mirror of
https://github.com/ceph/ceph-csi.git
synced 2024-11-10 08:20:23 +00:00
543 lines
21 KiB
Go
543 lines
21 KiB
Go
|
/*
|
||
|
Copyright The Kubernetes Authors.
|
||
|
|
||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
you may not use this file except in compliance with the License.
|
||
|
You may obtain a copy of the License at
|
||
|
|
||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||
|
|
||
|
Unless required by applicable law or agreed to in writing, software
|
||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
See the License for the specific language governing permissions and
|
||
|
limitations under the License.
|
||
|
*/
|
||
|
|
||
|
// Code generated by protoc-gen-gogo. DO NOT EDIT.
|
||
|
// source: api.proto
|
||
|
|
||
|
package v2alpha1
|
||
|
|
||
|
import (
|
||
|
context "context"
|
||
|
fmt "fmt"
|
||
|
proto "github.com/gogo/protobuf/proto"
|
||
|
grpc "google.golang.org/grpc"
|
||
|
codes "google.golang.org/grpc/codes"
|
||
|
status "google.golang.org/grpc/status"
|
||
|
math "math"
|
||
|
)
|
||
|
|
||
|
// Reference imports to suppress errors if they are not otherwise used.
|
||
|
var _ = proto.Marshal
|
||
|
var _ = fmt.Errorf
|
||
|
var _ = math.Inf
|
||
|
|
||
|
// This is a compile-time assertion to ensure that this generated file
|
||
|
// is compatible with the proto package it is being compiled against.
|
||
|
// A compilation error at this line likely means your copy of the
|
||
|
// proto package needs to be updated.
|
||
|
const _ = proto.GoGoProtoPackageIsVersion3 // please upgrade the proto package
|
||
|
|
||
|
type StatusRequest struct {
|
||
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
||
|
XXX_unrecognized []byte `json:"-"`
|
||
|
XXX_sizecache int32 `json:"-"`
|
||
|
}
|
||
|
|
||
|
func (m *StatusRequest) Reset() { *m = StatusRequest{} }
|
||
|
func (m *StatusRequest) String() string { return proto.CompactTextString(m) }
|
||
|
func (*StatusRequest) ProtoMessage() {}
|
||
|
func (*StatusRequest) Descriptor() ([]byte, []int) {
|
||
|
return fileDescriptor_00212fb1f9d3bf1c, []int{0}
|
||
|
}
|
||
|
func (m *StatusRequest) XXX_Unmarshal(b []byte) error {
|
||
|
return xxx_messageInfo_StatusRequest.Unmarshal(m, b)
|
||
|
}
|
||
|
func (m *StatusRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
||
|
return xxx_messageInfo_StatusRequest.Marshal(b, m, deterministic)
|
||
|
}
|
||
|
func (m *StatusRequest) XXX_Merge(src proto.Message) {
|
||
|
xxx_messageInfo_StatusRequest.Merge(m, src)
|
||
|
}
|
||
|
func (m *StatusRequest) XXX_Size() int {
|
||
|
return xxx_messageInfo_StatusRequest.Size(m)
|
||
|
}
|
||
|
func (m *StatusRequest) XXX_DiscardUnknown() {
|
||
|
xxx_messageInfo_StatusRequest.DiscardUnknown(m)
|
||
|
}
|
||
|
|
||
|
var xxx_messageInfo_StatusRequest proto.InternalMessageInfo
|
||
|
|
||
|
type StatusResponse struct {
|
||
|
// Version of the KMS plugin API. Must match the configured .resources[].providers[].kms.apiVersion
|
||
|
Version string `protobuf:"bytes,1,opt,name=version,proto3" json:"version,omitempty"`
|
||
|
// Any value other than "ok" is failing healthz. On failure, the associated API server healthz endpoint will contain this value as part of the error message.
|
||
|
Healthz string `protobuf:"bytes,2,opt,name=healthz,proto3" json:"healthz,omitempty"`
|
||
|
// the current write key, used to determine staleness of data updated via value.Transformer.TransformFromStorage.
