-
Notifications
You must be signed in to change notification settings - Fork 195
/
resources.pb.go
5960 lines (5403 loc) · 284 KB
/
resources.pb.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
// Copyright 2023 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
// Code generated by protoc-gen-go. DO NOT EDIT.
// versions:
// protoc-gen-go v1.28.1
// protoc v3.12.4
// source: mockgcp/cloud/security/privateca/v1/resources.proto
package privatecapb
import (
duration "github.com/golang/protobuf/ptypes/duration"
timestamp "github.com/golang/protobuf/ptypes/timestamp"
_ "google.golang.org/genproto/googleapis/api/annotations"
expr "google.golang.org/genproto/googleapis/type/expr"
protoreflect "google.golang.org/protobuf/reflect/protoreflect"
protoimpl "google.golang.org/protobuf/runtime/protoimpl"
reflect "reflect"
sync "sync"
)
const (
// Verify that this generated code is sufficiently up-to-date.
_ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion)
// Verify that runtime/protoimpl is sufficiently up-to-date.
_ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20)
)
// A [RevocationReason][mockgcp.cloud.security.privateca.v1.RevocationReason]
// indicates whether a
// [Certificate][mockgcp.cloud.security.privateca.v1.Certificate] has been
// revoked, and the reason for revocation. These correspond to standard
// revocation reasons from RFC 5280. Note that the enum labels and values in
// this definition are not the same ASN.1 values defined in RFC 5280. These
// values will be translated to the correct ASN.1 values when a CRL is created.
type RevocationReason int32
const (
// Default unspecified value. This value does indicate that a
// [Certificate][mockgcp.cloud.security.privateca.v1.Certificate] has been
// revoked, but that a reason has not been recorded.
RevocationReason_REVOCATION_REASON_UNSPECIFIED RevocationReason = 0
// Key material for this
// [Certificate][mockgcp.cloud.security.privateca.v1.Certificate] may have
// leaked.
RevocationReason_KEY_COMPROMISE RevocationReason = 1
// The key material for a certificate authority in the issuing path may have
// leaked.
RevocationReason_CERTIFICATE_AUTHORITY_COMPROMISE RevocationReason = 2
// The subject or other attributes in this
// [Certificate][mockgcp.cloud.security.privateca.v1.Certificate] have changed.
RevocationReason_AFFILIATION_CHANGED RevocationReason = 3
// This [Certificate][mockgcp.cloud.security.privateca.v1.Certificate] has been
// superseded.
RevocationReason_SUPERSEDED RevocationReason = 4
// This [Certificate][mockgcp.cloud.security.privateca.v1.Certificate] or
// entities in the issuing path have ceased to operate.
RevocationReason_CESSATION_OF_OPERATION RevocationReason = 5
// This [Certificate][mockgcp.cloud.security.privateca.v1.Certificate] should
// not be considered valid, it is expected that it may become valid in the
// future.
RevocationReason_CERTIFICATE_HOLD RevocationReason = 6
// This [Certificate][mockgcp.cloud.security.privateca.v1.Certificate] no
// longer has permission to assert the listed attributes.
RevocationReason_PRIVILEGE_WITHDRAWN RevocationReason = 7
// The authority which determines appropriate attributes for a
// [Certificate][mockgcp.cloud.security.privateca.v1.Certificate] may have been
// compromised.
RevocationReason_ATTRIBUTE_AUTHORITY_COMPROMISE RevocationReason = 8
)
// Enum value maps for RevocationReason.
var (
RevocationReason_name = map[int32]string{
0: "REVOCATION_REASON_UNSPECIFIED",
1: "KEY_COMPROMISE",
2: "CERTIFICATE_AUTHORITY_COMPROMISE",
3: "AFFILIATION_CHANGED",
4: "SUPERSEDED",
5: "CESSATION_OF_OPERATION",
6: "CERTIFICATE_HOLD",
7: "PRIVILEGE_WITHDRAWN",
8: "ATTRIBUTE_AUTHORITY_COMPROMISE",
}
RevocationReason_value = map[string]int32{
"REVOCATION_REASON_UNSPECIFIED": 0,
"KEY_COMPROMISE": 1,
"CERTIFICATE_AUTHORITY_COMPROMISE": 2,
"AFFILIATION_CHANGED": 3,
"SUPERSEDED": 4,
"CESSATION_OF_OPERATION": 5,
"CERTIFICATE_HOLD": 6,
"PRIVILEGE_WITHDRAWN": 7,
"ATTRIBUTE_AUTHORITY_COMPROMISE": 8,
}
)
func (x RevocationReason) Enum() *RevocationReason {
p := new(RevocationReason)
*p = x
return p
}
func (x RevocationReason) String() string {
return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x))
}
func (RevocationReason) Descriptor() protoreflect.EnumDescriptor {
return file_mockgcp_cloud_security_privateca_v1_resources_proto_enumTypes[0].Descriptor()
}
func (RevocationReason) Type() protoreflect.EnumType {
return &file_mockgcp_cloud_security_privateca_v1_resources_proto_enumTypes[0]
}
func (x RevocationReason) Number() protoreflect.EnumNumber {
return protoreflect.EnumNumber(x)
}
// Deprecated: Use RevocationReason.Descriptor instead.
func (RevocationReason) EnumDescriptor() ([]byte, []int) {
return file_mockgcp_cloud_security_privateca_v1_resources_proto_rawDescGZIP(), []int{0}
}
// Describes the way in which a
// [Certificate][mockgcp.cloud.security.privateca.v1.Certificate]'s
// [Subject][mockgcp.cloud.security.privateca.v1.Subject] and/or
// [SubjectAltNames][mockgcp.cloud.security.privateca.v1.SubjectAltNames] will be
// resolved.
type SubjectRequestMode int32
const (
// Not specified.
