2018-01-18 21:49:20 +00:00
|
|
|
// Code generated by protoc-gen-go. DO NOT EDIT.
|
|
|
|
// source: logical/plugin/pb/backend.proto
|
|
|
|
|
2018-06-04 14:19:26 +00:00
|
|
|
package pb // import "github.com/hashicorp/vault/logical/plugin/pb"
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
import proto "github.com/golang/protobuf/proto"
|
|
|
|
import fmt "fmt"
|
|
|
|
import math "math"
|
2018-05-03 19:38:53 +00:00
|
|
|
import timestamp "github.com/golang/protobuf/ptypes/timestamp"
|
2018-06-04 00:48:12 +00:00
|
|
|
import logical "github.com/hashicorp/vault/logical"
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
context "golang.org/x/net/context"
|
|
|
|
grpc "google.golang.org/grpc"
|
|
|
|
)
|
|
|
|
|
|
|
|
// Reference imports to suppress errors if they are not otherwise used.
|
|
|
|
var _ = proto.Marshal
|
|
|
|
var _ = fmt.Errorf
|
|
|
|
var _ = math.Inf
|
|
|
|
|
|
|
|
// This is a compile-time assertion to ensure that this generated file
|
|
|
|
// is compatible with the proto package it is being compiled against.
|
|
|
|
// A compilation error at this line likely means your copy of the
|
|
|
|
// proto package needs to be updated.
|
|
|
|
const _ = proto.ProtoPackageIsVersion2 // please upgrade the proto package
|
|
|
|
|
|
|
|
type Empty struct {
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
func (m *Empty) Reset() { *m = Empty{} }
|
|
|
|
func (m *Empty) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*Empty) ProtoMessage() {}
|
|
|
|
func (*Empty) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{0}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *Empty) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_Empty.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *Empty) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_Empty.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *Empty) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_Empty.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *Empty) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_Empty.Size(m)
|
|
|
|
}
|
|
|
|
func (m *Empty) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_Empty.DiscardUnknown(m)
|
|
|
|
}
|
|
|
|
|
|
|
|
var xxx_messageInfo_Empty proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
type Header struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
Header []string `sentinel:"" protobuf:"bytes,1,rep,name=header,proto3" json:"header,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
func (m *Header) Reset() { *m = Header{} }
|
|
|
|
func (m *Header) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*Header) ProtoMessage() {}
|
|
|
|
func (*Header) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{1}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *Header) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_Header.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *Header) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_Header.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *Header) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_Header.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *Header) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_Header.Size(m)
|
|
|
|
}
|
|
|
|
func (m *Header) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_Header.DiscardUnknown(m)
|
|
|
|
}
|
|
|
|
|
|
|
|
var xxx_messageInfo_Header proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *Header) GetHeader() []string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Header
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type ProtoError struct {
|
2018-02-15 22:20:50 +00:00
|
|
|
// Error type can be one of:
|
|
|
|
// ErrTypeUnknown uint32 = iota
|
|
|
|
// ErrTypeUserError
|
|
|
|
// ErrTypeInternalError
|
|
|
|
// ErrTypeCodedError
|
|
|
|
// ErrTypeStatusBadRequest
|
|
|
|
// ErrTypeUnsupportedOperation
|
|
|
|
// ErrTypeUnsupportedPath
|
|
|
|
// ErrTypeInvalidRequest
|
|
|
|
// ErrTypePermissionDenied
|
|
|
|
// ErrTypeMultiAuthzPending
|
2018-07-11 00:49:48 +00:00
|
|
|
ErrType uint32 `sentinel:"" protobuf:"varint,1,opt,name=err_type,json=errType,proto3" json:"err_type,omitempty"`
|
|
|
|
ErrMsg string `sentinel:"" protobuf:"bytes,2,opt,name=err_msg,json=errMsg,proto3" json:"err_msg,omitempty"`
|
|
|
|
ErrCode int64 `sentinel:"" protobuf:"varint,3,opt,name=err_code,json=errCode,proto3" json:"err_code,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
func (m *ProtoError) Reset() { *m = ProtoError{} }
|
|
|
|
func (m *ProtoError) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*ProtoError) ProtoMessage() {}
|
|
|
|
func (*ProtoError) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{2}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *ProtoError) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_ProtoError.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *ProtoError) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_ProtoError.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *ProtoError) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_ProtoError.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *ProtoError) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_ProtoError.Size(m)
|
|
|
|
}
|
|
|
|
func (m *ProtoError) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_ProtoError.DiscardUnknown(m)
|
|
|
|
}
|
|
|
|
|
|
|
|
var xxx_messageInfo_ProtoError proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *ProtoError) GetErrType() uint32 {
|
|
|
|
if m != nil {
|
|
|
|
return m.ErrType
|
|
|
|
}
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *ProtoError) GetErrMsg() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.ErrMsg
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *ProtoError) GetErrCode() int64 {
|
|
|
|
if m != nil {
|
|
|
|
return m.ErrCode
|
|
|
|
}
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
// Paths is the structure of special paths that is used for SpecialPaths.
|
|
|
|
type Paths struct {
|
|
|
|
// Root are the paths that require a root token to access
|
2018-07-11 00:49:48 +00:00
|
|
|
Root []string `sentinel:"" protobuf:"bytes,1,rep,name=root,proto3" json:"root,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// Unauthenticated are the paths that can be accessed without any auth.
