google-cloud-secret_manager-v1 0.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,52 @@
1
+ # frozen_string_literal: true
2
+
3
+ # Copyright 2020 Google LLC
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # https://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+
17
+ # Auto-generated by gapic-generator-ruby. DO NOT EDIT!
18
+
19
+ require "googleauth"
20
+
21
+
22
+ module Google
23
+ module Cloud
24
+ module SecretManager
25
+ module V1
26
+ module SecretManagerService
27
+ # Credentials for the SecretManagerService API.
28
+ class Credentials < Google::Auth::Credentials
29
+ self.scope = [
30
+ "https://www.googleapis.com/auth/cloud-platform"
31
+ ]
32
+ self.env_vars = [
33
+ "SECRET_MANAGER_CREDENTIALS",
34
+ "SECRET_MANAGER_KEYFILE",
35
+ "GOOGLE_CLOUD_CREDENTIALS",
36
+ "GOOGLE_CLOUD_KEYFILE",
37
+ "GCLOUD_KEYFILE",
38
+ "SECRET_MANAGER_CREDENTIALS_JSON",
39
+ "SECRET_MANAGER_KEYFILE_JSON",
40
+ "GOOGLE_CLOUD_CREDENTIALS_JSON",
41
+ "GOOGLE_CLOUD_KEYFILE_JSON",
42
+ "GCLOUD_KEYFILE_JSON"
43
+ ]
44
+ self.paths = [
45
+ "~/.config/google_cloud/application_default_credentials.json"
46
+ ]
47
+ end
48
+ end
49
+ end
50
+ end
51
+ end
52
+ end
@@ -0,0 +1,81 @@
1
+ # frozen_string_literal: true
2
+
3
+ # Copyright 2020 Google LLC
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # https://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+
17
+ # Auto-generated by gapic-generator-ruby. DO NOT EDIT!
18
+
19
+
20
+ module Google
21
+ module Cloud
22
+ module SecretManager
23
+ module V1
24
+ module SecretManagerService
25
+ # Path helper methods for the SecretManagerService API.
26
+ module Paths
27
+ ##
28
+ # Create a fully-qualified Project resource string.
29
+ #
30
+ # The resource will be in the following format:
31
+ #
32
+ # `projects/{project}`
33
+ #
34
+ # @param project [String]
35
+ #
36
+ # @return [String]
37
+ def project_path project:
38
+ "projects/#{project}"
39
+ end
40
+
41
+ ##
42
+ # Create a fully-qualified Secret resource string.
43
+ #
44
+ # The resource will be in the following format:
45
+ #
46
+ # `projects/{project}/secrets/{secret}`
47
+ #
48
+ # @param project [String]
49
+ # @param secret [String]
50
+ #
51
+ # @return [String]
52
+ def secret_path project:, secret:
53
+ raise ArgumentError, "project cannot contain /" if project.to_s.include? "/"
54
+
55
+ "projects/#{project}/secrets/#{secret}"
56
+ end
57
+
58
+ ##
59
+ # Create a fully-qualified SecretVersion resource string.
60
+ #
61
+ # The resource will be in the following format:
62
+ #
63
+ # `projects/{project}/secrets/{secret}/versions/{secret_version}`
64
+ #
65
+ # @param project [String]
66
+ # @param secret [String]
67
+ # @param secret_version [String]
68
+ #
69
+ # @return [String]
70
+ def secret_version_path project:, secret:, secret_version:
71
+ raise ArgumentError, "project cannot contain /" if project.to_s.include? "/"
72
+ raise ArgumentError, "secret cannot contain /" if secret.to_s.include? "/"
73
+
74
+ "projects/#{project}/secrets/#{secret}/versions/#{secret_version}"
75
+ end
76
+ end
77
+ end
78
+ end
79
+ end
80
+ end
81
+ end
@@ -0,0 +1,28 @@
1
+ # frozen_string_literal: true
2
+
3
+ # Copyright 2020 Google LLC
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # https://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+
17
+ # Auto-generated by gapic-generator-ruby. DO NOT EDIT!