SubjectRequestMode_SUBJECT_REQUEST_MODE_UNSPECIFIED SubjectRequestMode = 0
// The default mode used in most cases. Indicates that the certificate's
// [Subject][mockgcp.cloud.security.privateca.v1.Subject] and/or
// [SubjectAltNames][mockgcp.cloud.security.privateca.v1.SubjectAltNames] are
// specified in the certificate request. This mode requires the caller to have
// the `privateca.certificates.create` permission.
SubjectRequestMode_DEFAULT SubjectRequestMode = 1
// A mode reserved for special cases. Indicates that the certificate should
// have one SPIFFE
// [SubjectAltNames][mockgcp.cloud.security.privateca.v1.SubjectAltNames] set
// by the service based on the caller's identity. This mode will ignore any
// explicitly specified [Subject][mockgcp.cloud.security.privateca.v1.Subject]
// and/or
// [SubjectAltNames][mockgcp.cloud.security.privateca.v1.SubjectAltNames] in
// the certificate request. This mode requires the caller to have the
// `privateca.certificates.createForSelf` permission.
SubjectRequestMode_REFLECTED_SPIFFE SubjectRequestMode = 2
)
// Enum value maps for SubjectRequestMode.
var (
SubjectRequestMode_name = map[int32]string{
0: "SUBJECT_REQUEST_MODE_UNSPECIFIED",
1: "DEFAULT",
2: "REFLECTED_SPIFFE",
}
SubjectRequestMode_value = map[string]int32{
"SUBJECT_REQUEST_MODE_UNSPECIFIED": 0,
"DEFAULT": 1,
"REFLECTED_SPIFFE": 2,
}
)
func (x SubjectRequestMode) Enum() *SubjectRequestMode {
p := new(SubjectRequestMode)
*p = x
return p
}
func (x SubjectRequestMode) String() string {
return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x))
}
func (SubjectRequestMode) Descriptor() protoreflect.EnumDescriptor {
return file_mockgcp_cloud_security_privateca_v1_resources_proto_enumTypes[1].Descriptor()
}
func (SubjectRequestMode) Type() protoreflect.EnumType {
return &file_mockgcp_cloud_security_privateca_v1_resources_proto_enumTypes[1]
}
func (x SubjectRequestMode) Number() protoreflect.EnumNumber {
return protoreflect.EnumNumber(x)
}
// Deprecated: Use SubjectRequestMode.Descriptor instead.
func (SubjectRequestMode) EnumDescriptor() ([]byte, []int) {
return file_mockgcp_cloud_security_privateca_v1_resources_proto_rawDescGZIP(), []int{1}
}
// The type of a
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority],
// indicating its issuing chain.
type CertificateAuthority_Type int32
const (
// Not specified.
CertificateAuthority_TYPE_UNSPECIFIED CertificateAuthority_Type = 0
// Self-signed CA.
CertificateAuthority_SELF_SIGNED CertificateAuthority_Type = 1
// Subordinate CA. Could be issued by a Private CA
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority]
// or an unmanaged CA.
CertificateAuthority_SUBORDINATE CertificateAuthority_Type = 2
)
// Enum value maps for CertificateAuthority_Type.
var (
CertificateAuthority_Type_name = map[int32]string{
0: "TYPE_UNSPECIFIED",
1: "SELF_SIGNED",
2: "SUBORDINATE",
}
CertificateAuthority_Type_value = map[string]int32{
"TYPE_UNSPECIFIED": 0,
"SELF_SIGNED": 1,
"SUBORDINATE": 2,
}
)
func (x CertificateAuthority_Type) Enum() *CertificateAuthority_Type {
p := new(CertificateAuthority_Type)
*p = x
return p
}
func (x CertificateAuthority_Type) String() string {
return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x))
}
func (CertificateAuthority_Type) Descriptor() protoreflect.EnumDescriptor {
return file_mockgcp_cloud_security_privateca_v1_resources_proto_enumTypes[2].Descriptor()
}
func (CertificateAuthority_Type) Type() protoreflect.EnumType {
return &file_mockgcp_cloud_security_privateca_v1_resources_proto_enumTypes[2]
}
func (x CertificateAuthority_Type) Number() protoreflect.EnumNumber {
return protoreflect.EnumNumber(x)
}
// Deprecated: Use CertificateAuthority_Type.Descriptor instead.
func (CertificateAuthority_Type) EnumDescriptor() ([]byte, []int) {
return file_mockgcp_cloud_security_privateca_v1_resources_proto_rawDescGZIP(), []int{0, 0}
}
// The state of a
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority],
// indicating if it can be used.
type CertificateAuthority_State int32
const (
// Not specified.
CertificateAuthority_STATE_UNSPECIFIED CertificateAuthority_State = 0
// Certificates can be issued from this CA. CRLs will be generated for this
// CA. The CA will be part of the
// [CaPool][mockgcp.cloud.security.privateca.v1.CaPool]'s trust anchor, and
// will be used to issue certificates from the
// [CaPool][mockgcp.cloud.security.privateca.v1.CaPool].
CertificateAuthority_ENABLED CertificateAuthority_State = 1
// Certificates cannot be issued from this CA. CRLs will still be generated.
// The CA will be part of the
// [CaPool][mockgcp.cloud.security.privateca.v1.CaPool]'s trust anchor, but
// will not be used to issue certificates from the
// [CaPool][mockgcp.cloud.security.privateca.v1.CaPool].