|
||
|
KeyId string `protobuf:"bytes,3,opt,name=key_id,json=keyId,proto3" json:"key_id,omitempty"`
|
||
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
||
|
XXX_unrecognized []byte `json:"-"`
|
||
|
XXX_sizecache int32 `json:"-"`
|
||
|
}
|
||
|
|
||
|
func (m *StatusResponse) Reset() { *m = StatusResponse{} }
|
||
|
func (m *StatusResponse) String() string { return proto.CompactTextString(m) }
|
||
|
func (*StatusResponse) ProtoMessage() {}
|
||
|
func (*StatusResponse) Descriptor() ([]byte, []int) {
|
||
|
return fileDescriptor_00212fb1f9d3bf1c, []int{1}
|
||
|
}
|
||
|
func (m *StatusResponse) XXX_Unmarshal(b []byte) error {
|
||
|
return xxx_messageInfo_StatusResponse.Unmarshal(m, b)
|
||
|
}
|
||
|
func (m *StatusResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
||
|
return xxx_messageInfo_StatusResponse.Marshal(b, m, deterministic)
|
||
|
}
|
||
|
func (m *StatusResponse) XXX_Merge(src proto.Message) {
|
||
|
xxx_messageInfo_StatusResponse.Merge(m, src)
|
||
|
}
|
||
|
func (m *StatusResponse) XXX_Size() int {
|
||
|
return xxx_messageInfo_StatusResponse.Size(m)
|
||
|
}
|
||
|
func (m *StatusResponse) XXX_DiscardUnknown() {
|
||
|
xxx_messageInfo_StatusResponse.DiscardUnknown(m)
|
||
|
}
|
||
|
|
||
|
var xxx_messageInfo_StatusResponse proto.InternalMessageInfo
|
||
|
|
||
|
func (m *StatusResponse) GetVersion() string {
|
||
|
if m != nil {
|
||
|
return m.Version
|
||
|
}
|
||
|
return ""
|
||
|
}
|
||
|
|
||
|
func (m *StatusResponse) GetHealthz() string {
|
||
|
if m != nil {
|
||
|
return m.Healthz
|
||
|
}
|
||
|
return ""
|
||
|
}
|
||
|
|
||
|
func (m *StatusResponse) GetKeyId() string {
|
||
|
if m != nil {
|
||
|
return m.KeyId
|
||
|
}
|
||
|
return ""
|
||
|
}
|
||
|
|
||
|
type DecryptRequest struct {
|
||
|
// The data to be decrypted.
|
||
|
Ciphertext []byte `protobuf:"bytes,1,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"`
|
||
|
// UID is a unique identifier for the request.
|
||
|
Uid string `protobuf:"bytes,2,opt,name=uid,proto3" json:"uid,omitempty"`
|
||
|
// The keyID that was provided to the apiserver during encryption.
|
||
|
// This represents the KMS KEK that was used to encrypt the data.
|
||
|
KeyId string `protobuf:"bytes,3,opt,name=key_id,json=keyId,proto3" json:"key_id,omitempty"`
|
||
|
// Additional metadata that was sent by the KMS plugin during encryption.
