Documentation ¶
Index ¶
- Constants
- Variables
- func Backend(conf *logical.BackendConfig) *backend
- func CBDelete(b *backend, s logical.Storage, path string) (*logical.Response, error)
- func CBList(b *backend, s logical.Storage, path string) (*logical.Response, error)
- func CBPatch(b *backend, s logical.Storage, path string, data map[string]interface{}) (*logical.Response, error)
- func CBRead(b *backend, s logical.Storage, path string) (*logical.Response, error)
- func CBReq(b *backend, s logical.Storage, operation logical.Operation, path string, ...) (*logical.Response, error)
- func CBWrite(b *backend, s logical.Storage, path string, data map[string]interface{}) (*logical.Response, error)
- func Factory(ctx context.Context, conf *logical.BackendConfig) (logical.Backend, error)
- func NewIssuerUsageFromNames(names []string) (issuerUsage, error)
- type IfModifiedSinceHelper
- type NameKey
- type UUIDKey
Constants ¶
View Source
const ( IssuerRefNotFound = issuerID("not-found") KeyRefNotFound = keyID("not-found") )
View Source
const ( ReadOnlyUsage issuerUsage = iota IssuanceUsage issuerUsage = 1 << iota CRLSigningUsage issuerUsage = 1 << iota OCSPSigningUsage issuerUsage = 1 << iota // When adding a new usage in the future, we'll need to create a usage // mask field on the IssuerEntry and handle migrations to a newer mask, // inferring a value for the new bits. AllIssuerUsages = ReadOnlyUsage | IssuanceUsage | CRLSigningUsage | OCSPSigningUsage )
View Source
const SecretCertsType = "pki"
SecretCertsType is the name used to identify this type
Variables ¶
View Source
var ( string]interface{}{ logical.HTTPContentType: ocspResponseContentType, logical.HTTPStatusCode: http.StatusUnauthorized, logical.HTTPRawBody: ocsp.UnauthorizedErrorResponse, }, } OcspMalformedResponse = &logical.Response{ Data: map[string]interface{}{ logical.HTTPContentType: ocspResponseContentType, logical.HTTPStatusCode: http.StatusBadRequest, logical.HTTPRawBody: ocsp.MalformedRequestErrorResponse, }, } OcspInternalErrorResponse = &logical.Response{ Data: map[string]interface{}{ logical.HTTPContentType: ocspResponseContentType, logical.HTTPStatusCode: http.StatusInternalServerError, logical.HTTPRawBody: ocsp.InternalErrorErrorResponse, }, } ErrMissingOcspUsage = errors.New("issuer entry did not have the OCSPSigning usage") ErrIssuerHasNoKey = errors.New("issuer has no key") ErrUnknownIssuer = errors.New("unknown issuer") )Data: map[
These response variables should not be mutated, instead treat them as constants
Functions ¶
func Backend ¶
func Backend(conf *logical.BackendConfig) *backend
Backend returns a new Backend framework struct
func CBReq ¶
func CBReq(b *backend, s logical.Storage, operation logical.Operation, path string, data map[string]interface{}) (*logical.Response, error)
Direct storage backend helpers (b, s := createBackendWithStorage(t)) which are mostly compatible with client.Logical() operations. The main difference is that the JSON round-tripping hasn't occurred, so values are as the backend returns them (e.g., []string instead of []interface{}).
func NewIssuerUsageFromNames ¶
Types ¶
type IfModifiedSinceHelper ¶
type IfModifiedSinceHelper struct {
// contains filtered or unexported fields
}
Source Files ¶
- backend.go
- ca_util.go
- cert_util.go
- chain_util.go
- config_util.go
- crl_util.go
- fields.go
- key_util.go
- managed_key_util.go
- ocsp.go
- path_config_ca.go
- path_config_crl.go
- path_config_urls.go
- path_fetch.go
- path_fetch_issuers.go
- path_fetch_keys.go
- path_intermediate.go
- path_issue_sign.go
- path_manage_issuers.go
- path_manage_keys.go
- path_revoke.go
- path_roles.go
- path_root.go
- path_sign_issuers.go
- path_tidy.go
- secret_certs.go
- storage.go
- storage_migrations.go
- test_helpers.go
- util.go
Click to show internal directories.
Click to hide internal directories.