CertificateAuthority_DISABLED CertificateAuthority_State = 2
// Certificates can be issued from this CA. CRLs will be generated for this
// CA. The CA will be part of the
// [CaPool][mockgcp.cloud.security.privateca.v1.CaPool]'s trust anchor, but
// will not be used to issue certificates from the
// [CaPool][mockgcp.cloud.security.privateca.v1.CaPool].
CertificateAuthority_STAGED CertificateAuthority_State = 3
// Certificates cannot be issued from this CA. CRLs will not be generated.
// The CA will not be part of the
// [CaPool][mockgcp.cloud.security.privateca.v1.CaPool]'s trust anchor, and
// will not be used to issue certificates from the
// [CaPool][mockgcp.cloud.security.privateca.v1.CaPool].
CertificateAuthority_AWAITING_USER_ACTIVATION CertificateAuthority_State = 4
// Certificates cannot be issued from this CA. CRLs will not be generated.
// The CA may still be recovered by calling
// [CertificateAuthorityService.UndeleteCertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthorityService.UndeleteCertificateAuthority]
// before
// [expire_time][mockgcp.cloud.security.privateca.v1.CertificateAuthority.expire_time].
// The CA will not be part of the
// [CaPool][mockgcp.cloud.security.privateca.v1.CaPool]'s trust anchor, and
// will not be used to issue certificates from the
// [CaPool][mockgcp.cloud.security.privateca.v1.CaPool].
CertificateAuthority_DELETED CertificateAuthority_State = 5
)
// Enum value maps for CertificateAuthority_State.
var (
CertificateAuthority_State_name = map[int32]string{
0: "STATE_UNSPECIFIED",
1: "ENABLED",
2: "DISABLED",
3: "STAGED",
4: "AWAITING_USER_ACTIVATION",
5: "DELETED",
}
CertificateAuthority_State_value = map[string]int32{
"STATE_UNSPECIFIED": 0,
"ENABLED": 1,
"DISABLED": 2,
"STAGED": 3,
"AWAITING_USER_ACTIVATION": 4,
"DELETED": 5,
}
)
func (x CertificateAuthority_State) Enum() *CertificateAuthority_State {
p := new(CertificateAuthority_State)
*p = x
return p
}
func (x CertificateAuthority_State) String() string {
return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x))
}
func (CertificateAuthority_State) Descriptor() protoreflect.EnumDescriptor {
return file_mockgcp_cloud_security_privateca_v1_resources_proto_enumTypes[3].Descriptor()
}
func (CertificateAuthority_State) Type() protoreflect.EnumType {
return &file_mockgcp_cloud_security_privateca_v1_resources_proto_enumTypes[3]
}
func (x CertificateAuthority_State) Number() protoreflect.EnumNumber {
return protoreflect.EnumNumber(x)
}
// Deprecated: Use CertificateAuthority_State.Descriptor instead.
func (CertificateAuthority_State) EnumDescriptor() ([]byte, []int) {
return file_mockgcp_cloud_security_privateca_v1_resources_proto_rawDescGZIP(), []int{0, 1}
}
// The algorithm of a Cloud KMS CryptoKeyVersion of a
// [CryptoKey][mockgcp.cloud.kms.v1.CryptoKey] with the
// [CryptoKeyPurpose][mockgcp.cloud.kms.v1.CryptoKey.CryptoKeyPurpose] value
// `ASYMMETRIC_SIGN`. These values correspond to the
// [CryptoKeyVersionAlgorithm][mockgcp.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm]
// values. For RSA signing algorithms, the PSS algorithms should be preferred,
// use PKCS1 algorithms if required for compatibility. For further
// recommendations, see
// https://cloud.google.com/kms/docs/algorithms#algorithm_recommendations.
type CertificateAuthority_SignHashAlgorithm int32
const (
// Not specified.
CertificateAuthority_SIGN_HASH_ALGORITHM_UNSPECIFIED CertificateAuthority_SignHashAlgorithm = 0
// maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PSS_2048_SHA256
CertificateAuthority_RSA_PSS_2048_SHA256 CertificateAuthority_SignHashAlgorithm = 1
// maps to CryptoKeyVersionAlgorithm. RSA_SIGN_PSS_3072_SHA256
CertificateAuthority_RSA_PSS_3072_SHA256 CertificateAuthority_SignHashAlgorithm = 2
// maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PSS_4096_SHA256
CertificateAuthority_RSA_PSS_4096_SHA256 CertificateAuthority_SignHashAlgorithm = 3
// maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PKCS1_2048_SHA256
CertificateAuthority_RSA_PKCS1_2048_SHA256 CertificateAuthority_SignHashAlgorithm = 6
// maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PKCS1_3072_SHA256
CertificateAuthority_RSA_PKCS1_3072_SHA256 CertificateAuthority_SignHashAlgorithm = 7
// maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PKCS1_4096_SHA256
CertificateAuthority_RSA_PKCS1_4096_SHA256 CertificateAuthority_SignHashAlgorithm = 8
// maps to CryptoKeyVersionAlgorithm.EC_SIGN_P256_SHA256
CertificateAuthority_EC_P256_SHA256 CertificateAuthority_SignHashAlgorithm = 4
// maps to CryptoKeyVersionAlgorithm.EC_SIGN_P384_SHA384
CertificateAuthority_EC_P384_SHA384 CertificateAuthority_SignHashAlgorithm = 5
)
// Enum value maps for CertificateAuthority_SignHashAlgorithm.