|
||
|
Annotations map[string][]byte `protobuf:"bytes,4,rep,name=annotations,proto3" json:"annotations,omitempty" protobuf_key:"bytes,1,opt,name=key,proto3" protobuf_val:"bytes,2,opt,name=value,proto3"`
|
||
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
||
|
XXX_unrecognized []byte `json:"-"`
|
||
|
XXX_sizecache int32 `json:"-"`
|
||
|
}
|
||
|
|
||
|
func (m *DecryptRequest) Reset() { *m = DecryptRequest{} }
|
||
|
func (m *DecryptRequest) String() string { return proto.CompactTextString(m) }
|
||
|
func (*DecryptRequest) ProtoMessage() {}
|
||
|
func (*DecryptRequest) Descriptor() ([]byte, []int) {
|
||
|
return fileDescriptor_00212fb1f9d3bf1c, []int{2}
|
||
|
}
|
||
|
func (m *DecryptRequest) XXX_Unmarshal(b []byte) error {
|
||
|
return xxx_messageInfo_DecryptRequest.Unmarshal(m, b)
|
||
|
}
|
||
|
func (m *DecryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
||
|
return xxx_messageInfo_DecryptRequest.Marshal(b, m, deterministic)
|
||
|
}
|
||
|
func (m *DecryptRequest) XXX_Merge(src proto.Message) {
|
||
|
xxx_messageInfo_DecryptRequest.Merge(m, src)
|
||
|
}
|
||
|
func (m *DecryptRequest) XXX_Size() int {
|
||
|
return xxx_messageInfo_DecryptRequest.Size(m)
|
||
|
}
|
||
|
func (m *DecryptRequest) XXX_DiscardUnknown() {
|
||
|
xxx_messageInfo_DecryptRequest.DiscardUnknown(m)
|
||
|
}
|
||
|
|
||
|
var xxx_messageInfo_DecryptRequest proto.InternalMessageInfo
|
||
|
|
||
|
func (m *DecryptRequest) GetCiphertext() []byte {
|
||
|
if m != nil {
|
||
|
return m.Ciphertext
|
||
|
}
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (m *DecryptRequest) GetUid() string {
|
||
|
if m != nil {
|
||
|
return m.Uid
|
||
|
}
|
||
|
return ""
|
||
|
}
|
||
|
|
||
|
func (m *DecryptRequest) GetKeyId() string {
|
||
|
if m != nil {
|
||
|
return m.KeyId
|
||
|
}
|
||
|
return ""
|
||
|
}
|
||
|
|
||
|
func (m *DecryptRequest) GetAnnotations() map[string][]byte {
|
||
|
if m != nil {
|
||
|
return m.Annotations
|
||
|
}
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
type DecryptResponse struct {
|
||
|
// The decrypted data.
|
||
|
Plaintext []byte `protobuf:"bytes,1,opt,name=plaintext,proto3" json:"plaintext,omitempty"`
|
||
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
||
|
XXX_unrecognized []byte `json:"-"`
|
||
|
XXX_sizecache int32 `json:"-"`
|
||
|
}
|
||
|
|
||
|
func (m *DecryptResponse) Reset() { *m = DecryptResponse{} }
|
||
|
func (m *DecryptResponse) String() string { return proto.CompactTextString(m) }
|
||
|
func (*DecryptResponse) ProtoMessage() {}
|
||
|
func (*DecryptResponse) Descriptor() ([]byte, []int) {
|
||
|
return fileDescriptor_00212fb1f9d3bf1c, []int{3}
|
||
|
}
|
||
|
func (m *DecryptResponse) XXX_Unmarshal(b []byte) error {
|
||
|
return xxx_messageInfo_DecryptResponse.Unmarshal(m, b)
|
||
|
}
|
||
|
func (m *DecryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
||
|
return xxx_messageInfo_DecryptResponse.Marshal(b, m, deterministic)
|
||
|
}
|
||
|
func (m *DecryptResponse) XXX_Merge(src proto.Message) {
|
||
|
xxx_messageInfo_DecryptResponse.Merge(m, src)
|
||
|
}
|
||
|
func (m *DecryptResponse) XXX_Size() int {
|
||
|
return xxx_messageInfo_DecryptResponse.Size(m)
|
||
|
}
|
||
|
func (m *DecryptResponse) XXX_DiscardUnknown() {
|
||
|
xxx_messageInfo_DecryptResponse.DiscardUnknown(m)
|
||
|
}
|
||
|
|
||
|
var xxx_messageInfo_DecryptResponse proto.InternalMessageInfo
|
||
|
|
||
|
func (m *DecryptResponse) GetPlaintext() []byte {
|
||
|
if m != nil {
|
||
|
return m.Plaintext
|
||
|
}
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
type EncryptRequest struct {
|
||
|
// The data to be encrypted.
|
||
|
Plaintext []byte `protobuf:"bytes,1,opt,name=plaintext,proto3" json:"plaintext,omitempty"`
|
||
|
// UID is a unique identifier for the request.