|
2018-07-11 00:49:48 +00:00
|
|
|
Unauthenticated []string `sentinel:"" protobuf:"bytes,2,rep,name=unauthenticated,proto3" json:"unauthenticated,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// LocalStorage are paths (prefixes) that are local to this instance; this
|
|
|
|
// indicates that these paths should not be replicated
|
2018-07-11 00:49:48 +00:00
|
|
|
LocalStorage []string `sentinel:"" protobuf:"bytes,3,rep,name=local_storage,json=localStorage,proto3" json:"local_storage,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// SealWrapStorage are storage paths that, when using a capable seal,
|
|
|
|
// should be seal wrapped with extra encryption. It is exact matching
|
|
|
|
// unless it ends with '/' in which case it will be treated as a prefix.
|
2018-07-11 00:49:48 +00:00
|
|
|
SealWrapStorage []string `sentinel:"" protobuf:"bytes,4,rep,name=seal_wrap_storage,json=sealWrapStorage,proto3" json:"seal_wrap_storage,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Paths) Reset() { *m = Paths{} }
|
|
|
|
func (m *Paths) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*Paths) ProtoMessage() {}
|
|
|
|
func (*Paths) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{3}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *Paths) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_Paths.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *Paths) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_Paths.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *Paths) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_Paths.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *Paths) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_Paths.Size(m)
|
|
|
|
}
|
|
|
|
func (m *Paths) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_Paths.DiscardUnknown(m)
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
var xxx_messageInfo_Paths proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *Paths) GetRoot() []string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Root
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Paths) GetUnauthenticated() []string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Unauthenticated
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Paths) GetLocalStorage() []string {
|
|
|
|
if m != nil {
|
|
|
|
return m.LocalStorage
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Paths) GetSealWrapStorage() []string {
|
|
|
|
if m != nil {
|
|
|
|
return m.SealWrapStorage
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type Request struct {
|
|
|
|
// ID is the uuid associated with each request
|
2018-07-11 00:49:48 +00:00
|
|
|
ID string `sentinel:"" protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// If set, the name given to the replication secondary where this request
|
|
|
|
// originated
|
2018-07-11 00:49:48 +00:00
|
|
|
ReplicationCluster string `sentinel:"" protobuf:"bytes,2,opt,name=ReplicationCluster,proto3" json:"ReplicationCluster,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// Operation is the requested operation type
|
2018-07-11 00:49:48 +00:00
|
|
|
Operation string `sentinel:"" protobuf:"bytes,3,opt,name=operation,proto3" json:"operation,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// Path is the part of the request path not consumed by the
|
|
|
|
// routing. As an example, if the original request path is "prod/aws/foo"
|
|
|
|
// and the AWS logical backend is mounted at "prod/aws/", then the
|
|
|
|
// final path is "foo" since the mount prefix is trimmed.
|
2018-07-11 00:49:48 +00:00
|
|
|
Path string `sentinel:"" protobuf:"bytes,4,opt,name=path,proto3" json:"path,omitempty"`
|
2018-01-26 01:19:27 +00:00
|
|
|
// Request data is a JSON object that must have keys with string type.
|
2018-07-11 00:49:48 +00:00
|
|
|
Data string `sentinel:"" protobuf:"bytes,5,opt,name=data,proto3" json:"data,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// Secret will be non-nil only for Revoke and Renew operations
|
|
|
|
// to represent the secret that was returned prior.
|
2018-07-11 00:49:48 +00:00
|
|
|
Secret *Secret `sentinel:"" protobuf:"bytes,6,opt,name=secret,proto3" json:"secret,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// Auth will be non-nil only for Renew operations
|
|
|
|
// to represent the auth that was returned prior.
|
2018-07-11 00:49:48 +00:00
|
|
|
Auth *Auth `sentinel:"" protobuf:"bytes,7,opt,name=auth,proto3" json:"auth,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// Headers will contain the http headers from the request. This value will
|
|
|
|
// be used in the audit broker to ensure we are auditing only the allowed
|
|
|
|
// headers.
|
2018-07-11 00:49:48 +00:00
|
|
|
Headers map[string]*Header `sentinel:"" protobuf:"bytes,8,rep,name=headers,proto3" json:"headers,omitempty" protobuf_key:"bytes,1,opt,name=key,proto3" protobuf_val:"bytes,2,opt,name=value,proto3"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// ClientToken is provided to the core so that the identity
|
|
|
|
// can be verified and ACLs applied. This value is passed
|
|
|
|
// through to the logical backends but after being salted and
|
|
|
|
// hashed.
|
2018-07-11 00:49:48 +00:00
|
|
|
ClientToken string `sentinel:"" protobuf:"bytes,9,opt,name=client_token,json=clientToken,proto3" json:"client_token,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// ClientTokenAccessor is provided to the core so that the it can get
|
|
|
|
// logged as part of request audit logging.
|
2018-07-11 00:49:48 +00:00
|
|
|
ClientTokenAccessor string `sentinel:"" protobuf:"bytes,10,opt,name=client_token_accessor,json=clientTokenAccessor,proto3" json:"client_token_accessor,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// DisplayName is provided to the logical backend to help associate
|
|
|
|
// dynamic secrets with the source entity. This is not a sensitive
|
|
|
|
// name, but is useful for operators.