var (
CertificateAuthority_SignHashAlgorithm_name = map[int32]string{
0: "SIGN_HASH_ALGORITHM_UNSPECIFIED",
1: "RSA_PSS_2048_SHA256",
2: "RSA_PSS_3072_SHA256",
3: "RSA_PSS_4096_SHA256",
6: "RSA_PKCS1_2048_SHA256",
7: "RSA_PKCS1_3072_SHA256",
8: "RSA_PKCS1_4096_SHA256",
4: "EC_P256_SHA256",
5: "EC_P384_SHA384",
}
CertificateAuthority_SignHashAlgorithm_value = map[string]int32{
"SIGN_HASH_ALGORITHM_UNSPECIFIED": 0,
"RSA_PSS_2048_SHA256": 1,
"RSA_PSS_3072_SHA256": 2,
"RSA_PSS_4096_SHA256": 3,
"RSA_PKCS1_2048_SHA256": 6,
"RSA_PKCS1_3072_SHA256": 7,
"RSA_PKCS1_4096_SHA256": 8,
"EC_P256_SHA256": 4,
"EC_P384_SHA384": 5,
}
)
func (x CertificateAuthority_SignHashAlgorithm) Enum() *CertificateAuthority_SignHashAlgorithm {
p := new(CertificateAuthority_SignHashAlgorithm)
*p = x
return p
}
func (x CertificateAuthority_SignHashAlgorithm) String() string {
return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x))
}
func (CertificateAuthority_SignHashAlgorithm) Descriptor() protoreflect.EnumDescriptor {
return file_mockgcp_cloud_security_privateca_v1_resources_proto_enumTypes[4].Descriptor()
}
func (CertificateAuthority_SignHashAlgorithm) Type() protoreflect.EnumType {
return &file_mockgcp_cloud_security_privateca_v1_resources_proto_enumTypes[4]
}
func (x CertificateAuthority_SignHashAlgorithm) Number() protoreflect.EnumNumber {
return protoreflect.EnumNumber(x)
}
// Deprecated: Use CertificateAuthority_SignHashAlgorithm.Descriptor instead.
func (CertificateAuthority_SignHashAlgorithm) EnumDescriptor() ([]byte, []int) {
return file_mockgcp_cloud_security_privateca_v1_resources_proto_rawDescGZIP(), []int{0, 2}
}
// The tier of a [CaPool][mockgcp.cloud.security.privateca.v1.CaPool],
// indicating its supported functionality and/or billing SKU.
type CaPool_Tier int32
const (
// Not specified.
CaPool_TIER_UNSPECIFIED CaPool_Tier = 0
// Enterprise tier.
CaPool_ENTERPRISE CaPool_Tier = 1
// DevOps tier.
CaPool_DEVOPS CaPool_Tier = 2
)
// Enum value maps for CaPool_Tier.
var (
CaPool_Tier_name = map[int32]string{
0: "TIER_UNSPECIFIED",
1: "ENTERPRISE",
2: "DEVOPS",
}
CaPool_Tier_value = map[string]int32{
"TIER_UNSPECIFIED": 0,
"ENTERPRISE": 1,
"DEVOPS": 2,
}
)
func (x CaPool_Tier) Enum() *CaPool_Tier {
p := new(CaPool_Tier)
*p = x
return p
}
func (x CaPool_Tier) String() string {
return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x))
}
func (CaPool_Tier) Descriptor() protoreflect.EnumDescriptor {
return file_mockgcp_cloud_security_privateca_v1_resources_proto_enumTypes[5].Descriptor()
}
func (CaPool_Tier) Type() protoreflect.EnumType {
return &file_mockgcp_cloud_security_privateca_v1_resources_proto_enumTypes[5]
}
func (x CaPool_Tier) Number() protoreflect.EnumNumber {
return protoreflect.EnumNumber(x)
}
// Deprecated: Use CaPool_Tier.Descriptor instead.
func (CaPool_Tier) EnumDescriptor() ([]byte, []int) {
return file_mockgcp_cloud_security_privateca_v1_resources_proto_rawDescGZIP(), []int{1, 0}
}
// Supported encoding formats for publishing.
type CaPool_PublishingOptions_EncodingFormat int32
const (
// Not specified. By default, PEM format will be used.
CaPool_PublishingOptions_ENCODING_FORMAT_UNSPECIFIED CaPool_PublishingOptions_EncodingFormat = 0
// The
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority]'s
// CA certificate and CRLs will be published in PEM format.
CaPool_PublishingOptions_PEM CaPool_PublishingOptions_EncodingFormat = 1
// The
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority]'s
// CA certificate and CRLs will be published in DER format.
CaPool_PublishingOptions_DER CaPool_PublishingOptions_EncodingFormat = 2
)
// Enum value maps for CaPool_PublishingOptions_EncodingFormat.
var (
CaPool_PublishingOptions_EncodingFormat_name = map[int32]string{
0: "ENCODING_FORMAT_UNSPECIFIED",
1: "PEM",
2: "DER",
}
CaPool_PublishingOptions_EncodingFormat_value = map[string]int32{
"ENCODING_FORMAT_UNSPECIFIED": 0,
"PEM": 1,
"DER": 2,
}
)
func (x CaPool_PublishingOptions_EncodingFormat) Enum() *CaPool_PublishingOptions_EncodingFormat {
p := new(CaPool_PublishingOptions_EncodingFormat)
*p = x
return p
}
func (x CaPool_PublishingOptions_EncodingFormat) String() string {
return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x))
}
func (CaPool_PublishingOptions_EncodingFormat) Descriptor() protoreflect.EnumDescriptor {
return file_mockgcp_cloud_security_privateca_v1_resources_proto_enumTypes[6].Descriptor()
}
func (CaPool_PublishingOptions_EncodingFormat) Type() protoreflect.EnumType {
return &file_mockgcp_cloud_security_privateca_v1_resources_proto_enumTypes[6]
}
func (x CaPool_PublishingOptions_EncodingFormat) Number() protoreflect.EnumNumber {
return protoreflect.EnumNumber(x)
}
// Deprecated: Use CaPool_PublishingOptions_EncodingFormat.Descriptor instead.
