Class SecretManagerServiceGrpc.SecretManagerServiceFutureStub

  • Enclosing class:
    SecretManagerServiceGrpc

    public static final class SecretManagerServiceGrpc.SecretManagerServiceFutureStub
    extends io.grpc.stub.AbstractFutureStub<SecretManagerServiceGrpc.SecretManagerServiceFutureStub>
    A stub to allow clients to do ListenableFuture-style rpc calls to service SecretManagerService.
     Secret Manager Service
     Manages secrets and operations using those secrets. Implements a REST
     model with the following objects:
     * [Secret][google.cloud.secretmanager.v1.Secret]
     * [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
     
    • Method Detail

      • listSecrets

        public com.google.common.util.concurrent.ListenableFuture<ListSecretsResponse> listSecrets​(ListSecretsRequest request)
         Lists [Secrets][google.cloud.secretmanager.v1.Secret].
         
      • createSecret

        public com.google.common.util.concurrent.ListenableFuture<Secret> createSecret​(CreateSecretRequest request)
         Creates a new [Secret][google.cloud.secretmanager.v1.Secret] containing no [SecretVersions][google.cloud.secretmanager.v1.SecretVersion].
         
      • addSecretVersion

        public com.google.common.util.concurrent.ListenableFuture<SecretVersion> addSecretVersion​(AddSecretVersionRequest request)
         Creates a new [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] containing secret data and attaches
         it to an existing [Secret][google.cloud.secretmanager.v1.Secret].
         
      • getSecret

        public com.google.common.util.concurrent.ListenableFuture<Secret> getSecret​(GetSecretRequest request)
         Gets metadata for a given [Secret][google.cloud.secretmanager.v1.Secret].
         
      • updateSecret

        public com.google.common.util.concurrent.ListenableFuture<Secret> updateSecret​(UpdateSecretRequest request)
         Updates metadata of an existing [Secret][google.cloud.secretmanager.v1.Secret].
         
      • deleteSecret

        public com.google.common.util.concurrent.ListenableFuture<com.google.protobuf.Empty> deleteSecret​(DeleteSecretRequest request)
         Deletes a [Secret][google.cloud.secretmanager.v1.Secret].
         
      • listSecretVersions

        public com.google.common.util.concurrent.ListenableFuture<ListSecretVersionsResponse> listSecretVersions​(ListSecretVersionsRequest request)
         Lists [SecretVersions][google.cloud.secretmanager.v1.SecretVersion]. This call does not return secret
         data.
         
      • getSecretVersion

        public com.google.common.util.concurrent.ListenableFuture<SecretVersion> getSecretVersion​(GetSecretVersionRequest request)
         Gets metadata for a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
         `projects/*/secrets/*/versions/latest` is an alias to the most recently
         created [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
         
      • accessSecretVersion

        public com.google.common.util.concurrent.ListenableFuture<AccessSecretVersionResponse> accessSecretVersion​(AccessSecretVersionRequest request)
         Accesses a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. This call returns the secret data.
         `projects/*/secrets/*/versions/latest` is an alias to the most recently
         created [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
         
      • disableSecretVersion

        public com.google.common.util.concurrent.ListenableFuture<SecretVersion> disableSecretVersion​(DisableSecretVersionRequest request)
         Disables a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
         Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
         [DISABLED][google.cloud.secretmanager.v1.SecretVersion.State.DISABLED].
         
      • enableSecretVersion

        public com.google.common.util.concurrent.ListenableFuture<SecretVersion> enableSecretVersion​(EnableSecretVersionRequest request)
         Enables a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
         Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
         [ENABLED][google.cloud.secretmanager.v1.SecretVersion.State.ENABLED].
         
      • destroySecretVersion

        public com.google.common.util.concurrent.ListenableFuture<SecretVersion> destroySecretVersion​(DestroySecretVersionRequest request)
         Destroys a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
         Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
         [DESTROYED][google.cloud.secretmanager.v1.SecretVersion.State.DESTROYED] and irrevocably destroys the
         secret data.
         
      • setIamPolicy

        public com.google.common.util.concurrent.ListenableFuture<com.google.iam.v1.Policy> setIamPolicy​(com.google.iam.v1.SetIamPolicyRequest request)
         Sets the access control policy on the specified secret. Replaces any
         existing policy.
         Permissions on [SecretVersions][google.cloud.secretmanager.v1.SecretVersion] are enforced according
         to the policy set on the associated [Secret][google.cloud.secretmanager.v1.Secret].
         
      • getIamPolicy

        public com.google.common.util.concurrent.ListenableFuture<com.google.iam.v1.Policy> getIamPolicy​(com.google.iam.v1.GetIamPolicyRequest request)
         Gets the access control policy for a secret.
         Returns empty policy if the secret exists and does not have a policy set.
         
      • testIamPermissions

        public com.google.common.util.concurrent.ListenableFuture<com.google.iam.v1.TestIamPermissionsResponse> testIamPermissions​(com.google.iam.v1.TestIamPermissionsRequest request)
         Returns permissions that a caller has for the specified secret.
         If the secret does not exist, this call returns an empty set of
         permissions, not a NOT_FOUND error.
         Note: This operation is designed to be used for building permission-aware
         UIs and command-line tools, not for authorization checking. This operation
         may "fail open" without warning.