|
||
|
Uid string `protobuf:"bytes,2,opt,name=uid,proto3" json:"uid,omitempty"`
|
||
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
||
|
XXX_unrecognized []byte `json:"-"`
|
||
|
XXX_sizecache int32 `json:"-"`
|
||
|
}
|
||
|
|
||
|
func (m *EncryptRequest) Reset() { *m = EncryptRequest{} }
|
||
|
func (m *EncryptRequest) String() string { return proto.CompactTextString(m) }
|
||
|
func (*EncryptRequest) ProtoMessage() {}
|
||
|
func (*EncryptRequest) Descriptor() ([]byte, []int) {
|
||
|
return fileDescriptor_00212fb1f9d3bf1c, []int{4}
|
||
|
}
|
||
|
func (m *EncryptRequest) XXX_Unmarshal(b []byte) error {
|
||
|
return xxx_messageInfo_EncryptRequest.Unmarshal(m, b)
|
||
|
}
|
||
|
func (m *EncryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
||
|
return xxx_messageInfo_EncryptRequest.Marshal(b, m, deterministic)
|
||
|
}
|
||
|
func (m *EncryptRequest) XXX_Merge(src proto.Message) {
|
||
|
xxx_messageInfo_EncryptRequest.Merge(m, src)
|
||
|
}
|
||
|
func (m *EncryptRequest) XXX_Size() int {
|
||
|
return xxx_messageInfo_EncryptRequest.Size(m)
|
||
|
}
|
||
|
func (m *EncryptRequest) XXX_DiscardUnknown() {
|
||
|
xxx_messageInfo_EncryptRequest.DiscardUnknown(m)
|
||
|
}
|
||
|
|
||
|
var xxx_messageInfo_EncryptRequest proto.InternalMessageInfo
|
||
|
|
||
|
func (m *EncryptRequest) GetPlaintext() []byte {
|
||
|
if m != nil {
|
||
|
return m.Plaintext
|
||
|
}
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (m *EncryptRequest) GetUid() string {
|
||
|
if m != nil {
|
||
|
return m.Uid
|
||
|
}
|
||
|
return ""
|
||
|
}
|
||
|
|
||
|
type EncryptResponse struct {
|
||
|
// The encrypted data.
|
||
|
Ciphertext []byte `protobuf:"bytes,1,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"`
|
||
|
// The KMS key ID used to encrypt the data. This must always refer to the KMS KEK and not any local KEKs that may be in use.
|
||
|
// This can be used to inform staleness of data updated via value.Transformer.TransformFromStorage.
|
||
|
KeyId string `protobuf:"bytes,2,opt,name=key_id,json=keyId,proto3" json:"key_id,omitempty"`
|
||
|
// Additional metadata to be stored with the encrypted data.
|
||
|
// This metadata can contain the encrypted local KEK that was used to encrypt the DEK.
|
||
|
// This data is stored in plaintext in etcd. KMS plugin implementations are responsible for pre-encrypting any sensitive data.