func (CaPool_PublishingOptions_EncodingFormat) EnumDescriptor() ([]byte, []int) {
return file_mockgcp_cloud_security_privateca_v1_resources_proto_rawDescGZIP(), []int{1, 0, 0}
}
// Describes an elliptic curve-based signature algorithm that may be
// used in a
// [Certificate][mockgcp.cloud.security.privateca.v1.Certificate] issued
// from a [CaPool][mockgcp.cloud.security.privateca.v1.CaPool].
type CaPool_IssuancePolicy_AllowedKeyType_EcKeyType_EcSignatureAlgorithm int32
const (
// Not specified. Signifies that any signature algorithm may be used.
CaPool_IssuancePolicy_AllowedKeyType_EcKeyType_EC_SIGNATURE_ALGORITHM_UNSPECIFIED CaPool_IssuancePolicy_AllowedKeyType_EcKeyType_EcSignatureAlgorithm = 0
// Refers to the Elliptic Curve Digital Signature Algorithm over the
// NIST P-256 curve.
CaPool_IssuancePolicy_AllowedKeyType_EcKeyType_ECDSA_P256 CaPool_IssuancePolicy_AllowedKeyType_EcKeyType_EcSignatureAlgorithm = 1
// Refers to the Elliptic Curve Digital Signature Algorithm over the
// NIST P-384 curve.
CaPool_IssuancePolicy_AllowedKeyType_EcKeyType_ECDSA_P384 CaPool_IssuancePolicy_AllowedKeyType_EcKeyType_EcSignatureAlgorithm = 2
// Refers to the Edwards-curve Digital Signature Algorithm over curve
// 25519, as described in RFC 8410.
CaPool_IssuancePolicy_AllowedKeyType_EcKeyType_EDDSA_25519 CaPool_IssuancePolicy_AllowedKeyType_EcKeyType_EcSignatureAlgorithm = 3
)
// Enum value maps for CaPool_IssuancePolicy_AllowedKeyType_EcKeyType_EcSignatureAlgorithm.
var (
CaPool_IssuancePolicy_AllowedKeyType_EcKeyType_EcSignatureAlgorithm_name = map[int32]string{
0: "EC_SIGNATURE_ALGORITHM_UNSPECIFIED",
1: "ECDSA_P256",
2: "ECDSA_P384",
3: "EDDSA_25519",
}
CaPool_IssuancePolicy_AllowedKeyType_EcKeyType_EcSignatureAlgorithm_value = map[string]int32{
"EC_SIGNATURE_ALGORITHM_UNSPECIFIED": 0,
"ECDSA_P256": 1,
"ECDSA_P384": 2,
"EDDSA_25519": 3,
}
)
func (x CaPool_IssuancePolicy_AllowedKeyType_EcKeyType_EcSignatureAlgorithm) Enum() *CaPool_IssuancePolicy_AllowedKeyType_EcKeyType_EcSignatureAlgorithm {
p := new(CaPool_IssuancePolicy_AllowedKeyType_EcKeyType_EcSignatureAlgorithm)
*p = x
return p
}
func (x CaPool_IssuancePolicy_AllowedKeyType_EcKeyType_EcSignatureAlgorithm) String() string {
return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x))
}
func (CaPool_IssuancePolicy_AllowedKeyType_EcKeyType_EcSignatureAlgorithm) Descriptor() protoreflect.EnumDescriptor {
return file_mockgcp_cloud_security_privateca_v1_resources_proto_enumTypes[7].Descriptor()
}
func (CaPool_IssuancePolicy_AllowedKeyType_EcKeyType_EcSignatureAlgorithm) Type() protoreflect.EnumType {
return &file_mockgcp_cloud_security_privateca_v1_resources_proto_enumTypes[7]
}
func (x CaPool_IssuancePolicy_AllowedKeyType_EcKeyType_EcSignatureAlgorithm) Number() protoreflect.EnumNumber {
return protoreflect.EnumNumber(x)
}
// Deprecated: Use CaPool_IssuancePolicy_AllowedKeyType_EcKeyType_EcSignatureAlgorithm.Descriptor instead.
func (CaPool_IssuancePolicy_AllowedKeyType_EcKeyType_EcSignatureAlgorithm) EnumDescriptor() ([]byte, []int) {
return file_mockgcp_cloud_security_privateca_v1_resources_proto_rawDescGZIP(), []int{1, 1, 0, 1, 0}
}
// The state of a
// [CertificateRevocationList][mockgcp.cloud.security.privateca.v1.CertificateRevocationList],
// indicating if it is current.
type CertificateRevocationList_State int32
const (
// Not specified.
CertificateRevocationList_STATE_UNSPECIFIED CertificateRevocationList_State = 0
// The
// [CertificateRevocationList][mockgcp.cloud.security.privateca.v1.CertificateRevocationList]
// is up to date.
CertificateRevocationList_ACTIVE CertificateRevocationList_State = 1
// The
// [CertificateRevocationList][mockgcp.cloud.security.privateca.v1.CertificateRevocationList]
// is no longer current.