|
2018-07-11 00:49:48 +00:00
|
|
|
DisplayName string `sentinel:"" protobuf:"bytes,11,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// MountPoint is provided so that a logical backend can generate
|
|
|
|
// paths relative to itself. The `Path` is effectively the client
|
|
|
|
// request path with the MountPoint trimmed off.
|
2018-07-11 00:49:48 +00:00
|
|
|
MountPoint string `sentinel:"" protobuf:"bytes,12,opt,name=mount_point,json=mountPoint,proto3" json:"mount_point,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// MountType is provided so that a logical backend can make decisions
|
|
|
|
// based on the specific mount type (e.g., if a mount type has different
|
|
|
|
// aliases, generating different defaults depending on the alias)
|
2018-07-11 00:49:48 +00:00
|
|
|
MountType string `sentinel:"" protobuf:"bytes,13,opt,name=mount_type,json=mountType,proto3" json:"mount_type,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// MountAccessor is provided so that identities returned by the authentication
|
|
|
|
// backends can be tied to the mount it belongs to.
|
2018-07-11 00:49:48 +00:00
|
|
|
MountAccessor string `sentinel:"" protobuf:"bytes,14,opt,name=mount_accessor,json=mountAccessor,proto3" json:"mount_accessor,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// WrapInfo contains requested response wrapping parameters
|
2018-07-11 00:49:48 +00:00
|
|
|
WrapInfo *RequestWrapInfo `sentinel:"" protobuf:"bytes,15,opt,name=wrap_info,json=wrapInfo,proto3" json:"wrap_info,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// ClientTokenRemainingUses represents the allowed number of uses left on the
|
|
|
|
// token supplied
|
2018-07-11 00:49:48 +00:00
|
|
|
ClientTokenRemainingUses int64 `sentinel:"" protobuf:"varint,16,opt,name=client_token_remaining_uses,json=clientTokenRemainingUses,proto3" json:"client_token_remaining_uses,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// EntityID is the identity of the caller extracted out of the token used
|
|
|
|
// to make this request
|
2018-07-11 00:49:48 +00:00
|
|
|
EntityID string `sentinel:"" protobuf:"bytes,17,opt,name=entity_id,json=entityId,proto3" json:"entity_id,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// PolicyOverride indicates that the requestor wishes to override
|
|
|
|
// soft-mandatory Sentinel policies
|
2018-07-11 00:49:48 +00:00
|
|
|
PolicyOverride bool `sentinel:"" protobuf:"varint,18,opt,name=policy_override,json=policyOverride,proto3" json:"policy_override,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// Whether the request is unauthenticated, as in, had no client token
|
|
|
|
// attached. Useful in some situations where the client token is not made
|
|
|
|
// accessible.
|
2018-07-11 00:49:48 +00:00
|
|
|
Unauthenticated bool `sentinel:"" protobuf:"varint,19,opt,name=unauthenticated,proto3" json:"unauthenticated,omitempty"`
|
2018-02-17 01:41:01 +00:00
|
|
|
// Connection will be non-nil only for credential providers to
|
|
|
|
// inspect the connection information and potentially use it for
|
|
|
|
// authentication/protection.
|
2018-07-11 00:49:48 +00:00
|
|
|
Connection *Connection `sentinel:"" protobuf:"bytes,20,opt,name=connection,proto3" json:"connection,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
func (m *Request) Reset() { *m = Request{} }
|
|
|
|
func (m *Request) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*Request) ProtoMessage() {}
|
|
|
|
func (*Request) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{4}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *Request) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_Request.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *Request) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_Request.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *Request) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_Request.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *Request) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_Request.Size(m)
|
|
|
|
}
|
|
|
|
func (m *Request) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_Request.DiscardUnknown(m)
|
|
|
|
}
|
|
|
|
|
|
|
|
var xxx_messageInfo_Request proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *Request) GetID() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.ID
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Request) GetReplicationCluster() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.ReplicationCluster
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Request) GetOperation() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Operation
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Request) GetPath() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Path
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
2018-01-23 01:56:34 +00:00
|
|
|
func (m *Request) GetData() string {
|
2018-01-18 21:49:20 +00:00
|
|
|
if m != nil {
|
|
|
|
return m.Data
|
|
|
|
}
|
2018-01-23 01:56:34 +00:00
|
|
|
return ""
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Request) GetSecret() *Secret {
|
|
|
|
if m != nil {
|
|
|
|
return m.Secret
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Request) GetAuth() *Auth {
|
|
|
|
if m != nil {
|
|
|
|
return m.Auth
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Request) GetHeaders() map[string]*Header {
|
|
|
|
if m != nil {
|
|
|
|
return m.Headers
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Request) GetClientToken() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.ClientToken
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Request) GetClientTokenAccessor() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.ClientTokenAccessor
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Request) GetDisplayName() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.DisplayName
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Request) GetMountPoint() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.MountPoint
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Request) GetMountType() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.MountType
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Request) GetMountAccessor() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.MountAccessor
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Request) GetWrapInfo() *RequestWrapInfo {
|
|
|
|
if m != nil {
|
|
|
|
return m.WrapInfo
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Request) GetClientTokenRemainingUses() int64 {
|
|
|
|
if m != nil {
|
|
|
|
return m.ClientTokenRemainingUses
|
|
|
|
}
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Request) GetEntityID() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.EntityID
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Request) GetPolicyOverride() bool {
|
|
|
|
if m != nil {
|
|
|
|
return m.PolicyOverride
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Request) GetUnauthenticated() bool {
|
|
|
|
if m != nil {
|
|
|
|
return m.Unauthenticated
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2018-02-17 01:41:01 +00:00
|
|
|
func (m *Request) GetConnection() *Connection {
|
|
|
|
if m != nil {
|
|
|
|
return m.Connection
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-01-18 21:49:20 +00:00
|
|
|
type Auth struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
LeaseOptions *LeaseOptions `sentinel:"" protobuf:"bytes,1,opt,name=lease_options,json=leaseOptions,proto3" json:"lease_options,omitempty"`
|
2018-01-26 01:19:27 +00:00
|
|
|
// InternalData is a JSON object that is stored with the auth struct.
