| /* |
| Copyright The Kubernetes Authors. |
| |
| Licensed under the Apache License, Version 2.0 (the "License"); |
| you may not use this file except in compliance with the License. |
| You may obtain a copy of the License at |
| |
| http://www.apache.org/licenses/LICENSE-2.0 |
| |
| Unless required by applicable law or agreed to in writing, software |
| distributed under the License is distributed on an "AS IS" BASIS, |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| See the License for the specific language governing permissions and |
| limitations under the License. |
| */ |
| |
| |
| // This file was autogenerated by go-to-protobuf. Do not edit it manually! |
| |
| syntax = 'proto2'; |
| |
| package k8s.io.api.certificates.v1beta1; |
| |
| import "k8s.io/api/core/v1/generated.proto"; |
| import "k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto"; |
| import "k8s.io/apimachinery/pkg/runtime/generated.proto"; |
| import "k8s.io/apimachinery/pkg/runtime/schema/generated.proto"; |
| |
| // Package-wide variables from generator "generated". |
| option go_package = "v1beta1"; |
| |
| // Describes a certificate signing request |
| message CertificateSigningRequest { |
| // +optional |
| optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1; |
| |
| // The certificate request itself and any additional information. |
| // +optional |
| optional CertificateSigningRequestSpec spec = 2; |
| |
| // Derived information about the request. |
| // +optional |
| optional CertificateSigningRequestStatus status = 3; |
| } |
| |
| message CertificateSigningRequestCondition { |
| // type of the condition. Known conditions include "Approved", "Denied", and "Failed". |
| optional string type = 1; |
| |
| // Status of the condition, one of True, False, Unknown. |
| // Approved, Denied, and Failed conditions may not be "False" or "Unknown". |
| // Defaults to "True". |
| // If unset, should be treated as "True". |
| // +optional |
| optional string status = 6; |
| |
| // brief reason for the request state |
| // +optional |
| optional string reason = 2; |
| |
| // human readable message with details about the request state |
| // +optional |
| optional string message = 3; |
| |
| // timestamp for the last update to this condition |
| // +optional |
| optional k8s.io.apimachinery.pkg.apis.meta.v1.Time lastUpdateTime = 4; |
| |
| // lastTransitionTime is the time the condition last transitioned from one status to another. |
| // If unset, when a new condition type is added or an existing condition's status is changed, |
| // the server defaults this to the current time. |
| // +optional |
| optional k8s.io.apimachinery.pkg.apis.meta.v1.Time lastTransitionTime = 5; |
| } |
| |
| message CertificateSigningRequestList { |
| // +optional |
| optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; |
| |
| repeated CertificateSigningRequest items = 2; |
| } |
| |
| // This information is immutable after the request is created. Only the Request |
| // and Usages fields can be set on creation, other fields are derived by |
| // Kubernetes and cannot be modified by users. |
| message CertificateSigningRequestSpec { |
| // Base64-encoded PKCS#10 CSR data |
| // +listType=atomic |
| optional bytes request = 1; |
| |
| // Requested signer for the request. It is a qualified name in the form: |
| // `scope-hostname.io/name`. |
| // If empty, it will be defaulted: |
| // 1. If it's a kubelet client certificate, it is assigned |
| // "kubernetes.io/kube-apiserver-client-kubelet". |
| // 2. If it's a kubelet serving certificate, it is assigned |
| // "kubernetes.io/kubelet-serving". |
| // 3. Otherwise, it is assigned "kubernetes.io/legacy-unknown". |
| // Distribution of trust for signers happens out of band. |
| // You can select on this field using `spec.signerName`. |
| // +optional |
| optional string signerName = 7; |
| |
| // allowedUsages specifies a set of usage contexts the key will be |
| // valid for. |
| // See: https://tools.ietf.org/html/rfc5280#section-4.2.1.3 |
| // https://tools.ietf.org/html/rfc5280#section-4.2.1.12 |
| // Valid values are: |
| // "signing", |
| // "digital signature", |
| // "content commitment", |
| // "key encipherment", |
| // "key agreement", |
| // "data encipherment", |
| // "cert sign", |
| // "crl sign", |
| // "encipher only", |
| // "decipher only", |
| // "any", |
| // "server auth", |
| // "client auth", |
| // "code signing", |
| // "email protection", |
| // "s/mime", |
| // "ipsec end system", |
| // "ipsec tunnel", |
| // "ipsec user", |
| // "timestamping", |
| // "ocsp signing", |
| // "microsoft sgc", |
| // "netscape sgc" |
| // +listType=atomic |
| repeated string usages = 5; |
| |
| // Information about the requesting user. |
| // See user.Info interface for details. |
| // +optional |
| optional string username = 2; |
| |
| // UID information about the requesting user. |
| // See user.Info interface for details. |
| // +optional |
| optional string uid = 3; |
| |
| // Group information about the requesting user. |
| // See user.Info interface for details. |
| // +listType=atomic |
| // +optional |
| repeated string groups = 4; |
| |
| // Extra information about the requesting user. |
| // See user.Info interface for details. |
| // +optional |
| map<string, ExtraValue> extra = 6; |
| } |
| |
| message CertificateSigningRequestStatus { |
| // Conditions applied to the request, such as approval or denial. |
| // +listType=map |
| // +listMapKey=type |
| // +optional |
| repeated CertificateSigningRequestCondition conditions = 1; |
| |
| // If request was approved, the controller will place the issued certificate here. |
| // +listType=atomic |
| // +optional |
| optional bytes certificate = 2; |
| } |
| |
| // ExtraValue masks the value so protobuf can generate |
| // +protobuf.nullable=true |
| // +protobuf.options.(gogoproto.goproto_stringer)=false |
| message ExtraValue { |
| // items, if empty, will result in an empty slice |
| |
| repeated string items = 1; |
| } |
| |