CertificateRevocationList_SUPERSEDED CertificateRevocationList_State = 2
)
// Enum value maps for CertificateRevocationList_State.
var (
CertificateRevocationList_State_name = map[int32]string{
0: "STATE_UNSPECIFIED",
1: "ACTIVE",
2: "SUPERSEDED",
}
CertificateRevocationList_State_value = map[string]int32{
"STATE_UNSPECIFIED": 0,
"ACTIVE": 1,
"SUPERSEDED": 2,
}
)
func (x CertificateRevocationList_State) Enum() *CertificateRevocationList_State {
p := new(CertificateRevocationList_State)
*p = x
return p
}
func (x CertificateRevocationList_State) String() string {
return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x))
}
func (CertificateRevocationList_State) Descriptor() protoreflect.EnumDescriptor {
return file_mockgcp_cloud_security_privateca_v1_resources_proto_enumTypes[8].Descriptor()
}
func (CertificateRevocationList_State) Type() protoreflect.EnumType {
return &file_mockgcp_cloud_security_privateca_v1_resources_proto_enumTypes[8]
}
func (x CertificateRevocationList_State) Number() protoreflect.EnumNumber {
return protoreflect.EnumNumber(x)
}
// Deprecated: Use CertificateRevocationList_State.Descriptor instead.
func (CertificateRevocationList_State) EnumDescriptor() ([]byte, []int) {
return file_mockgcp_cloud_security_privateca_v1_resources_proto_rawDescGZIP(), []int{2, 0}
}
// Types of public keys formats that are supported. Currently, only `PEM`
// format is supported.
type PublicKey_KeyFormat int32
const (
// Default unspecified value.
PublicKey_KEY_FORMAT_UNSPECIFIED PublicKey_KeyFormat = 0
// The key is PEM-encoded as defined in [RFC
// 7468](https://tools.ietf.org/html/rfc7468). It can be any of the
// following: a PEM-encoded PKCS#1/RFC 3447 RSAPublicKey
// structure, an RFC 5280
// [SubjectPublicKeyInfo](https://tools.ietf.org/html/rfc5280#section-4.1)
// or a PEM-encoded X.509 certificate signing request (CSR). If a
// [SubjectPublicKeyInfo](https://tools.ietf.org/html/rfc5280#section-4.1)
// is specified, it can contain a A PEM-encoded PKCS#1/RFC 3447 RSAPublicKey
// or a NIST P-256/secp256r1/prime256v1 or P-384 key. If a CSR is specified,
// it will used solely for the purpose of extracting the public key. When
// generated by the service, it will always be an RFC 5280
// [SubjectPublicKeyInfo](https://tools.ietf.org/html/rfc5280#section-4.1)
// structure containing an algorithm identifier and a key.
PublicKey_PEM PublicKey_KeyFormat = 1
)
// Enum value maps for PublicKey_KeyFormat.
var (
PublicKey_KeyFormat_name = map[int32]string{
0: "KEY_FORMAT_UNSPECIFIED",
1: "PEM",
}
PublicKey_KeyFormat_value = map[string]int32{
"KEY_FORMAT_UNSPECIFIED": 0,
"PEM": 1,
}
)
func (x PublicKey_KeyFormat) Enum() *PublicKey_KeyFormat {
p := new(PublicKey_KeyFormat)
*p = x
return p
}
func (x PublicKey_KeyFormat) String() string {
return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x))
}
func (PublicKey_KeyFormat) Descriptor() protoreflect.EnumDescriptor {
return file_mockgcp_cloud_security_privateca_v1_resources_proto_enumTypes[9].Descriptor()
}
func (PublicKey_KeyFormat) Type() protoreflect.EnumType {
return &file_mockgcp_cloud_security_privateca_v1_resources_proto_enumTypes[9]
}
func (x PublicKey_KeyFormat) Number() protoreflect.EnumNumber {
return protoreflect.EnumNumber(x)
}
// Deprecated: Use PublicKey_KeyFormat.Descriptor instead.
func (PublicKey_KeyFormat) EnumDescriptor() ([]byte, []int) {
return file_mockgcp_cloud_security_privateca_v1_resources_proto_rawDescGZIP(), []int{7, 0}
}
// Describes well-known X.509 extensions that can appear in a
// [Certificate][mockgcp.cloud.security.privateca.v1.Certificate], not
// including the
// [SubjectAltNames][mockgcp.cloud.security.privateca.v1.SubjectAltNames]
// extension.
type CertificateExtensionConstraints_KnownCertificateExtension int32
const (
// Not specified.
CertificateExtensionConstraints_KNOWN_CERTIFICATE_EXTENSION_UNSPECIFIED CertificateExtensionConstraints_KnownCertificateExtension = 0
// Refers to a certificate's Key Usage extension, as described in [RFC 5280
// section 4.2.1.3](https://tools.ietf.org/html/rfc5280#section-4.2.1.3).
// This corresponds to the
// [KeyUsage.base_key_usage][mockgcp.cloud.security.privateca.v1.KeyUsage.base_key_usage]
// field.
CertificateExtensionConstraints_BASE_KEY_USAGE CertificateExtensionConstraints_KnownCertificateExtension = 1
// Refers to a certificate's Extended Key Usage extension, as described in
// [RFC 5280
// section 4.2.1.12](https://tools.ietf.org/html/rfc5280#section-4.2.1.12).
// This corresponds to the
// [KeyUsage.extended_key_usage][mockgcp.cloud.security.privateca.v1.KeyUsage.extended_key_usage]
// message.
CertificateExtensionConstraints_EXTENDED_KEY_USAGE CertificateExtensionConstraints_KnownCertificateExtension = 2
// Refers to a certificate's Basic Constraints extension, as described in
// [RFC 5280
// section 4.2.1.9](https://tools.ietf.org/html/rfc5280#section-4.2.1.9).
// This corresponds to the
// [X509Parameters.ca_options][mockgcp.cloud.security.privateca.v1.X509Parameters.ca_options]
// field.