|
2018-01-18 21:49:20 +00:00
|
|
|
// This will be sent back during a Renew/Revoke for storing internal data
|
|
|
|
// used for those operations.
|
2018-07-11 00:49:48 +00:00
|
|
|
InternalData string `sentinel:"" protobuf:"bytes,2,opt,name=internal_data,json=internalData,proto3" json:"internal_data,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// DisplayName is a non-security sensitive identifier that is
|
|
|
|
// applicable to this Auth. It is used for logging and prefixing
|
|
|
|
// of dynamic secrets. For example, DisplayName may be "armon" for
|
|
|
|
// the github credential backend. If the client token is used to
|
|
|
|
// generate a SQL credential, the user may be "github-armon-uuid".
|
|
|
|
// This is to help identify the source without using audit tables.
|
2018-07-11 00:49:48 +00:00
|
|
|
DisplayName string `sentinel:"" protobuf:"bytes,3,opt,name=display_name,json=displayName,proto3" json:"display_name,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// Policies is the list of policies that the authenticated user
|
|
|
|
// is associated with.
|
2018-07-11 00:49:48 +00:00
|
|
|
Policies []string `sentinel:"" protobuf:"bytes,4,rep,name=policies,proto3" json:"policies,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// Metadata is used to attach arbitrary string-type metadata to
|
|
|
|
// an authenticated user. This metadata will be outputted into the
|
|
|
|
// audit log.
|
2018-07-11 00:49:48 +00:00
|
|
|
Metadata map[string]string `sentinel:"" protobuf:"bytes,5,rep,name=metadata,proto3" json:"metadata,omitempty" protobuf_key:"bytes,1,opt,name=key,proto3" protobuf_val:"bytes,2,opt,name=value,proto3"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// ClientToken is the token that is generated for the authentication.
|
|
|
|
// This will be filled in by Vault core when an auth structure is
|
|
|
|
// returned. Setting this manually will have no effect.
|
2018-07-11 00:49:48 +00:00
|
|
|
ClientToken string `sentinel:"" protobuf:"bytes,6,opt,name=client_token,json=clientToken,proto3" json:"client_token,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// Accessor is the identifier for the ClientToken. This can be used
|
|
|
|
// to perform management functionalities (especially revocation) when
|
|
|
|
// ClientToken in the audit logs are obfuscated. Accessor can be used
|
|
|
|
// to revoke a ClientToken and to lookup the capabilities of the ClientToken,
|
|
|
|
// both without actually knowing the ClientToken.
|
2018-07-11 00:49:48 +00:00
|
|
|
Accessor string `sentinel:"" protobuf:"bytes,7,opt,name=accessor,proto3" json:"accessor,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// Period indicates that the token generated using this Auth object
|
|
|
|
// should never expire. The token should be renewed within the duration
|
|
|
|
// specified by this period.
|
2018-07-11 00:49:48 +00:00
|
|
|
Period int64 `sentinel:"" protobuf:"varint,8,opt,name=period,proto3" json:"period,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// Number of allowed uses of the issued token
|
2018-07-11 00:49:48 +00:00
|
|
|
NumUses int64 `sentinel:"" protobuf:"varint,9,opt,name=num_uses,json=numUses,proto3" json:"num_uses,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// EntityID is the identifier of the entity in identity store to which the
|
|
|
|
// identity of the authenticating client belongs to.
|
2018-07-11 00:49:48 +00:00
|
|
|
EntityID string `sentinel:"" protobuf:"bytes,10,opt,name=entity_id,json=entityId,proto3" json:"entity_id,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// Alias is the information about the authenticated client returned by
|
|
|
|
// the auth backend
|
2018-07-11 00:49:48 +00:00
|
|
|
Alias *logical.Alias `sentinel:"" protobuf:"bytes,11,opt,name=alias,proto3" json:"alias,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// GroupAliases are the informational mappings of external groups which an
|
|
|
|
// authenticated user belongs to. This is used to check if there are
|
|
|
|
// mappings groups for the group aliases in identity store. For all the
|
|
|
|
// matching groups, the entity ID of the user will be added.
|
2018-07-11 00:49:48 +00:00
|
|
|
GroupAliases []*logical.Alias `sentinel:"" protobuf:"bytes,12,rep,name=group_aliases,json=groupAliases,proto3" json:"group_aliases,omitempty"`
|
2018-05-09 22:39:55 +00:00
|
|
|
// If set, restricts usage of the certificates to client IPs falling within
|
|
|
|
// the range of the specified CIDR(s).
