Package google.cloud.secretmanager.v1 Stay organized with collections Save and categorize content based on your preferences.
Index
SecretManagerService(interface)AccessSecretVersionRequest(message)AccessSecretVersionResponse(message)AddSecretVersionRequest(message)CreateSecretRequest(message)CustomerManagedEncryption(message)CustomerManagedEncryptionStatus(message)DeleteSecretRequest(message)DestroySecretVersionRequest(message)DisableSecretVersionRequest(message)EnableSecretVersionRequest(message)GetSecretRequest(message)GetSecretVersionRequest(message)ListSecretVersionsRequest(message)ListSecretVersionsResponse(message)ListSecretsRequest(message)ListSecretsResponse(message)Replication(message)Replication.Automatic(message)Replication.UserManaged(message)Replication.UserManaged.Replica(message)ReplicationStatus(message)ReplicationStatus.AutomaticStatus(message)ReplicationStatus.UserManagedStatus(message)ReplicationStatus.UserManagedStatus.ReplicaStatus(message)Rotation(message)Secret(message)SecretPayload(message)SecretVersion(message)SecretVersion.State(enum)Topic(message)UpdateSecretRequest(message)
SecretManagerService
Secret Manager Service
Manages secrets and operations using those secrets. Implements a REST model with the following objects:
| AccessSecretVersion |
|---|
Accesses a
|
| AddSecretVersion |
|---|
Creates a new
|
| CreateSecret |
|---|
Creates a new
|
| DeleteSecret |
|---|
Deletes a
|
| DestroySecretVersion |
|---|
Destroys a Sets the
|
| DisableSecretVersion |
|---|
Disables a Sets the
|
| EnableSecretVersion |
|---|
Enables a Sets the
|
| GetIamPolicy |
|---|
Gets the access control policy for a secret. Returns empty policy if the secret exists and does not have a policy set.
|
| GetSecret |
|---|
Gets metadata for a given
|
| GetSecretVersion |
|---|
Gets metadata for a
|
| ListSecretVersions |
|---|
Lists
|
| ListSecrets |
|---|
Lists
|
| SetIamPolicy |
|---|
Sets the access control policy on the specified secret. Replaces any existing policy. Permissions on
|
| TestIamPermissions |
|---|
Returns permissions that a caller has for the specified secret. If the secret does not exist, this call returns an empty set of permissions, not a NOT_FOUND error. Note: This operation is designed to be used for building permission-aware UIs and command-line tools, not for authorization checking. This operation may "fail open" without warning.
|
| UpdateSecret |
|---|
Updates metadata of an existing
|
AccessSecretVersionRequest
Request message forSecretManagerService.AccessSecretVersion.
| Fields | |
|---|---|
name |
Required. The resource name of the
Authorization requires the followingIAM permission on the specified resource
|
AccessSecretVersionResponse
Response message forSecretManagerService.AccessSecretVersion.
| Fields | |
|---|---|
name |
The resource name of the |
payload | Secret payload |
AddSecretVersionRequest
Request message forSecretManagerService.AddSecretVersion.
| Fields | |
|---|---|
parent |
Required. The resource name of the Authorization requires the followingIAM permission on the specified resource
|
payload | Required. The secret payload of the |
CreateSecretRequest
Request message forSecretManagerService.CreateSecret.
| Fields | |
|---|---|
parent |
Required. The resource name of the project to associate with the Authorization requires the followingIAM permission on the specified resource
|
secret_id |
Required. This must be unique within the project. A secret ID is a string with a maximum length of 255 characters and can contain uppercase and lowercase letters, numerals, and the hyphen ( |
secret | Required. A |
CustomerManagedEncryption
Configuration for encrypting secret payloads using customer-managed encryption keys (CMEK).
| Fields | |
|---|---|
kms_key_name |
Required. The resource name of the Cloud KMS CryptoKey used to encrypt secret payloads. For secrets using the For secrets using the The expected format is |
CustomerManagedEncryptionStatus
Describes the status of customer-managed encryption.
| Fields | |
|---|---|
kms_key_version_name |
Required. The resource name of the Cloud KMS CryptoKeyVersion used to encrypt the secret payload, in the following format: |
DeleteSecretRequest
Request message forSecretManagerService.DeleteSecret.
| Fields | |
|---|---|
name |
Required. The resource name of the Authorization requires the followingIAM permission on the specified resource
|
etag |
Optional. Etag of the |
DestroySecretVersionRequest
Request message forSecretManagerService.DestroySecretVersion.
| Fields | |
|---|---|
name |
Required. The resource name of the Authorization requires the followingIAM permission on the specified resource
|
etag |
Optional. Etag of the |
DisableSecretVersionRequest
Request message forSecretManagerService.DisableSecretVersion.
