ optional :replication, :message, 2, "google.cloud.secretmanager.v1.Replication"
15
+ optional :create_time, :message, 3, "google.protobuf.Timestamp"
16
+ map :labels, :string, :string, 4
17
+ end
18
+ add_message "google.cloud.secretmanager.v1.SecretVersion" do
19
+ optional :name, :string, 1
20
+ optional :create_time, :message, 2, "google.protobuf.Timestamp"
21
+ optional :destroy_time, :message, 3, "google.protobuf.Timestamp"
22
+ optional :state, :enum, 4, "google.cloud.secretmanager.v1.SecretVersion.State"
23
+ end
24
+ add_enum "google.cloud.secretmanager.v1.SecretVersion.State" do
25
+ value :STATE_UNSPECIFIED, 0
26
+ value :ENABLED, 1
27
+ value :DISABLED, 2
28
+ value :DESTROYED, 3
29
+ end
30
+ add_message "google.cloud.secretmanager.v1.Replication" do
31
+ oneof :replication do
32
+ optional :automatic, :message, 1, "google.cloud.secretmanager.v1.Replication.Automatic"
33
+ optional :user_managed, :message, 2, "google.cloud.secretmanager.v1.Replication.UserManaged"
34
+ end
35
+ end
36
+ add_message "google.cloud.secretmanager.v1.Replication.Automatic" do
37
+ end
38
+ add_message "google.cloud.secretmanager.v1.Replication.UserManaged" do
39
+ repeated :replicas, :message, 1, "google.cloud.secretmanager.v1.Replication.UserManaged.Replica"
40
+ end
41
+ add_message "google.cloud.secretmanager.v1.Replication.UserManaged.Replica" do
42
+ optional :location, :string, 1
43
+ end
44
+ add_message "google.cloud.secretmanager.v1.SecretPayload" do
45
+ optional :data, :bytes, 1
46
+ end
47
+ end
48
+ end
49
+
50
+ module Google
51
+ module Cloud
52
+ module SecretManager
53
+ module V1
54
+ Secret = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Secret").msgclass
55
+ SecretVersion = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.SecretVersion").msgclass
56
+ SecretVersion::State = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.SecretVersion.State").enummodule
57
+ Replication = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication").msgclass
58
+ Replication::Automatic = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication.Automatic").msgclass
59
+ Replication::UserManaged = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication.UserManaged").msgclass
60
+ Replication::UserManaged::Replica = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication.UserManaged.Replica").msgclass
61
+ SecretPayload = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.SecretPayload").msgclass
62
+ end
63
+ end
64
+ end
65
+ end
@@ -0,0 +1,100 @@
1
+ # Generated by the protocol buffer compiler. DO NOT EDIT!
2
+ # source: google/cloud/secretmanager/v1/service.proto
3
+
4
+ require 'google/protobuf'
5
+
6
+ require 'google/api/annotations_pb'
7
+ require 'google/api/client_pb'
8
+ require 'google/api/field_behavior_pb'
9
+ require 'google/api/resource_pb'
10
+ require 'google/cloud/secretmanager/v1/resources_pb'
11
+ require 'google/iam/v1/iam_policy_pb'
12
+ require 'google/iam/v1/policy_pb'
13
+ require 'google/protobuf/empty_pb'
14
+ require 'google/protobuf/field_mask_pb'
15
+ Google::Protobuf::DescriptorPool.generated_pool.build do
16
+ add_file("google/cloud/secretmanager/v1/service.proto", :syntax => :proto3) do
17
+ add_message "google.cloud.secretmanager.v1.ListSecretsRequest" do
18
+ optional :parent, :string, 1
19
+ optional :page_size, :int32, 2
20
+ optional :page_token, :string, 3
21
+ end
22
+ add_message "google.cloud.secretmanager.v1.ListSecretsResponse" do
23
+ repeated :secrets, :message, 1, "google.cloud.secretmanager.v1.Secret"
24
+ optional :next_page_token, :string, 2
25
+ optional :total_size, :int32, 3
26
+ end
27
+ add_message "google.cloud.secretmanager.v1.CreateSecretRequest" do
28
+ optional :parent, :string, 1
29
+ optional :secret_id, :string, 2
30
+ optional :secret, :message, 3, "google.cloud.secretmanager.v1.Secret"
31
+ end
32
+ add_message "google.cloud.secretmanager.v1.AddSecretVersionRequest" do
33
+ optional :parent, :string, 1
34
+ optional :payload, :message, 2, "google.cloud.secretmanager.v1.SecretPayload"
35
+ end
36
+ add_message "google.cloud.secretmanager.v1.GetSecretRequest" do
37
+ optional :name, :string, 1
38
+ end
39
+ add_message "google.cloud.secretmanager.v1.ListSecretVersionsRequest" do
40
+ optional :parent, :string, 1
41
+ optional :page_size, :int32, 2
42
+ optional :page_token, :string, 3
43
+ end
44
+ add_message "google.cloud.secretmanager.v1.ListSecretVersionsResponse" do
45
+ repeated :versions, :message, 1, "google.cloud.secretmanager.v1.SecretVersion"
46
+ optional :next_page_token, :string, 2
47
+ optional :total_size, :int32, 3
48
+ end
49