|
2018-07-11 00:49:48 +00:00
|
|
|
BoundCidrs []string `sentinel:"" protobuf:"bytes,13,rep,name=bound_cidrs,json=boundCidrs,proto3" json:"bound_cidrs,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Auth) Reset() { *m = Auth{} }
|
|
|
|
func (m *Auth) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*Auth) ProtoMessage() {}
|
|
|
|
func (*Auth) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{5}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *Auth) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_Auth.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *Auth) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_Auth.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *Auth) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_Auth.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *Auth) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_Auth.Size(m)
|
|
|
|
}
|
|
|
|
func (m *Auth) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_Auth.DiscardUnknown(m)
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
var xxx_messageInfo_Auth proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *Auth) GetLeaseOptions() *LeaseOptions {
|
|
|
|
if m != nil {
|
|
|
|
return m.LeaseOptions
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-01-23 01:56:34 +00:00
|
|
|
func (m *Auth) GetInternalData() string {
|
2018-01-18 21:49:20 +00:00
|
|
|
if m != nil {
|
|
|
|
return m.InternalData
|
|
|
|
}
|
2018-01-23 01:56:34 +00:00
|
|
|
return ""
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Auth) GetDisplayName() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.DisplayName
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Auth) GetPolicies() []string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Policies
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Auth) GetMetadata() map[string]string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Metadata
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Auth) GetClientToken() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.ClientToken
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Auth) GetAccessor() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Accessor
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Auth) GetPeriod() int64 {
|
|
|
|
if m != nil {
|
|
|
|
return m.Period
|
|
|
|
}
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Auth) GetNumUses() int64 {
|
|
|
|
if m != nil {
|
|
|
|
return m.NumUses
|
|
|
|
}
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Auth) GetEntityID() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.EntityID
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
2018-06-04 00:48:12 +00:00
|
|
|
func (m *Auth) GetAlias() *logical.Alias {
|
2018-01-18 21:49:20 +00:00
|
|
|
if m != nil {
|
|
|
|
return m.Alias
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-06-04 00:48:12 +00:00
|
|
|
func (m *Auth) GetGroupAliases() []*logical.Alias {
|
2018-01-18 21:49:20 +00:00
|
|
|
if m != nil {
|
|
|
|
return m.GroupAliases
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-05-09 22:39:55 +00:00
|
|
|
func (m *Auth) GetBoundCidrs() []string {
|
|
|
|
if m != nil {
|
|
|
|
return m.BoundCidrs
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-01-18 21:49:20 +00:00
|
|
|
type LeaseOptions struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
TTL int64 `sentinel:"" protobuf:"varint,1,opt,name=TTL,proto3" json:"TTL,omitempty"`
|
|
|
|
Renewable bool `sentinel:"" protobuf:"varint,2,opt,name=renewable,proto3" json:"renewable,omitempty"`
|
|
|
|
Increment int64 `sentinel:"" protobuf:"varint,3,opt,name=increment,proto3" json:"increment,omitempty"`
|
|
|
|
IssueTime *timestamp.Timestamp `sentinel:"" protobuf:"bytes,4,opt,name=issue_time,json=issueTime,proto3" json:"issue_time,omitempty"`
|
|
|
|
MaxTTL int64 `sentinel:"" protobuf:"varint,5,opt,name=MaxTTL,proto3" json:"MaxTTL,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *LeaseOptions) Reset() { *m = LeaseOptions{} }
|
|
|
|
func (m *LeaseOptions) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*LeaseOptions) ProtoMessage() {}
|
|
|
|
func (*LeaseOptions) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{6}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *LeaseOptions) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_LeaseOptions.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *LeaseOptions) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_LeaseOptions.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *LeaseOptions) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_LeaseOptions.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *LeaseOptions) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_LeaseOptions.Size(m)
|
|
|
|
}
|
|
|
|
func (m *LeaseOptions) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_LeaseOptions.DiscardUnknown(m)
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
var xxx_messageInfo_LeaseOptions proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *LeaseOptions) GetTTL() int64 {
|
|
|
|
if m != nil {
|
|
|
|
return m.TTL
|
|
|
|
}
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *LeaseOptions) GetRenewable() bool {
|
|
|
|
if m != nil {
|
|
|
|
return m.Renewable
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *LeaseOptions) GetIncrement() int64 {
|
|
|
|
if m != nil {
|
|
|
|
return m.Increment
|
|
|
|
}
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
func (m *LeaseOptions) GetIssueTime() *timestamp.Timestamp {
|
2018-01-18 21:49:20 +00:00
|
|
|
if m != nil {
|
|
|
|
return m.IssueTime
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-04-03 16:20:20 +00:00
|
|
|
func (m *LeaseOptions) GetMaxTTL() int64 {
|
|
|
|
if m != nil {
|
|
|
|
return m.MaxTTL
|
|
|
|
}
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
2018-01-18 21:49:20 +00:00
|
|
|
type Secret struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
LeaseOptions *LeaseOptions `sentinel:"" protobuf:"bytes,1,opt,name=lease_options,json=leaseOptions,proto3" json:"lease_options,omitempty"`
|
2018-01-26 01:19:27 +00:00
|
|
|
// InternalData is a JSON object that is stored with the secret.
|
2018-01-18 21:49:20 +00:00
|
|
|
// This will be sent back during a Renew/Revoke for storing internal data
|
|
|
|
// used for those operations.
|
2018-07-11 00:49:48 +00:00
|
|
|
InternalData string `sentinel:"" protobuf:"bytes,2,opt,name=internal_data,json=internalData,proto3" json:"internal_data,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// LeaseID is the ID returned to the user to manage this secret.