18
+
19
+
20
+ module Google
21
+ module Cloud
22
+ module SecretManager
23
+ module V1
24
+ VERSION = "0.1.0"
25
+ end
26
+ end
27
+ end
28
+ end
@@ -0,0 +1,65 @@
1
+ # Generated by the protocol buffer compiler. DO NOT EDIT!
2
+ # source: google/cloud/secretmanager/v1/resources.proto
3
+
4
+ require 'google/protobuf'
5
+
6
+ require 'google/api/field_behavior_pb'
7
+ require 'google/api/resource_pb'
8
+ require 'google/protobuf/timestamp_pb'
9
+ require 'google/api/annotations_pb'
10
+ Google::Protobuf::DescriptorPool.generated_pool.build do
11
+ add_file("google/cloud/secretmanager/v1/resources.proto", :syntax => :proto3) do
12
+ add_message "google.cloud.secretmanager.v1.Secret" do
13
+ optional :name, :string, 1
14
+ optional :replication, :message, 2, "google.cloud.secretmanager.v1.Replication"
15
+ optional :create_time, :message, 3, "google.protobuf.Timestamp"
16
+ map :labels, :string, :string, 4
17
+ end
18
+ add_message "google.cloud.secretmanager.v1.SecretVersion" do
19
+ optional :name, :string, 1
20
+ optional :create_time, :message, 2, "google.protobuf.Timestamp"
21
+ optional :destroy_time, :message, 3, "google.protobuf.Timestamp"
22
+ optional :state, :enum, 4, "google.cloud.secretmanager.v1.SecretVersion.State"
23
+ end
24
+ add_enum "google.cloud.secretmanager.v1.SecretVersion.State" do
25
+ value :STATE_UNSPECIFIED, 0
26
+ value :ENABLED, 1
27
+ value :DISABLED, 2
28
+ value :DESTROYED, 3
29
+ end
30
+ add_message "google.cloud.secretmanager.v1.Replication" do
31
+ oneof :replication do
32
+ optional :automatic, :message, 1, "google.cloud.secretmanager.v1.Replication.Automatic"
33
+ optional :user_managed, :message, 2, "google.cloud.secretmanager.v1.Replication.UserManaged"
34
+ end
35
+ end
36
+ add_message "google.cloud.secretmanager.v1.Replication.Automatic" do
37
+ end
38
+ add_message "google.cloud.secretmanager.v1.Replication.UserManaged" do
39
+ repeated :replicas, :message, 1, "google.cloud.secretmanager.v1.Replication.UserManaged.Replica"
40
+ end
41
+ add_message "google.cloud.secretmanager.v1.Replication.UserManaged.Replica" do
42
+ optional :location, :string, 1
43
+ end
44
+ add_message "google.cloud.secretmanager.v1.SecretPayload" do
45
+ optional :data, :bytes, 1
46
+ end
47
+ end
48
+ end
49
+
50
+ module Google
51
+ module Cloud
52
+ module SecretManager
53
+ module V1
54
+ Secret = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Secret").msgclass
55
+ SecretVersion = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.SecretVersion").msgclass
56
+ SecretVersion::State = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.SecretVersion.State").enummodule
57
+ Replication = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication").msgclass
58
+ Replication::Automatic = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication.Automatic").msgclass
59
+ Replication::UserManaged = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication.UserManaged").msgclass
60
+ Replication::UserManaged::Replica = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication.UserManaged.Replica").msgclass
61
+ SecretPayload = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.SecretPayload").msgclass
62
+ end
63
+ end
64
+ end
65
+ end
@@ -0,0 +1,100 @@
1
+ # Generated by the protocol buffer compiler. DO NOT EDIT!