CertificateExtensionConstraints_CA_OPTIONS CertificateExtensionConstraints_KnownCertificateExtension = 3
// Refers to a certificate's Policy object identifiers, as described in
// [RFC 5280
// section 4.2.1.4](https://tools.ietf.org/html/rfc5280#section-4.2.1.4).
// This corresponds to the
// [X509Parameters.policy_ids][mockgcp.cloud.security.privateca.v1.X509Parameters.policy_ids]
// field.
CertificateExtensionConstraints_POLICY_IDS CertificateExtensionConstraints_KnownCertificateExtension = 4
// Refers to OCSP servers in a certificate's Authority Information Access
// extension, as described in
// [RFC 5280
// section 4.2.2.1](https://tools.ietf.org/html/rfc5280#section-4.2.2.1),
// This corresponds to the
// [X509Parameters.aia_ocsp_servers][mockgcp.cloud.security.privateca.v1.X509Parameters.aia_ocsp_servers]
// field.
CertificateExtensionConstraints_AIA_OCSP_SERVERS CertificateExtensionConstraints_KnownCertificateExtension = 5
// Refers to Name Constraints extension as described in
// [RFC 5280
// section 4.2.1.10](https://tools.ietf.org/html/rfc5280#section-4.2.1.10)
CertificateExtensionConstraints_NAME_CONSTRAINTS CertificateExtensionConstraints_KnownCertificateExtension = 6
)
// Enum value maps for CertificateExtensionConstraints_KnownCertificateExtension.
var (
CertificateExtensionConstraints_KnownCertificateExtension_name = map[int32]string{
0: "KNOWN_CERTIFICATE_EXTENSION_UNSPECIFIED",
1: "BASE_KEY_USAGE",
2: "EXTENDED_KEY_USAGE",
3: "CA_OPTIONS",
4: "POLICY_IDS",
5: "AIA_OCSP_SERVERS",
6: "NAME_CONSTRAINTS",
}
CertificateExtensionConstraints_KnownCertificateExtension_value = map[string]int32{
"KNOWN_CERTIFICATE_EXTENSION_UNSPECIFIED": 0,
"BASE_KEY_USAGE": 1,
"EXTENDED_KEY_USAGE": 2,
"CA_OPTIONS": 3,
"POLICY_IDS": 4,
"AIA_OCSP_SERVERS": 5,
"NAME_CONSTRAINTS": 6,
}
)
func (x CertificateExtensionConstraints_KnownCertificateExtension) Enum() *CertificateExtensionConstraints_KnownCertificateExtension {
p := new(CertificateExtensionConstraints_KnownCertificateExtension)
*p = x
return p
}
func (x CertificateExtensionConstraints_KnownCertificateExtension) String() string {
return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x))
}
func (CertificateExtensionConstraints_KnownCertificateExtension) Descriptor() protoreflect.EnumDescriptor {
return file_mockgcp_cloud_security_privateca_v1_resources_proto_enumTypes[10].Descriptor()
}
func (CertificateExtensionConstraints_KnownCertificateExtension) Type() protoreflect.EnumType {
return &file_mockgcp_cloud_security_privateca_v1_resources_proto_enumTypes[10]
}
func (x CertificateExtensionConstraints_KnownCertificateExtension) Number() protoreflect.EnumNumber {
return protoreflect.EnumNumber(x)
}
// Deprecated: Use CertificateExtensionConstraints_KnownCertificateExtension.Descriptor instead.
func (CertificateExtensionConstraints_KnownCertificateExtension) EnumDescriptor() ([]byte, []int) {
return file_mockgcp_cloud_security_privateca_v1_resources_proto_rawDescGZIP(), []int{16, 0}
}
// A
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority]
// represents an individual Certificate Authority. A
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority]
// can be used to create
// [Certificates][mockgcp.cloud.security.privateca.v1.Certificate].
type CertificateAuthority struct {
state protoimpl.MessageState
sizeCache protoimpl.SizeCache
unknownFields protoimpl.UnknownFields
// Output only. The resource name for this
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority]
// in the format `projects/*/locations/*/caPools/*/certificateAuthorities/*`.
Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
// Required. Immutable. The
// [Type][mockgcp.cloud.security.privateca.v1.CertificateAuthority.Type] of
// this
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority].
Type CertificateAuthority_Type `protobuf:"varint,2,opt,name=type,proto3,enum=mockgcp.cloud.security.privateca.v1.CertificateAuthority_Type" json:"type,omitempty"`
// Required. Immutable. The config used to create a self-signed X.509
// certificate or CSR.
Config *CertificateConfig `protobuf:"bytes,3,opt,name=config,proto3" json:"config,omitempty"`
// Required. Immutable. The desired lifetime of the CA certificate. Used to
// create the "not_before_time" and "not_after_time" fields inside an X.509
// certificate.
Lifetime *duration.Duration `protobuf:"bytes,4,opt,name=lifetime,proto3" json:"lifetime,omitempty"`
// Required. Immutable. Used when issuing certificates for this
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority].
// If this
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority]
// is a self-signed CertificateAuthority, this key is also used to sign the
// self-signed CA certificate. Otherwise, it is used to sign a CSR.
KeySpec *CertificateAuthority_KeyVersionSpec `protobuf:"bytes,5,opt,name=key_spec,json=keySpec,proto3" json:"key_spec,omitempty"`
// Optional. If this is a subordinate
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority],
// this field will be set with the subordinate configuration, which describes
// its issuers. This may be updated, but this
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority]
// must continue to validate.