|
||
|
Annotations map[string][]byte `protobuf:"bytes,3,rep,name=annotations,proto3" json:"annotations,omitempty" protobuf_key:"bytes,1,opt,name=key,proto3" protobuf_val:"bytes,2,opt,name=value,proto3"`
|
||
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
||
|
XXX_unrecognized []byte `json:"-"`
|
||
|
XXX_sizecache int32 `json:"-"`
|
||
|
}
|
||
|
|
||
|
func (m *EncryptResponse) Reset() { *m = EncryptResponse{} }
|
||
|
func (m *EncryptResponse) String() string { return proto.CompactTextString(m) }
|
||
|
func (*EncryptResponse) ProtoMessage() {}
|
||
|
func (*EncryptResponse) Descriptor() ([]byte, []int) {
|
||
|
return fileDescriptor_00212fb1f9d3bf1c, []int{5}
|
||
|
}
|
||
|
func (m *EncryptResponse) XXX_Unmarshal(b []byte) error {
|
||
|
return xxx_messageInfo_EncryptResponse.Unmarshal(m, b)
|
||
|
}
|
||
|
func (m *EncryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
||
|
return xxx_messageInfo_EncryptResponse.Marshal(b, m, deterministic)
|
||
|
}
|
||
|
func (m *EncryptResponse) XXX_Merge(src proto.Message) {
|
||
|
xxx_messageInfo_EncryptResponse.Merge(m, src)
|
||
|
}
|
||
|
func (m *EncryptResponse) XXX_Size() int {
|
||
|
return xxx_messageInfo_EncryptResponse.Size(m)
|
||
|
}
|
||
|
func (m *EncryptResponse) XXX_DiscardUnknown() {
|
||
|
xxx_messageInfo_EncryptResponse.DiscardUnknown(m)
|
||
|
}
|
||
|
|
||
|
var xxx_messageInfo_EncryptResponse proto.InternalMessageInfo
|
||
|
|
||
|
func (m *EncryptResponse) GetCiphertext() []byte {
|
||
|
if m != nil {
|
||
|
return m.Ciphertext
|
||
|
}
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (m *EncryptResponse) GetKeyId() string {
|
||
|
if m != nil {
|
||
|
return m.KeyId
|
||
|
}
|
||
|
return ""
|
||
|
}
|
||
|
|
||
|
func (m *EncryptResponse) GetAnnotations() map[string][]byte {
|
||
|
if m != nil {
|
||
|
return m.Annotations
|
||
|
}
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func init() {
|
||
|
proto.RegisterType((*StatusRequest)(nil), "v2alpha1.StatusRequest")
|
||
|
proto.RegisterType((*StatusResponse)(nil), "v2alpha1.StatusResponse")
|
||
|
proto.RegisterType((*DecryptRequest)(nil), "v2alpha1.DecryptRequest")
|
||
|
proto.RegisterMapType((map[string][]byte)(nil), "v2alpha1.DecryptRequest.AnnotationsEntry")
|
||
|
proto.RegisterType((*DecryptResponse)(nil), "v2alpha1.DecryptResponse")
|
||
|
proto.RegisterType((*EncryptRequest)(nil), "v2alpha1.EncryptRequest")
|
||
|
proto.RegisterType((*EncryptResponse)(nil), "v2alpha1.EncryptResponse")
|
||
|
proto.RegisterMapType((map[string][]byte)(nil), "v2alpha1.EncryptResponse.AnnotationsEntry")
|
||
|
}
|
||
|
|
||
|
func init() { proto.RegisterFile("api.proto", fileDescriptor_00212fb1f9d3bf1c) }
|
||
|
|
||
|