2
+ # source: google/cloud/secretmanager/v1/service.proto
3
+
4
+ require 'google/protobuf'
5
+
6
+ require 'google/api/annotations_pb'
7
+ require 'google/api/client_pb'
8
+ require 'google/api/field_behavior_pb'
9
+ require 'google/api/resource_pb'
10
+ require 'google/cloud/secretmanager/v1/resources_pb'
11
+ require 'google/iam/v1/iam_policy_pb'
12
+ require 'google/iam/v1/policy_pb'
13
+ require 'google/protobuf/empty_pb'
14
+ require 'google/protobuf/field_mask_pb'
15
+ Google::Protobuf::DescriptorPool.generated_pool.build do
16
+ add_file("google/cloud/secretmanager/v1/service.proto", :syntax => :proto3) do
17
+ add_message "google.cloud.secretmanager.v1.ListSecretsRequest" do
18
+ optional :parent, :string, 1
19
+ optional :page_size, :int32, 2
20
+ optional :page_token, :string, 3
21
+ end
22
+ add_message "google.cloud.secretmanager.v1.ListSecretsResponse" do
23
+ repeated :secrets, :message, 1, "google.cloud.secretmanager.v1.Secret"
24
+ optional :next_page_token, :string, 2
25
+ optional :total_size, :int32, 3
26
+ end
27
+ add_message "google.cloud.secretmanager.v1.CreateSecretRequest" do
28
+ optional :parent, :string, 1
29
+ optional :secret_id, :string, 2
30
+ optional :secret, :message, 3, "google.cloud.secretmanager.v1.Secret"
31
+ end
32
+ add_message "google.cloud.secretmanager.v1.AddSecretVersionRequest" do
33
+ optional :parent, :string, 1
34
+ optional :payload, :message, 2, "google.cloud.secretmanager.v1.SecretPayload"
35
+ end
36
+ add_message "google.cloud.secretmanager.v1.GetSecretRequest" do
37
+ optional :name, :string, 1
38
+ end
39
+ add_message "google.cloud.secretmanager.v1.ListSecretVersionsRequest" do
40
+ optional :parent, :string, 1
41
+ optional :page_size, :int32, 2
42
+ optional :page_token, :string, 3
43
+ end
44
+ add_message "google.cloud.secretmanager.v1.ListSecretVersionsResponse" do
45
+ repeated :versions, :message, 1, "google.cloud.secretmanager.v1.SecretVersion"
46
+ optional :next_page_token, :string, 2
47
+ optional :total_size, :int32, 3
48
+ end
49
+ add_message "google.cloud.secretmanager.v1.GetSecretVersionRequest" do
50
+ optional :name, :string, 1
51
+ end
52
+ add_message "google.cloud.secretmanager.v1.UpdateSecretRequest" do
53
+ optional :secret, :message, 1, "google.cloud.secretmanager.v1.Secret"
54
+ optional :update_mask, :message, 2, "google.protobuf.FieldMask"
55
+ end
56
+ add_message "google.cloud.secretmanager.v1.AccessSecretVersionRequest" do
57
+ optional :name, :string, 1
58
+ end
59
+ add_message "google.cloud.secretmanager.v1.AccessSecretVersionResponse" do
60
+ optional :name, :string, 1
61
+ optional :payload, :message, 2, "google.cloud.secretmanager.v1.SecretPayload"
62
+ end
63
+ add_message "google.cloud.secretmanager.v1.DeleteSecretRequest" do
64
+ optional :name, :string, 1
65
+ end
66
+ add_message "google.cloud.secretmanager.v1.DisableSecretVersionRequest" do
67
+ optional :name, :string, 1
68
+ end
69
+ add_message "google.cloud.secretmanager.v1.EnableSecretVersionRequest" do
70
+ optional :name, :string, 1
71
+ end
72
+ add_message "google.cloud.secretmanager.v1.DestroySecretVersionRequest" do
73
+ optional :name, :string, 1
74
+ end
75
+ end
76
+ end
77
+
78
+ module Google
79
+ module Cloud
80
+ module SecretManager
81
+ module V1
82
+ ListSecretsRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ListSecretsRequest").msgclass
83
+ ListSecretsResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ListSecretsResponse").msgclass
84
+ CreateSecretRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.CreateSecretRequest").msgclass
85
+ AddSecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.AddSecretVersionRequest").msgclass
86
+ GetSecretRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.GetSecretRequest").msgclass
87
+ ListSecretVersionsRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ListSecretVersionsRequest").msgclass
88
+ ListSecretVersionsResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ListSecretVersionsResponse").msgclass
89
+ GetSecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.GetSecretVersionRequest").msgclass
90
+ UpdateSecretRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.UpdateSecretRequest").msgclass
91
+ AccessSecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.AccessSecretVersionRequest").msgclass
92
+ AccessSecretVersionResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.AccessSecretVersionResponse").msgclass
93
+ DeleteSecretRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.DeleteSecretRequest").msgclass
94
+ DisableSecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.DisableSecretVersionRequest").msgclass
95
+ EnableSecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.EnableSecretVersionRequest").msgclass
96
+ DestroySecretVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.DestroySecretVersionRequest").msgclass
97
+ end
98
+ end
99
+ end
100
+ end
@@ -0,0 +1,112 @@
1
+ # Generated by the protocol buffer compiler. DO NOT EDIT!
2
+ # Source: google/cloud/secretmanager/v1/service.proto for package 'Google.Cloud.SecretManager.V1'
3
+ # Original file comments:
4
+ # Copyright 2019 Google LLC.
5
+ #
6
+ # Licensed under the Apache License, Version 2.0 (the "License");
7
+ # you may not use this file except in compliance with the License.
8
+ # You may obtain a copy of the License at
9
+ #
10
+ # http://www.apache.org/licenses/LICENSE-2.0
11
+ #
12
+ # Unless required by applicable law or agreed to in writing, software
13
+ # distributed under the License is distributed on an "AS IS" BASIS,
14
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15
+ # See the License for the specific language governing permissions and
16
+ # limitations under the License.
17
+ #
18
+ #
19
+
20
+ require 'grpc'
21
+ require 'google/cloud/secretmanager/v1/service_pb'
22
+
23
+ module Google
24
+ module Cloud
25
+ module SecretManager
26
+ module V1
27
+ module SecretManagerService
28
+ # `projects/*/secrets/*/versions/latest` is an alias to the `latest`
29
+ # [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
30
+ #
31
+ # Secret Manager Service
32
+ #
33
+ # Manages secrets and operations using those secrets. Implements a REST
34
+ # model with the following objects:
35
+ #
36
+ # * [Secret][google.cloud.secretmanager.v1.Secret]
37
+ # * [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
38
+ class Service
39
+
40
+ include GRPC::GenericService
41
+
42
+ self.marshal_class_method = :encode
43
+ self.unmarshal_class_method = :decode
44
+ self.service_name = 'google.cloud.secretmanager.v1.SecretManagerService'
45
+
46
+ # Lists [Secrets][google.cloud.secretmanager.v1.Secret].
47
+ rpc :ListSecrets, Google::Cloud::SecretManager::V1::ListSecretsRequest, Google::Cloud::SecretManager::V1::ListSecretsResponse
48
+ # Creates a new [Secret][google.cloud.secretmanager.v1.Secret] containing no [SecretVersions][google.cloud.secretmanager.v1.SecretVersion].
49
+ rpc :CreateSecret, Google::Cloud::SecretManager::V1::CreateSecretRequest, Google::Cloud::SecretManager::V1::Secret
50
+ # Creates a new [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] containing secret data and attaches
51
+ # it to an existing [Secret][google.cloud.secretmanager.v1.Secret].
52
+ rpc :AddSecretVersion, Google::Cloud::SecretManager::V1::AddSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
53
+ # Gets metadata for a given [Secret][google.cloud.secretmanager.v1.Secret].
54
+ rpc :GetSecret, Google::Cloud::SecretManager::V1::GetSecretRequest, Google::Cloud::SecretManager::V1::Secret
55
+ # Updates metadata of an existing [Secret][google.cloud.secretmanager.v1.Secret].