| Fields | |
|---|---|
name |
Required. The resource name of the Authorization requires the followingIAM permission on the specified resource
|
etag |
Optional. Etag of the |
EnableSecretVersionRequest
Request message forSecretManagerService.EnableSecretVersion.
| Fields | |
|---|---|
name |
Required. The resource name of the Authorization requires the followingIAM permission on the specified resource
|
etag |
Optional. Etag of the |
GetSecretRequest
Request message forSecretManagerService.GetSecret.
| Fields | |
|---|---|
name |
Required. The resource name of the Authorization requires the followingIAM permission on the specified resource
|
GetSecretVersionRequest
Request message forSecretManagerService.GetSecretVersion.
| Fields | |
|---|---|
name |
Required. The resource name of the
Authorization requires the followingIAM permission on the specified resource
|
ListSecretVersionsRequest
Request message forSecretManagerService.ListSecretVersions.
| Fields | |
|---|---|
parent |
Required. The resource name of the Authorization requires the followingIAM permission on the specified resource
|
page_size |
Optional. The maximum number of results to be returned in a single page. If set to 0, the server decides the number of results to return. If the number is greater than 25000, it is capped at 25000. |
page_token |
Optional. Pagination token, returned earlier via ListSecretVersionsResponse.next_page_token][]. |
filter |
Optional. Filter string, adhering to the rules inList-operation filtering. List only secret versions matching the filter. If filter is empty, all secret versions are listed. |
ListSecretVersionsResponse
Response message forSecretManagerService.ListSecretVersions.
| Fields | |
|---|---|
versions[] | The list of |
next_page_token |
A token to retrieve the next page of results. Pass this value in |
total_size |
The total number of |
ListSecretsRequest
Request message forSecretManagerService.ListSecrets.
| Fields | |
|---|---|
parent |
Required. The resource name of the project associated with the Authorization requires the followingIAM permission on the specified resource
|
page_size |
Optional. The maximum number of results to be returned in a single page. If set to 0, the server decides the number of results to return. If the number is greater than 25000, it is capped at 25000. |
page_token |
Optional. Pagination token, returned earlier via |
filter |
Optional. Filter string, adhering to the rules inList-operation filtering. List only secrets matching the filter. If filter is empty, all secrets are listed. |
ListSecretsResponse
Response message forSecretManagerService.ListSecrets.
| Fields | |
|---|---|
secrets[] | The list of |
next_page_token |
A token to retrieve the next page of results. Pass this value in |
total_size |
The total number of |
Replication
A policy that defines the replication and encryption configuration of data.
| Fields | |
|---|---|
Union fieldreplication. The replication policy for this secret.replication can be only one of the following: | |
automatic | The |
user_managed | The |
Automatic
A replication policy that replicates theSecret payload without any restrictions.
| Fields | |
|---|---|
customer_managed_encryption | Optional. The customer-managed encryption configuration of the Updates to the |
UserManaged
A replication policy that replicates theSecret payload into the locations specified in [Secret.replication.user_managed.replicas][]
| Fields | |
|---|---|
replicas[] | Required. The list of Replicas for this Cannot be empty. |
Replica
Represents a Replica for thisSecret.
| Fields | |
|---|---|
location |
The canonical IDs of the location to replicate data. For example: |
customer_managed_encryption | Optional. The customer-managed encryption configuration of the [User-Managed Replica][Replication.UserManaged.Replica]. If no configuration is provided, Google-managed default encryption is used. Updates to the |
ReplicationStatus
The replication status of aSecretVersion.
| Fields | |
|---|---|
Union fieldreplication_status. The replication status of theSecretVersion.replication_status can be only one of the following: | |
automatic | Describes the replication status of a Only populated if the parent |
user_managed | Describes the replication status of a Only populated if the parent |
AutomaticStatus
The replication status of aSecretVersion using automatic replication.
Only populated if the parentSecret has an automatic replication policy.
| Fields | |
|---|---|
customer_managed_encryption |
Output only. The customer-managed encryption status of the |
UserManagedStatus
The replication status of aSecretVersion using user-managed replication.
Only populated if the parentSecret has a user-managed replication policy.
| Fields | |
|---|---|
replicas[] | Output only. The list of replica statuses for the |
ReplicaStatus
Describes the status of a user-managed replica for theSecretVersion.
| Fields | |
|---|---|
location |
Output only. The canonical ID of the replica location. For example: |
customer_managed_encryption |
Output only. The customer-managed encryption status of the |
Rotation
The rotation time and period for aSecret. At next_rotation_time, Secret Manager will send a Pub/Sub notification to the topics configured on the Secret.Secret.topics must be set to configure rotation.
| Fields | |
|---|---|
next_rotation_time | Optional. Timestamp in UTC at which the
|
rotation_period | Input only. The Duration between rotation notifications. Must be in seconds and at least 3600s (1h) and at most 3153600000s (100 years). If |
Secret
ASecret is a logical secret whose value and versions can be accessed.