+ add_message "google.cloud.secretmanager.v1.GetSecretVersionRequest" do
50
+ optional :name, :string, 1
51
+ end
52
+ add_message "google.cloud.secretmanager.v1.UpdateSecretRequest" do
53
+ optional :secret, :message, 1, "google.cloud.secretmanager.v1.Secret"
54
+ optional :update_mask, :message, 2, "google.protobuf.FieldMask"
55
+ end
56
+ add_message "google.cloud.secretmanager.v1.AccessSecretVersionRequest" do
57
+ optional :name, :string, 1
58
+ end
59
+ add_message "google.cloud.secretmanager.v1.AccessSecretVersionResponse" do
60
+ optional :name, :string, 1
61
+ optional :payload, :message, 2, "google.cloud.secretmanager.v1.SecretPayload"
62
+ end
63
+ add_message "google.cloud.secretmanager.v1.DeleteSecretRequest" do
64
+ optional :name, :string, 1
65
+ end
66
+ add_message "google.cloud.secretmanager.v1.DisableSecretVersionRequest" do
67
+ optional :name, :string, 1
68
+ end
69
+ add_message "google.cloud.secretmanager.v1.EnableSecretVersionRequest" do
70
+ optional :name, :string, 1
71
+ end
72
+ add_message "google.cloud.secretmanager.v1.DestroySecretVersionRequest" do
73
+ optional :name, :string, 1
74
+ end
75
+ end
76
+ end
77
+
78
+ module Google
79
+ module Cloud
80
+ module SecretManager
81
+ module V1
82
+ ListSecretsRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ListSecretsRequest").msgclass
83
+ ListSecretsResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ListSecretsResponse").msgclass
84
+ CreateSecretRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.CreateSecretRequest").msgclass
85
+ AddSecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.AddSecretVersionRequest").msgclass
86
+ GetSecretRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.GetSecretRequest").msgclass
87
+ ListSecretVersionsRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ListSecretVersionsRequest").msgclass
88
+ ListSecretVersionsResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ListSecretVersionsResponse").msgclass
89
+ GetSecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.GetSecretVersionRequest").msgclass
90
+ UpdateSecretRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.UpdateSecretRequest").msgclass
91
+ AccessSecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.AccessSecretVersionRequest").msgclass
92
+ AccessSecretVersionResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.AccessSecretVersionResponse").msgclass
93
+ DeleteSecretRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.DeleteSecretRequest").msgclass
94
+ DisableSecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.DisableSecretVersionRequest").msgclass
95
+ EnableSecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.EnableSecretVersionRequest").msgclass
96
+ DestroySecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.DestroySecretVersionRequest").msgclass
97
+ end
98
+ end
99
+ end
100
+ end
@@ -0,0 +1,112 @@
1
+ # Generated by the protocol buffer compiler. DO NOT EDIT!
2
+ # Source: google/cloud/secretmanager/v1/service.proto for package 'Google.Cloud.SecretManager.V1'
3
+ # Original file comments:
4
+ # Copyright 2019 Google LLC.
5
+ #
6
+ # Licensed under the Apache License, Version 2.0 (the "License");
7
+ # you may not use this file except in compliance with the License.
8
+ # You may obtain a copy of the License at
9
+ #
10
+ # http://www.apache.org/licenses/LICENSE-2.0
11
+ #
12
+ # Unless required by applicable law or agreed to in writing, software
13
+ # distributed under the License is distributed on an "AS IS" BASIS,
14
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15
+ # See the License for the specific language governing permissions and
16
+ # limitations under the License.
17
+ #
18
+ #
19
+
20
+ require 'grpc'
21
+ require 'google/cloud/secretmanager/v1/service_pb'
22
+
23
+ module Google
24
+ module Cloud
25
+ module SecretManager
26
+ module V1
27
+ module SecretManagerService
28
+ # `projects/*/secrets/*/versions/latest` is an alias to the `latest`
29
+ # [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
30
+ #
31
+ # Secret Manager Service
32
+ #
33
+ # Manages secrets and operations using those secrets. Implements a REST
34
+ # model with the following objects:
35
+ #
36
+ # * [Secret][google.cloud.secretmanager.v1.Secret]
37
+ # * [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
38
+ class Service
39
+
40
+ include GRPC::GenericService
41
+
42
+ self.marshal_class_method = :encode
43
+ self.unmarshal_class_method = :decode
44
+ self.service_name = 'google.cloud.secretmanager.v1.SecretManagerService'
45
+
46
+ # Lists [Secrets][google.cloud.secretmanager.v1.Secret].