|
|
|
|
// This is generated by Vault core. Any set value will be ignored.
|
|
|
|
// For requests, this will always be blank.
|
2018-07-11 00:49:48 +00:00
|
|
|
LeaseID string `sentinel:"" protobuf:"bytes,3,opt,name=lease_id,json=leaseId,proto3" json:"lease_id,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
func (m *Secret) Reset() { *m = Secret{} }
|
|
|
|
func (m *Secret) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*Secret) ProtoMessage() {}
|
|
|
|
func (*Secret) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{7}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *Secret) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_Secret.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *Secret) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_Secret.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *Secret) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_Secret.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *Secret) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_Secret.Size(m)
|
|
|
|
}
|
|
|
|
func (m *Secret) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_Secret.DiscardUnknown(m)
|
|
|
|
}
|
|
|
|
|
|
|
|
var xxx_messageInfo_Secret proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *Secret) GetLeaseOptions() *LeaseOptions {
|
|
|
|
if m != nil {
|
|
|
|
return m.LeaseOptions
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-01-23 01:56:34 +00:00
|
|
|
func (m *Secret) GetInternalData() string {
|
2018-01-18 21:49:20 +00:00
|
|
|
if m != nil {
|
|
|
|
return m.InternalData
|
|
|
|
}
|
2018-01-23 01:56:34 +00:00
|
|
|
return ""
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Secret) GetLeaseID() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.LeaseID
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
type Response struct {
|
|
|
|
// Secret, if not nil, denotes that this response represents a secret.
|
2018-07-11 00:49:48 +00:00
|
|
|
Secret *Secret `sentinel:"" protobuf:"bytes,1,opt,name=secret,proto3" json:"secret,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// Auth, if not nil, contains the authentication information for
|
|
|
|
// this response. This is only checked and means something for
|
|
|
|
// credential backends.
|
2018-07-11 00:49:48 +00:00
|
|
|
Auth *Auth `sentinel:"" protobuf:"bytes,2,opt,name=auth,proto3" json:"auth,omitempty"`
|
2018-01-26 01:19:27 +00:00
|
|
|
// Response data is a JSON object that must have string keys. For
|
2018-01-18 21:49:20 +00:00
|
|
|
// secrets, this data is sent down to the user as-is. To store internal
|
|
|
|
// data that you don't want the user to see, store it in
|
|
|
|
// Secret.InternalData.
|
2018-07-11 00:49:48 +00:00
|
|
|
Data string `sentinel:"" protobuf:"bytes,3,opt,name=data,proto3" json:"data,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// Redirect is an HTTP URL to redirect to for further authentication.
|
|
|
|
// This is only valid for credential backends. This will be blanked
|
|
|
|
// for any logical backend and ignored.
|
2018-07-11 00:49:48 +00:00
|
|
|
Redirect string `sentinel:"" protobuf:"bytes,4,opt,name=redirect,proto3" json:"redirect,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// Warnings allow operations or backends to return warnings in response
|
|
|
|
// to user actions without failing the action outright.
|
2018-07-11 00:49:48 +00:00
|
|
|
Warnings []string `sentinel:"" protobuf:"bytes,5,rep,name=warnings,proto3" json:"warnings,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// Information for wrapping the response in a cubbyhole
|
2018-07-11 00:49:48 +00:00
|
|
|
WrapInfo *ResponseWrapInfo `sentinel:"" protobuf:"bytes,6,opt,name=wrap_info,json=wrapInfo,proto3" json:"wrap_info,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Response) Reset() { *m = Response{} }
|
|
|
|
func (m *Response) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*Response) ProtoMessage() {}
|
|
|
|
func (*Response) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{8}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *Response) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_Response.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *Response) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_Response.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *Response) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_Response.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *Response) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_Response.Size(m)
|
|
|
|
}
|
|
|
|
func (m *Response) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_Response.DiscardUnknown(m)
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
var xxx_messageInfo_Response proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *Response) GetSecret() *Secret {
|
|
|
|
if m != nil {
|
|
|
|
return m.Secret
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Response) GetAuth() *Auth {
|
|
|
|
if m != nil {
|
|
|
|
return m.Auth
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-01-23 01:56:34 +00:00
|
|
|
func (m *Response) GetData() string {
|
2018-01-18 21:49:20 +00:00
|
|
|
if m != nil {
|
|
|
|
return m.Data
|
|
|
|
}
|
2018-01-23 01:56:34 +00:00
|
|
|
return ""
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Response) GetRedirect() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Redirect
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Response) GetWarnings() []string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Warnings
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Response) GetWrapInfo() *ResponseWrapInfo {
|
|
|
|
if m != nil {
|
|
|
|
return m.WrapInfo
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type ResponseWrapInfo struct {
|
|
|
|
// Setting to non-zero specifies that the response should be wrapped.
|
|
|
|
// Specifies the desired TTL of the wrapping token.
|
2018-07-11 00:49:48 +00:00
|
|
|
TTL int64 `sentinel:"" protobuf:"varint,1,opt,name=TTL,proto3" json:"TTL,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// The token containing the wrapped response
|
2018-07-11 00:49:48 +00:00
|
|
|
Token string `sentinel:"" protobuf:"bytes,2,opt,name=token,proto3" json:"token,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// The token accessor for the wrapped response token
|
2018-07-11 00:49:48 +00:00
|
|
|
Accessor string `sentinel:"" protobuf:"bytes,3,opt,name=accessor,proto3" json:"accessor,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// The creation time. This can be used with the TTL to figure out an
|
|
|
|
// expected expiration.