var fileDescriptor_00212fb1f9d3bf1c = []byte{
|
||
|
// 391 bytes of a gzipped FileDescriptorProto
|
||
|
0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xb4, 0x93, 0xcf, 0x4f, 0xe2, 0x40,
|
||
|
0x14, 0xc7, 0x29, 0x5d, 0x60, 0x79, 0xb0, 0x40, 0x26, 0x6c, 0xb6, 0x4b, 0x36, 0x1b, 0x32, 0x27,
|
||
|
0x76, 0x0f, 0xdd, 0x2c, 0x5e, 0x8c, 0x89, 0x06, 0x13, 0x39, 0x18, 0xf4, 0x52, 0x8e, 0x1e, 0xcc,
|
||
|
0x08, 0x2f, 0x76, 0x42, 0x9d, 0xd6, 0x76, 0xda, 0x58, 0xff, 0x50, 0x13, 0xff, 0x01, 0xff, 0x0e,
|
||
|
0xd3, 0x76, 0xa0, 0x2d, 0x88, 0x9e, 0xbc, 0xcd, 0xfb, 0xd1, 0xef, 0xf7, 0xcd, 0x67, 0x5e, 0xa1,
|
||
|
0xc9, 0x3c, 0x6e, 0x7a, 0xbe, 0x2b, 0x5d, 0xf2, 0x35, 0x1a, 0x33, 0xc7, 0xb3, 0xd9, 0x7f, 0xda,
|
||
|
0x85, 0x6f, 0x73, 0xc9, 0x64, 0x18, 0x58, 0x78, 0x1f, 0x62, 0x20, 0xe9, 0x15, 0x74, 0xd6, 0x89,
|
||
|
0xc0, 0x73, 0x45, 0x80, 0xc4, 0x80, 0x46, 0x84, 0x7e, 0xc0, 0x5d, 0x61, 0x68, 0x43, 0x6d, 0xd4,
|
||
|
0xb4, 0xd6, 0x61, 0x52, 0xb1, 0x91, 0x39, 0xd2, 0x7e, 0x34, 0xaa, 0x59, 0x45, 0x85, 0xe4, 0x3b,
|
||
|
0xd4, 0x57, 0x18, 0x5f, 0xf3, 0xa5, 0xa1, 0xa7, 0x85, 0xda, 0x0a, 0xe3, 0xf3, 0x25, 0x7d, 0xd1,
|
||
|
0xa0, 0x73, 0x86, 0x0b, 0x3f, 0xf6, 0xa4, 0xf2, 0x23, 0xbf, 0x01, 0x16, 0xdc, 0xb3, 0xd1, 0x97,
|
||
|
0xf8, 0x20, 0x53, 0x83, 0xb6, 0x55, 0xc8, 0x90, 0x1e, 0xe8, 0x21, 0x5f, 0x2a, 0xfd, 0xe4, 0xb8,
|
||
|
0x47, 0x9b, 0xcc, 0xa0, 0xc5, 0x84, 0x70, 0x25, 0x93, 0xdc, 0x15, 0x81, 0xf1, 0x65, 0xa8, 0x8f,
|
||
|
0x5a, 0xe3, 0x3f, 0xe6, 0xfa, 0xa6, 0x66, 0xd9, 0xd7, 0x3c, 0xcd, 0x7b, 0xa7, 0x42, 0xfa, 0xb1,
|
||
|
0x55, 0xfc, 0x7a, 0x70, 0x02, 0xbd, 0xed, 0x86, 0x64, 0x92, 0x15, 0xc6, 0x8a, 0x41, 0x72, 0x24,
|
||
|
0x7d, 0xa8, 0x45, 0xcc, 0x09, 0x31, 0x9d, 0xae, 0x6d, 0x65, 0xc1, 0x51, 0xf5, 0x50, 0xa3, 0xff,
|
||
|
0xa0, 0xbb, 0xf1, 0x53, 0x18, 0x7f, 0x41, 0xd3, 0x73, 0x18, 0x17, 0x85, 0x7b, 0xe6, 0x09, 0x3a,
|
||
|
0x81, 0xce, 0x54, 0x94, 0xc0, 0xbc, 0xdb, 0xbf, 0x8b, 0x85, 0x3e, 0x69, 0xd0, 0xdd, 0x48, 0x28,
|
||
|
0xcf, 0x8f, 0xe0, 0xe6, 0x28, 0xab, 0x45, 0x94, 0x17, 0x65, 0x94, 0x7a, 0x8a, 0xf2, 0x6f, 0x8e,
|
||
|
0x72, 0xcb, 0xe6, 0x73, 0x59, 0x8e, 0x9f, 0x35, 0xe8, 0xcf, 0x30, 0xbe, 0x64, 0x82, 0xdd, 0xe2,
|
||
|
0x1d, 0x0a, 0x39, 0x47, 0x3f, 0xe2, 0x0b, 0x24, 0xc7, 0x50, 0xcf, 0x56, 0x95, 0xfc, 0xc8, 0x67,
|
||
|
0x2b, 0x6d, 0xf3, 0xc0, 0xd8, 0x2d, 0x64, 0x33, 0xd3, 0x0a, 0x99, 0x40, 0x43, 0xbd, 0x11, 0x31,
|
||
|
0xf6, 0xad, 0xc9, 0xe0, 0xe7, 0x1b, 0x95, 0xa2, 0x82, 0x42, 0x51, 0x54, 0x28, 0xbf, 0x63, 0x51,
|
||
|
0x61, 0x8b, 0x1b, 0xad, 0xdc, 0xd4, 0xd3, 0xff, 0xf1, 0xe0, 0x35, 0x00, 0x00, 0xff, 0xff, 0xa7,
|
||
|
0xdd, 0xa1, 0x79, 0x9c, 0x03, 0x00, 0x00,
|
||
|
}
|
||
|
|
||
|
// Reference imports to suppress errors if they are not otherwise used.