ASecret is made up of zero or moreSecretVersions that represent the secret data.
| Fields | |
|---|---|
name |
Output only. The resource name of the |
replication | Optional. Immutable. The replication policy of the secret data attached to the The replication policy cannot be changed after the Secret has been created. |
create_time | Output only. The time at which the |
labels |
The labels assigned to this Secret. Label keys must be between 1 and 63 characters long, have a UTF-8 encoding of maximum 128 bytes, and must conform to the following PCRE regular expression: Label values must be between 0 and 63 characters long, have a UTF-8 encoding of maximum 128 bytes, and must conform to the following PCRE regular expression: No more than 64 labels can be assigned to a given resource. |
topics[] | Optional. A list of up to 10 Pub/Sub topics to which messages are published when control plane operations are called on the secret or its versions. |
etag |
Optional. Etag of the currently stored |
rotation | Optional. Rotation policy attached to the |
version_aliases |
Optional. Mapping from version alias to version name. A version alias is a string with a maximum length of 63 characters and can contain uppercase and lowercase letters, numerals, and the hyphen ( Version-Alias pairs will be viewable via GetSecret and modifiable via UpdateSecret. Access by alias is only be supported on GetSecretVersion and AccessSecretVersion. |
annotations |
Optional. Custom metadata about the secret. Annotations are distinct from various forms of labels. Annotations exist to allow client tools to store their own state information without requiring a database. Annotation keys must be between 1 and 63 characters long, have a UTF-8 encoding of maximum 128 bytes, begin and end with an alphanumeric character ([a-z0-9A-Z]), and may have dashes (-), underscores (_), dots (.), and alphanumerics in between these symbols. The total size of annotation keys and values must be less than 16KiB. |
version_destroy_ttl | Optional. Secret Version TTL after destruction request This is a part of the Delayed secret version destroy feature. For secret with TTL>0, version destruction doesn't happen immediately on calling destroy instead the version goes to a disabled state and destruction happens after the TTL expires. |
customer_managed_encryption | Optional. The customer-managed encryption configuration of the regionalized secrets. If no configuration is provided, Google-managed default encryption is used. Updates to the |
Union field Expiration isnot the recommended way to set time-based permissions.IAM Conditions is recommended for granting time-based permissions because the operation can be reversed. | |
expire_time | Optional. Timestamp in UTC when the |
ttl | Input only. The TTL for the |
SecretPayload
A secret payload resource in the Secret Manager API. This contains the sensitive secret payload that is associated with aSecretVersion.
| Fields | |
|---|---|
data |
The secret data. Must be no larger than 64KiB. |
data_crc32c |
Optional. If specified, The CRC32C value is encoded as a Int64 for compatibility, and can be safely downconverted to uint32 in languages that support this type.https://cloud.google.com/apis/design/design_patterns#integer_types |
SecretVersion
A secret version resource in the Secret Manager API.
| Fields | |
|---|---|
name |
Output only. The resource name of the
|
create_time | Output only. The time at which the |
destroy_time | Output only. The time this |
state | Output only. The current state of the |
replication_status | The replication status of the |
etag |
Output only. Etag of the currently stored |
client_specified_payload_checksum |
Output only. True if payload checksum specified in |
scheduled_destroy_time | Optional. Output only. Scheduled destroy time for secret version. This is a part of the Delayed secret version destroy feature. For a Secret with a valid version destroy TTL, when a secert version is destroyed, version is moved to disabled state and it is scheduled for destruction Version is destroyed only after the scheduled_destroy_time. |
customer_managed_encryption |
Output only. The customer-managed encryption status of the |
State
The state of aSecretVersion, indicating if it can be accessed.
| Enums | |
|---|---|
STATE_UNSPECIFIED | Not specified. This value is unused and invalid. |
ENABLED | TheSecretVersion may be accessed. |
DISABLED | TheSecretVersion may not be accessed, but the secret data is still available and can be placed back into theENABLED state. |
DESTROYED | TheSecretVersion is destroyed and the secret data is no longer stored. A version may not leave this state once entered. |
Topic
A Pub/Sub topic which Secret Manager will publish to when control plane events occur on this secret.
| Fields | |
|---|---|
name |
Identifier. The resource name of the Pub/Sub topic that will be published to, in the following format: |
UpdateSecretRequest
Request message forSecretManagerService.UpdateSecret.
| Fields | |
|---|---|
secret | Required. Authorization requires the followingIAM permission on the specified resource
|
update_mask | Required. Specifies the fields to be updated. |
Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2025-05-14 UTC.