|
2018-07-11 00:49:48 +00:00
|
|
|
CreationTime *timestamp.Timestamp `sentinel:"" protobuf:"bytes,4,opt,name=creation_time,json=creationTime,proto3" json:"creation_time,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// If the contained response is the output of a token creation call, the
|
|
|
|
// created token's accessor will be accessible here
|
2018-07-11 00:49:48 +00:00
|
|
|
WrappedAccessor string `sentinel:"" protobuf:"bytes,5,opt,name=wrapped_accessor,json=wrappedAccessor,proto3" json:"wrapped_accessor,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// WrappedEntityID is the entity identifier of the caller who initiated the
|
|
|
|
// wrapping request
|
2018-07-11 00:49:48 +00:00
|
|
|
WrappedEntityID string `sentinel:"" protobuf:"bytes,6,opt,name=wrapped_entity_id,json=wrappedEntityID,proto3" json:"wrapped_entity_id,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// The format to use. This doesn't get returned, it's only internal.
|
2018-07-11 00:49:48 +00:00
|
|
|
Format string `sentinel:"" protobuf:"bytes,7,opt,name=format,proto3" json:"format,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// CreationPath is the original request path that was used to create
|
|
|
|
// the wrapped response.
|
2018-07-11 00:49:48 +00:00
|
|
|
CreationPath string `sentinel:"" protobuf:"bytes,8,opt,name=creation_path,json=creationPath,proto3" json:"creation_path,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// Controls seal wrapping behavior downstream for specific use cases
|
2018-07-11 00:49:48 +00:00
|
|
|
SealWrap bool `sentinel:"" protobuf:"varint,9,opt,name=seal_wrap,json=sealWrap,proto3" json:"seal_wrap,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *ResponseWrapInfo) Reset() { *m = ResponseWrapInfo{} }
|
|
|
|
func (m *ResponseWrapInfo) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*ResponseWrapInfo) ProtoMessage() {}
|
|
|
|
func (*ResponseWrapInfo) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{9}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *ResponseWrapInfo) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_ResponseWrapInfo.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *ResponseWrapInfo) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_ResponseWrapInfo.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *ResponseWrapInfo) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_ResponseWrapInfo.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *ResponseWrapInfo) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_ResponseWrapInfo.Size(m)
|
|
|
|
}
|
|
|
|
func (m *ResponseWrapInfo) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_ResponseWrapInfo.DiscardUnknown(m)
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
var xxx_messageInfo_ResponseWrapInfo proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *ResponseWrapInfo) GetTTL() int64 {
|
|
|
|
if m != nil {
|
|
|
|
return m.TTL
|
|
|
|
}
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *ResponseWrapInfo) GetToken() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Token
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *ResponseWrapInfo) GetAccessor() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Accessor
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
func (m *ResponseWrapInfo) GetCreationTime() *timestamp.Timestamp {
|
2018-01-18 21:49:20 +00:00
|
|
|
if m != nil {
|
|
|
|
return m.CreationTime
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *ResponseWrapInfo) GetWrappedAccessor() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.WrappedAccessor
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *ResponseWrapInfo) GetWrappedEntityID() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.WrappedEntityID
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *ResponseWrapInfo) GetFormat() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Format
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *ResponseWrapInfo) GetCreationPath() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.CreationPath
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *ResponseWrapInfo) GetSealWrap() bool {
|
|
|
|
if m != nil {
|
|
|
|
return m.SealWrap
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
type RequestWrapInfo struct {
|
|
|
|
// Setting to non-zero specifies that the response should be wrapped.
|
|
|
|
// Specifies the desired TTL of the wrapping token.
|
2018-07-11 00:49:48 +00:00
|
|
|
TTL int64 `sentinel:"" protobuf:"varint,1,opt,name=TTL,proto3" json:"TTL,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// The format to use for the wrapped response; if not specified it's a bare
|
|
|
|
// token
|
2018-07-11 00:49:48 +00:00
|
|
|
Format string `sentinel:"" protobuf:"bytes,2,opt,name=format,proto3" json:"format,omitempty"`
|
2018-01-18 21:49:20 +00:00
|
|
|
// A flag to conforming backends that data for a given request should be
|
|
|
|
// seal wrapped
|
2018-07-11 00:49:48 +00:00
|
|
|
SealWrap bool `sentinel:"" protobuf:"varint,3,opt,name=seal_wrap,json=sealWrap,proto3" json:"seal_wrap,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
func (m *RequestWrapInfo) Reset() { *m = RequestWrapInfo{} }
|
|
|
|
func (m *RequestWrapInfo) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*RequestWrapInfo) ProtoMessage() {}
|
|
|
|
func (*RequestWrapInfo) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{10}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *RequestWrapInfo) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_RequestWrapInfo.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *RequestWrapInfo) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_RequestWrapInfo.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *RequestWrapInfo) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_RequestWrapInfo.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *RequestWrapInfo) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_RequestWrapInfo.Size(m)
|
|
|
|
}
|
|
|
|
func (m *RequestWrapInfo) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_RequestWrapInfo.DiscardUnknown(m)
|
|
|
|
}
|
|
|
|
|
|
|
|
var xxx_messageInfo_RequestWrapInfo proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *RequestWrapInfo) GetTTL() int64 {
|
|
|
|
if m != nil {
|
|
|
|
return m.TTL
|
|
|
|
}
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *RequestWrapInfo) GetFormat() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Format
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *RequestWrapInfo) GetSealWrap() bool {
|
|
|
|
if m != nil {
|
|
|
|
return m.SealWrap
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// HandleRequestArgs is the args for HandleRequest method.