|
||
|
var _ context.Context
|
||
|
var _ grpc.ClientConn
|
||
|
|
||
|
// This is a compile-time assertion to ensure that this generated file
|
||
|
// is compatible with the grpc package it is being compiled against.
|
||
|
const _ = grpc.SupportPackageIsVersion4
|
||
|
|
||
|
// KeyManagementServiceClient is the client API for KeyManagementService service.
|
||
|
//
|
||
|
// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream.
|
||
|
type KeyManagementServiceClient interface {
|
||
|
// this API is meant to be polled
|
||
|
Status(ctx context.Context, in *StatusRequest, opts ...grpc.CallOption) (*StatusResponse, error)
|
||
|
// Execute decryption operation in KMS provider.
|
||
|
Decrypt(ctx context.Context, in *DecryptRequest, opts ...grpc.CallOption) (*DecryptResponse, error)
|
||
|
// Execute encryption operation in KMS provider.
|
||
|
Encrypt(ctx context.Context, in *EncryptRequest, opts ...grpc.CallOption) (*EncryptResponse, error)
|
||
|
}
|
||
|
|
||
|
type keyManagementServiceClient struct {
|
||
|
cc *grpc.ClientConn
|
||
|
}
|
||
|
|
||
|
func NewKeyManagementServiceClient(cc *grpc.ClientConn) KeyManagementServiceClient {
|
||
|
return &keyManagementServiceClient{cc}
|
||
|
}
|
||
|
|
||
|
func (c *keyManagementServiceClient) Status(ctx context.Context, in *StatusRequest, opts ...grpc.CallOption) (*StatusResponse, error) {
|
||
|
out := new(StatusResponse)
|
||
|
err := c.cc.Invoke(ctx, "/v2alpha1.KeyManagementService/Status", in, out, opts...)
|
||
|
if err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
return out, nil
|
||
|
}
|
||
|
|
||
|
func (c *keyManagementServiceClient) Decrypt(ctx context.Context, in *DecryptRequest, opts ...grpc.CallOption) (*DecryptResponse, error) {
|
||
|
out := new(DecryptResponse)
|
||
|
err := c.cc.Invoke(ctx, "/v2alpha1.KeyManagementService/Decrypt", in, out, opts...)
|
||
|
if err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
return out, nil
|
||
|
}
|
||
|
|
||
|
func (c *keyManagementServiceClient) Encrypt(ctx context.Context, in *EncryptRequest, opts ...grpc.CallOption) (*EncryptResponse, error) {
|
||
|
out := new(EncryptResponse)
|
||
|
err := c.cc.Invoke(ctx, "/v2alpha1.KeyManagementService/Encrypt", in, out, opts...)
|
||
|
if err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
return out, nil
|
||
|
}
|
||
|
|
||
|
// KeyManagementServiceServer is the server API for KeyManagementService service.
|
||
|
type KeyManagementServiceServer interface {
|
||
|
// this API is meant to be polled
|
||
|
Status(context.Context, *StatusRequest) (*StatusResponse, error)
|
||
|
// Execute decryption operation in KMS provider.
|
||
|
Decrypt(context.Context, *DecryptRequest) (*DecryptResponse, error)
|
||
|
// Execute encryption operation in KMS provider.
|
||
|
Encrypt(context.Context, *EncryptRequest) (*EncryptResponse, error)
|
||
|
}
|
||
|
|
||
|
// UnimplementedKeyManagementServiceServer can be embedded to have forward compatible implementations.