47
+ rpc :ListSecrets, Google::Cloud::SecretManager::V1::ListSecretsRequest, Google::Cloud::SecretManager::V1::ListSecretsResponse
48
+ # Creates a new [Secret][google.cloud.secretmanager.v1.Secret] containing no [SecretVersions][google.cloud.secretmanager.v1.SecretVersion].
49
+ rpc :CreateSecret, Google::Cloud::SecretManager::V1::CreateSecretRequest, Google::Cloud::SecretManager::V1::Secret
50
+ # Creates a new [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] containing secret data and attaches
51
+ # it to an existing [Secret][google.cloud.secretmanager.v1.Secret].
52
+ rpc :AddSecretVersion, Google::Cloud::SecretManager::V1::AddSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
53
+ # Gets metadata for a given [Secret][google.cloud.secretmanager.v1.Secret].
54
+ rpc :GetSecret, Google::Cloud::SecretManager::V1::GetSecretRequest, Google::Cloud::SecretManager::V1::Secret
55
+ # Updates metadata of an existing [Secret][google.cloud.secretmanager.v1.Secret].
56
+ rpc :UpdateSecret, Google::Cloud::SecretManager::V1::UpdateSecretRequest, Google::Cloud::SecretManager::V1::Secret
57
+ # Deletes a [Secret][google.cloud.secretmanager.v1.Secret].
58
+ rpc :DeleteSecret, Google::Cloud::SecretManager::V1::DeleteSecretRequest, Google::Protobuf::Empty
59
+ # Lists [SecretVersions][google.cloud.secretmanager.v1.SecretVersion]. This call does not return secret
60
+ # data.
61
+ rpc :ListSecretVersions, Google::Cloud::SecretManager::V1::ListSecretVersionsRequest, Google::Cloud::SecretManager::V1::ListSecretVersionsResponse
62
+ # Gets metadata for a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
63
+ #
64
+ # `projects/*/secrets/*/versions/latest` is an alias to the `latest`
65
+ # [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
66
+ rpc :GetSecretVersion, Google::Cloud::SecretManager::V1::GetSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
67
+ # Accesses a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. This call returns the secret data.
68
+ #
69
+ # `projects/*/secrets/*/versions/latest` is an alias to the `latest`
70
+ # [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
71
+ rpc :AccessSecretVersion, Google::Cloud::SecretManager::V1::AccessSecretVersionRequest, Google::Cloud::SecretManager::V1::AccessSecretVersionResponse
72
+ # Disables a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
73
+ #
74
+ # Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
75
+ # [DISABLED][google.cloud.secretmanager.v1.SecretVersion.State.DISABLED].
76
+ rpc :DisableSecretVersion, Google::Cloud::SecretManager::V1::DisableSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
77
+ # Enables a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
78
+ #
79
+ # Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
80
+ # [ENABLED][google.cloud.secretmanager.v1.SecretVersion.State.ENABLED].
81
+ rpc :EnableSecretVersion, Google::Cloud::SecretManager::V1::EnableSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
82
+ # Destroys a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
83
+ #
84
+ # Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
85
+ # [DESTROYED][google.cloud.secretmanager.v1.SecretVersion.State.DESTROYED] and irrevocably destroys the
86
+ # secret data.
87
+ rpc :DestroySecretVersion, Google::Cloud::SecretManager::V1::DestroySecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
88
+ # Sets the access control policy on the specified secret. Replaces any
89
+ # existing policy.
90
+ #
91
+ # Permissions on [SecretVersions][google.cloud.secretmanager.v1.SecretVersion] are enforced according
92
+ # to the policy set on the associated [Secret][google.cloud.secretmanager.v1.Secret].
93
+ rpc :SetIamPolicy, Google::Iam::V1::SetIamPolicyRequest, Google::Iam::V1::Policy
94
+ # Gets the access control policy for a secret.
95
+ # Returns empty policy if the secret exists and does not have a policy set.
96
+ rpc :GetIamPolicy, Google::Iam::V1::GetIamPolicyRequest, Google::Iam::V1::Policy
97
+ # Returns permissions that a caller has for the specified secret.
98
+ # If the secret does not exist, this call returns an empty set of
99
+ # permissions, not a NOT_FOUND error.
100
+ #
101
+ # Note: This operation is designed to be used for building permission-aware
102
+ # UIs and command-line tools, not for authorization checking. This operation
103
+ # may "fail open" without warning.
104
+ rpc :TestIamPermissions, Google::Iam::V1::TestIamPermissionsRequest, Google::Iam::V1::TestIamPermissionsResponse
105
+ end
106
+
107
+ Stub = Service.rpc_stub_class
108
+ end
109
+ end
110
+ end
111
+ end
112
+ end
@@ -0,0 +1,4 @@
1
+ # Secret Manager V1 Protocol Buffer Documentation
2
+
3
+ These files are for the YARD documentation of the generated protobuf files.
4
+ They are not intended to be required or loaded at runtime.