SubordinateConfig *SubordinateConfig `protobuf:"bytes,6,opt,name=subordinate_config,json=subordinateConfig,proto3" json:"subordinate_config,omitempty"`
// Output only. The
// [CaPool.Tier][mockgcp.cloud.security.privateca.v1.CaPool.Tier] of the
// [CaPool][mockgcp.cloud.security.privateca.v1.CaPool] that includes this
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority].
Tier CaPool_Tier `protobuf:"varint,7,opt,name=tier,proto3,enum=mockgcp.cloud.security.privateca.v1.CaPool_Tier" json:"tier,omitempty"`
// Output only. The
// [State][mockgcp.cloud.security.privateca.v1.CertificateAuthority.State] for
// this
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority].
State CertificateAuthority_State `protobuf:"varint,8,opt,name=state,proto3,enum=mockgcp.cloud.security.privateca.v1.CertificateAuthority_State" json:"state,omitempty"`
// Output only. This
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority]'s
// certificate chain, including the current
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority]'s
// certificate. Ordered such that the root issuer is the final element
// (consistent with RFC 5246). For a self-signed CA, this will only list the
// current
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority]'s
// certificate.
PemCaCertificates []string `protobuf:"bytes,9,rep,name=pem_ca_certificates,json=pemCaCertificates,proto3" json:"pem_ca_certificates,omitempty"`
// Output only. A structured description of this
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority]'s
// CA certificate and its issuers. Ordered as self-to-root.
CaCertificateDescriptions []*CertificateDescription `protobuf:"bytes,10,rep,name=ca_certificate_descriptions,json=caCertificateDescriptions,proto3" json:"ca_certificate_descriptions,omitempty"`
// Immutable. The name of a Cloud Storage bucket where this
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority]
// will publish content, such as the CA certificate and CRLs. This must be a
// bucket name, without any prefixes (such as `gs://`) or suffixes (such as
// `.googleapis.com`). For example, to use a bucket named `my-bucket`, you
// would simply specify `my-bucket`. If not specified, a managed bucket will
// be created.
GcsBucket string `protobuf:"bytes,11,opt,name=gcs_bucket,json=gcsBucket,proto3" json:"gcs_bucket,omitempty"`
// Output only. URLs for accessing content published by this CA, such as the
// CA certificate and CRLs.
AccessUrls *CertificateAuthority_AccessUrls `protobuf:"bytes,12,opt,name=access_urls,json=accessUrls,proto3" json:"access_urls,omitempty"`
// Output only. The time at which this
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority]
// was created.
CreateTime *timestamp.Timestamp `protobuf:"bytes,13,opt,name=create_time,json=createTime,proto3" json:"create_time,omitempty"`
// Output only. The time at which this
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority]
// was last updated.
UpdateTime *timestamp.Timestamp `protobuf:"bytes,14,opt,name=update_time,json=updateTime,proto3" json:"update_time,omitempty"`
// Output only. The time at which this
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority]
// was soft deleted, if it is in the
// [DELETED][mockgcp.cloud.security.privateca.v1.CertificateAuthority.State.DELETED]
// state.
DeleteTime *timestamp.Timestamp `protobuf:"bytes,15,opt,name=delete_time,json=deleteTime,proto3" json:"delete_time,omitempty"`
// Output only. The time at which this
// [CertificateAuthority][mockgcp.cloud.security.privateca.v1.CertificateAuthority]
// will be permanently purged, if it is in the
// [DELETED][mockgcp.cloud.security.privateca.v1.CertificateAuthority.State.DELETED]
// state.
ExpireTime *timestamp.Timestamp `protobuf:"bytes,16,opt,name=expire_time,json=expireTime,proto3" json:"expire_time,omitempty"`
// Optional. Labels with user-defined metadata.
Labels map[string]string `protobuf:"bytes,17,rep,name=labels,proto3" json:"labels,omitempty" protobuf_key:"bytes,1,opt,name=key,proto3" protobuf_val:"bytes,2,opt,name=value,proto3"`
}
func (x *CertificateAuthority) Reset() {
*x = CertificateAuthority{}
if protoimpl.UnsafeEnabled {
mi := &file_mockgcp_cloud_security_privateca_v1_resources_proto_msgTypes[0]
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
ms.StoreMessageInfo(mi)
}
}
func (x *CertificateAuthority) String() string {
return protoimpl.X.MessageStringOf(x)
}
func (*CertificateAuthority) ProtoMessage() {}
func (x *CertificateAuthority) ProtoReflect() protoreflect.Message {
mi := &file_mockgcp_cloud_security_privateca_v1_resources_proto_msgTypes[0]
if protoimpl.UnsafeEnabled && x != nil {
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
if ms.LoadMessageInfo() == nil {
ms.StoreMessageInfo(mi)
}
return ms
}
return mi.MessageOf(x)
}
// Deprecated: Use CertificateAuthority.ProtoReflect.Descriptor instead.
func (*CertificateAuthority) Descriptor() ([]byte, []int) {
return file_mockgcp_cloud_security_privateca_v1_resources_proto_rawDescGZIP(), []int{0}
}
func (x *CertificateAuthority) GetName() string {
if x != nil {
return x.Name
}
return ""
}
func (x *CertificateAuthority) GetType() CertificateAuthority_Type {
if x != nil {
return x.Type
}
return CertificateAuthority_TYPE_UNSPECIFIED
}
func (x *CertificateAuthority) GetConfig() *CertificateConfig {
if x != nil {
return x.Config
}
return nil
}
func (x *CertificateAuthority) GetLifetime() *duration.Duration {
if x != nil {
return x.Lifetime
}
return nil
}
func (x *CertificateAuthority) GetKeySpec() *CertificateAuthority_KeyVersionSpec {
if x != nil {
return x.KeySpec
}
return nil
}