|
||
|
type UnimplementedKeyManagementServiceServer struct {
|
||
|
}
|
||
|
|
||
|
func (*UnimplementedKeyManagementServiceServer) Status(ctx context.Context, req *StatusRequest) (*StatusResponse, error) {
|
||
|
return nil, status.Errorf(codes.Unimplemented, "method Status not implemented")
|
||
|
}
|
||
|
func (*UnimplementedKeyManagementServiceServer) Decrypt(ctx context.Context, req *DecryptRequest) (*DecryptResponse, error) {
|
||
|
return nil, status.Errorf(codes.Unimplemented, "method Decrypt not implemented")
|
||
|
}
|
||
|
func (*UnimplementedKeyManagementServiceServer) Encrypt(ctx context.Context, req *EncryptRequest) (*EncryptResponse, error) {
|
||
|
return nil, status.Errorf(codes.Unimplemented, "method Encrypt not implemented")
|
||
|
}
|
||
|
|
||
|
func RegisterKeyManagementServiceServer(s *grpc.Server, srv KeyManagementServiceServer) {
|
||
|
s.RegisterService(&_KeyManagementService_serviceDesc, srv)
|
||
|
}
|
||
|
|
||
|
func _KeyManagementService_Status_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
||
|
in := new(StatusRequest)
|
||
|
if err := dec(in); err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
if interceptor == nil {
|
||
|
return srv.(KeyManagementServiceServer).Status(ctx, in)
|
||
|
}
|
||
|
info := &grpc.UnaryServerInfo{
|
||
|
Server: srv,
|
||
|
FullMethod: "/v2alpha1.KeyManagementService/Status",
|
||
|
}
|
||
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
||
|
return srv.(KeyManagementServiceServer).Status(ctx, req.(*StatusRequest))
|
||
|
}
|
||
|
return interceptor(ctx, in, info, handler)
|
||
|
}
|
||
|
|
||
|
func _KeyManagementService_Decrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
||
|
in := new(DecryptRequest)
|
||
|
if err := dec(in); err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
if interceptor == nil {
|
||
|
return srv.(KeyManagementServiceServer).Decrypt(ctx, in)
|
||
|
}
|
||
|
info := &grpc.UnaryServerInfo{
|
||
|
Server: srv,
|
||
|
FullMethod: "/v2alpha1.KeyManagementService/Decrypt",
|
||
|
}
|
||
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
||
|
return srv.(KeyManagementServiceServer).Decrypt(ctx, req.(*DecryptRequest))
|
||
|
}
|
||
|
return interceptor(ctx, in, info, handler)
|
||
|
}
|
||
|
|
||
|
func _KeyManagementService_Encrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
||
|
in := new(EncryptRequest)
|
||
|
if err := dec(in); err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
if interceptor == nil {
|
||
|
return srv.(KeyManagementServiceServer).Encrypt(ctx, in)
|
||
|
}
|
||
|
info := &grpc.UnaryServerInfo{
|
||
|
Server: srv,
|
||
|
FullMethod: "/v2alpha1.KeyManagementService/Encrypt",
|
||
|
}
|
||
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
||
|
return srv.(KeyManagementServiceServer).Encrypt(ctx, req.(*EncryptRequest))
|
||
|
}
|
||
|
return interceptor(ctx, in, info, handler)
|
||
|
}
|
||
|
|
||
|
var _KeyManagementService_serviceDesc = grpc.ServiceDesc{
|
||
|
ServiceName: "v2alpha1.KeyManagementService",
|
||
|
HandlerType: (*KeyManagementServiceServer)(nil),
|
||
|
Methods: []grpc.MethodDesc{
|
||
|
{
|
||
|
MethodName: "Status",
|
||
|
Handler: _KeyManagementService_Status_Handler,
|
||
|
},
|
||
|
{
|
||
|
MethodName: "Decrypt",
|
||
|
Handler: _KeyManagementService_Decrypt_Handler,
|
||
|
},
|
||
|
{
|
||
|
MethodName: "Encrypt",
|
||
|
Handler: _KeyManagementService_Encrypt_Handler,
|
||
|
},
|
||
|
},
|
||
|
Streams: []grpc.StreamDesc{},
|
||
|
Metadata: "api.proto",
|
||
|
}
|