Documentation ¶
Overview ¶
Package istio_v1_auth is a generated protocol buffer package.
It is generated from these files:
security/proto/ca_service.proto
It has these top-level messages:
Request Response
Index ¶
- Variables
- func RegisterIstioCAServiceServer(s *grpc.Server, srv IstioCAServiceServer)
- type IstioCAServiceClient
- type IstioCAServiceServer
- type Request
- func (*Request) Descriptor() ([]byte, []int)
- func (m *Request) Marshal() (dAtA []byte, err error)
- func (m *Request) MarshalTo(dAtA []byte) (int, error)
- func (*Request) ProtoMessage()
- func (m *Request) Reset()
- func (m *Request) Size() (n int)
- func (this *Request) String() string
- func (m *Request) Unmarshal(dAtA []byte) error
- type Response
- func (*Response) Descriptor() ([]byte, []int)
- func (m *Response) Marshal() (dAtA []byte, err error)
- func (m *Response) MarshalTo(dAtA []byte) (int, error)
- func (*Response) ProtoMessage()
- func (m *Response) Reset()
- func (m *Response) Size() (n int)
- func (this *Response) String() string
- func (m *Response) Unmarshal(dAtA []byte) error
Constants ¶
This section is empty.
Variables ¶
View Source
var ( ErrInvalidLengthCaService = fmt.Errorf("proto: negative length found during unmarshaling") ErrIntOverflowCaService = fmt.Errorf("proto: integer overflow") )
Functions ¶
func RegisterIstioCAServiceServer ¶
func RegisterIstioCAServiceServer(s *grpc.Server, srv IstioCAServiceServer)
Types ¶
type IstioCAServiceClient ¶
type IstioCAServiceClient interface { // A request object includes a PEM-encoded certificate signing request that // is generated on the Node Agent. Additionaly credential can be attached // within the request object for a server to authenticate the originating // node agent. HandleCSR(ctx context.Context, in *Request, opts ...grpc.CallOption) (*Response, error) }
func NewIstioCAServiceClient ¶
func NewIstioCAServiceClient(cc *grpc.ClientConn) IstioCAServiceClient
type IstioCAServiceServer ¶
type IstioCAServiceServer interface { // A request object includes a PEM-encoded certificate signing request that // is generated on the Node Agent. Additionaly credential can be attached // within the request object for a server to authenticate the originating // node agent. HandleCSR(context.Context, *Request) (*Response, error) }
type Request ¶
type Request struct { // PEM-encoded certificate signing request CsrPem []byte `protobuf:"bytes,1,opt,name=csr_pem,json=csrPem,proto3" json:"csr_pem,omitempty"` // opaque credential for node agent NodeAgentCredential []byte `protobuf:"bytes,2,opt,name=node_agent_credential,json=nodeAgentCredential,proto3" json:"node_agent_credential,omitempty"` // type of the node_agent_credential (aws/gcp/onprem/custom...) CredentialType string `protobuf:"bytes,3,opt,name=credential_type,json=credentialType,proto3" json:"credential_type,omitempty"` }
func (*Request) Descriptor ¶
func (*Request) ProtoMessage ¶
func (*Request) ProtoMessage()
type Response ¶
type Response struct { IsApproved bool `protobuf:"varint,1,opt,name=is_approved,json=isApproved,proto3" json:"is_approved,omitempty"` Status *google_rpc.Status `protobuf:"bytes,2,opt,name=status" json:"status,omitempty"` SignedCertChain []byte `protobuf:"bytes,3,opt,name=signed_cert_chain,json=signedCertChain,proto3" json:"signed_cert_chain,omitempty"` }
func (*Response) Descriptor ¶
func (*Response) ProtoMessage ¶
func (*Response) ProtoMessage()
Click to show internal directories.
Click to hide internal directories.