56
+ rpc :UpdateSecret, Google::Cloud::SecretManager::V1::UpdateSecretRequest, Google::Cloud::SecretManager::V1::Secret
57
+ # Deletes a [Secret][google.cloud.secretmanager.v1.Secret].
58
+ rpc :DeleteSecret, Google::Cloud::SecretManager::V1::DeleteSecretRequest, Google::Protobuf::Empty
59
+ # Lists [SecretVersions][google.cloud.secretmanager.v1.SecretVersion]. This call does not return secret
60
+ # data.
61
+ rpc :ListSecretVersions, Google::Cloud::SecretManager::V1::ListSecretVersionsRequest, Google::Cloud::SecretManager::V1::ListSecretVersionsResponse
62
+ # Gets metadata for a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
63
+ #
64
+ # `projects/*/secrets/*/versions/latest` is an alias to the `latest`
65
+ # [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
66
+ rpc :GetSecretVersion, Google::Cloud::SecretManager::V1::GetSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
67
+ # Accesses a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. This call returns the secret data.
68
+ #
69
+ # `projects/*/secrets/*/versions/latest` is an alias to the `latest`
70
+ # [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
71
+ rpc :AccessSecretVersion, Google::Cloud::SecretManager::V1::AccessSecretVersionRequest, Google::Cloud::SecretManager::V1::AccessSecretVersionResponse
72
+ # Disables a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
73
+ #
74
+ # Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
75
+ # [DISABLED][google.cloud.secretmanager.v1.SecretVersion.State.DISABLED].
76
+ rpc :DisableSecretVersion, Google::Cloud::SecretManager::V1::DisableSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
77
+ # Enables a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
78
+ #
79
+ # Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
80
+ # [ENABLED][google.cloud.secretmanager.v1.SecretVersion.State.ENABLED].
81
+ rpc :EnableSecretVersion, Google::Cloud::SecretManager::V1::EnableSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
82
+ # Destroys a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
83
+ #
84
+ # Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
85
+ # [DESTROYED][google.cloud.secretmanager.v1.SecretVersion.State.DESTROYED] and irrevocably destroys the
86
+ # secret data.
87
+ rpc :DestroySecretVersion, Google::Cloud::SecretManager::V1::DestroySecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
88
+ # Sets the access control policy on the specified secret. Replaces any
89
+ # existing policy.
90
+ #
91
+ # Permissions on [SecretVersions][google.cloud.secretmanager.v1.SecretVersion] are enforced according
92
+ # to the policy set on the associated [Secret][google.cloud.secretmanager.v1.Secret].
93
+ rpc :SetIamPolicy, Google::Iam::V1::SetIamPolicyRequest, Google::Iam::V1::Policy
94
+ # Gets the access control policy for a secret.
95
+ # Returns empty policy if the secret exists and does not have a policy set.
96
+ rpc :GetIamPolicy, Google::Iam::V1::GetIamPolicyRequest, Google::Iam::V1::Policy
97
+ # Returns permissions that a caller has for the specified secret.
98
+ # If the secret does not exist, this call returns an empty set of
99
+ # permissions, not a NOT_FOUND error.
100
+ #
101
+ # Note: This operation is designed to be used for building permission-aware
102
+ # UIs and command-line tools, not for authorization checking. This operation
103
+ # may "fail open" without warning.
104
+ rpc :TestIamPermissions, Google::Iam::V1::TestIamPermissionsRequest, Google::Iam::V1::TestIamPermissionsResponse
105
+ end
106
+
107
+ Stub = Service.rpc_stub_class
108
+ end
109
+ end
110
+ end
111
+ end
112
+ end
@@ -0,0 +1,4 @@
1
+ # Secret Manager V1 Protocol Buffer Documentation
2
+
3
+ These files are for the YARD documentation of the generated protobuf files.
4
+ They are not intended to be required or loaded at runtime.