generated.proto 6.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201
  1. /*
  2. Copyright The Kubernetes Authors.
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. // This file was autogenerated by go-to-protobuf. Do not edit it manually!
  14. syntax = "proto2";
  15. package k8s.io.api.certificates.v1beta1;
  16. import "k8s.io/api/core/v1/generated.proto";
  17. import "k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto";
  18. import "k8s.io/apimachinery/pkg/runtime/generated.proto";
  19. import "k8s.io/apimachinery/pkg/runtime/schema/generated.proto";
  20. // Package-wide variables from generator "generated".
  21. option go_package = "k8s.io/api/certificates/v1beta1";
  22. // Describes a certificate signing request
  23. message CertificateSigningRequest {
  24. // +optional
  25. optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
  26. // spec contains the certificate request, and is immutable after creation.
  27. // Only the request, signerName, expirationSeconds, and usages fields can be set on creation.
  28. // Other fields are derived by Kubernetes and cannot be modified by users.
  29. optional CertificateSigningRequestSpec spec = 2;
  30. // Derived information about the request.
  31. // +optional
  32. optional CertificateSigningRequestStatus status = 3;
  33. }
  34. message CertificateSigningRequestCondition {
  35. // type of the condition. Known conditions include "Approved", "Denied", and "Failed".
  36. optional string type = 1;
  37. // Status of the condition, one of True, False, Unknown.
  38. // Approved, Denied, and Failed conditions may not be "False" or "Unknown".
  39. // Defaults to "True".
  40. // If unset, should be treated as "True".
  41. // +optional
  42. optional string status = 6;
  43. // brief reason for the request state
  44. // +optional
  45. optional string reason = 2;
  46. // human readable message with details about the request state
  47. // +optional
  48. optional string message = 3;
  49. // timestamp for the last update to this condition
  50. // +optional
  51. optional k8s.io.apimachinery.pkg.apis.meta.v1.Time lastUpdateTime = 4;
  52. // lastTransitionTime is the time the condition last transitioned from one status to another.
  53. // If unset, when a new condition type is added or an existing condition's status is changed,
  54. // the server defaults this to the current time.
  55. // +optional
  56. optional k8s.io.apimachinery.pkg.apis.meta.v1.Time lastTransitionTime = 5;
  57. }
  58. message CertificateSigningRequestList {
  59. // +optional
  60. optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1;
  61. repeated CertificateSigningRequest items = 2;
  62. }
  63. // CertificateSigningRequestSpec contains the certificate request.
  64. message CertificateSigningRequestSpec {
  65. // Base64-encoded PKCS#10 CSR data
  66. // +listType=atomic
  67. optional bytes request = 1;
  68. // Requested signer for the request. It is a qualified name in the form:
  69. // `scope-hostname.io/name`.
  70. // If empty, it will be defaulted:
  71. // 1. If it's a kubelet client certificate, it is assigned
  72. // "kubernetes.io/kube-apiserver-client-kubelet".
  73. // 2. If it's a kubelet serving certificate, it is assigned
  74. // "kubernetes.io/kubelet-serving".
  75. // 3. Otherwise, it is assigned "kubernetes.io/legacy-unknown".
  76. // Distribution of trust for signers happens out of band.
  77. // You can select on this field using `spec.signerName`.
  78. // +optional
  79. optional string signerName = 7;
  80. // expirationSeconds is the requested duration of validity of the issued
  81. // certificate. The certificate signer may issue a certificate with a different
  82. // validity duration so a client must check the delta between the notBefore and
  83. // and notAfter fields in the issued certificate to determine the actual duration.
  84. //
  85. // The v1.22+ in-tree implementations of the well-known Kubernetes signers will
  86. // honor this field as long as the requested duration is not greater than the
  87. // maximum duration they will honor per the --cluster-signing-duration CLI
  88. // flag to the Kubernetes controller manager.
  89. //
  90. // Certificate signers may not honor this field for various reasons:
  91. //
  92. // 1. Old signer that is unaware of the field (such as the in-tree
  93. // implementations prior to v1.22)
  94. // 2. Signer whose configured maximum is shorter than the requested duration
  95. // 3. Signer whose configured minimum is longer than the requested duration
  96. //
  97. // The minimum valid value for expirationSeconds is 600, i.e. 10 minutes.
  98. //
  99. // +optional
  100. optional int32 expirationSeconds = 8;
  101. // allowedUsages specifies a set of usage contexts the key will be
  102. // valid for.
  103. // See:
  104. // https://tools.ietf.org/html/rfc5280#section-4.2.1.3
  105. // https://tools.ietf.org/html/rfc5280#section-4.2.1.12
  106. //
  107. // Valid values are:
  108. // "signing",
  109. // "digital signature",
  110. // "content commitment",
  111. // "key encipherment",
  112. // "key agreement",
  113. // "data encipherment",
  114. // "cert sign",
  115. // "crl sign",
  116. // "encipher only",
  117. // "decipher only",
  118. // "any",
  119. // "server auth",
  120. // "client auth",
  121. // "code signing",
  122. // "email protection",
  123. // "s/mime",
  124. // "ipsec end system",
  125. // "ipsec tunnel",
  126. // "ipsec user",
  127. // "timestamping",
  128. // "ocsp signing",
  129. // "microsoft sgc",
  130. // "netscape sgc"
  131. // +listType=atomic
  132. repeated string usages = 5;
  133. // Information about the requesting user.
  134. // See user.Info interface for details.
  135. // +optional
  136. optional string username = 2;
  137. // UID information about the requesting user.
  138. // See user.Info interface for details.
  139. // +optional
  140. optional string uid = 3;
  141. // Group information about the requesting user.
  142. // See user.Info interface for details.
  143. // +listType=atomic
  144. // +optional
  145. repeated string groups = 4;
  146. // Extra information about the requesting user.
  147. // See user.Info interface for details.
  148. // +optional
  149. map<string, ExtraValue> extra = 6;
  150. }
  151. message CertificateSigningRequestStatus {
  152. // Conditions applied to the request, such as approval or denial.
  153. // +listType=map
  154. // +listMapKey=type
  155. // +optional
  156. repeated CertificateSigningRequestCondition conditions = 1;
  157. // If request was approved, the controller will place the issued certificate here.
  158. // +listType=atomic
  159. // +optional
  160. optional bytes certificate = 2;
  161. }
  162. // ExtraValue masks the value so protobuf can generate
  163. // +protobuf.nullable=true
  164. // +protobuf.options.(gogoproto.goproto_stringer)=false
  165. message ExtraValue {
  166. // items, if empty, will result in an empty slice
  167. repeated string items = 1;
  168. }