|
|
|
|
type HandleRequestArgs struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
StorageID uint32 `sentinel:"" protobuf:"varint,1,opt,name=storage_id,json=storageId,proto3" json:"storage_id,omitempty"`
|
|
|
|
Request *Request `sentinel:"" protobuf:"bytes,2,opt,name=request,proto3" json:"request,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
func (m *HandleRequestArgs) Reset() { *m = HandleRequestArgs{} }
|
|
|
|
func (m *HandleRequestArgs) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*HandleRequestArgs) ProtoMessage() {}
|
|
|
|
func (*HandleRequestArgs) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{11}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *HandleRequestArgs) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_HandleRequestArgs.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *HandleRequestArgs) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_HandleRequestArgs.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *HandleRequestArgs) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_HandleRequestArgs.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *HandleRequestArgs) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_HandleRequestArgs.Size(m)
|
|
|
|
}
|
|
|
|
func (m *HandleRequestArgs) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_HandleRequestArgs.DiscardUnknown(m)
|
|
|
|
}
|
|
|
|
|
|
|
|
var xxx_messageInfo_HandleRequestArgs proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *HandleRequestArgs) GetStorageID() uint32 {
|
|
|
|
if m != nil {
|
|
|
|
return m.StorageID
|
|
|
|
}
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *HandleRequestArgs) GetRequest() *Request {
|
|
|
|
if m != nil {
|
|
|
|
return m.Request
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// HandleRequestReply is the reply for HandleRequest method.
|
|
|
|
type HandleRequestReply struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
Response *Response `sentinel:"" protobuf:"bytes,1,opt,name=response,proto3" json:"response,omitempty"`
|
|
|
|
Err *ProtoError `sentinel:"" protobuf:"bytes,2,opt,name=err,proto3" json:"err,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
func (m *HandleRequestReply) Reset() { *m = HandleRequestReply{} }
|
|
|
|
func (m *HandleRequestReply) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*HandleRequestReply) ProtoMessage() {}
|
|
|
|
func (*HandleRequestReply) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{12}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *HandleRequestReply) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_HandleRequestReply.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *HandleRequestReply) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_HandleRequestReply.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *HandleRequestReply) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_HandleRequestReply.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *HandleRequestReply) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_HandleRequestReply.Size(m)
|
|
|
|
}
|
|
|
|
func (m *HandleRequestReply) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_HandleRequestReply.DiscardUnknown(m)
|
|
|
|
}
|
|
|
|
|
|
|
|
var xxx_messageInfo_HandleRequestReply proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *HandleRequestReply) GetResponse() *Response {
|
|
|
|
if m != nil {
|
|
|
|
return m.Response
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *HandleRequestReply) GetErr() *ProtoError {
|
|
|
|
if m != nil {
|
|
|
|
return m.Err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// SpecialPathsReply is the reply for SpecialPaths method.
|
|
|
|
type SpecialPathsReply struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
Paths *Paths `sentinel:"" protobuf:"bytes,1,opt,name=paths,proto3" json:"paths,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *SpecialPathsReply) Reset() { *m = SpecialPathsReply{} }
|
|
|
|
func (m *SpecialPathsReply) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*SpecialPathsReply) ProtoMessage() {}
|
|
|
|
func (*SpecialPathsReply) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{13}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *SpecialPathsReply) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_SpecialPathsReply.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *SpecialPathsReply) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_SpecialPathsReply.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *SpecialPathsReply) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_SpecialPathsReply.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *SpecialPathsReply) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_SpecialPathsReply.Size(m)
|
|
|
|
}
|
|
|
|
func (m *SpecialPathsReply) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_SpecialPathsReply.DiscardUnknown(m)
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
var xxx_messageInfo_SpecialPathsReply proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *SpecialPathsReply) GetPaths() *Paths {
|
|
|
|
if m != nil {
|
|
|
|
return m.Paths
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// HandleExistenceCheckArgs is the args for HandleExistenceCheck method.
|
|
|
|
type HandleExistenceCheckArgs struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
StorageID uint32 `sentinel:"" protobuf:"varint,1,opt,name=storage_id,json=storageId,proto3" json:"storage_id,omitempty"`
|
|
|
|
Request *Request `sentinel:"" protobuf:"bytes,2,opt,name=request,proto3" json:"request,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
func (m *HandleExistenceCheckArgs) Reset() { *m = HandleExistenceCheckArgs{} }
|
|
|
|
func (m *HandleExistenceCheckArgs) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*HandleExistenceCheckArgs) ProtoMessage() {}
|
|
|
|
func (*HandleExistenceCheckArgs) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{14}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *HandleExistenceCheckArgs) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_HandleExistenceCheckArgs.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *HandleExistenceCheckArgs) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_HandleExistenceCheckArgs.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *HandleExistenceCheckArgs) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_HandleExistenceCheckArgs.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *HandleExistenceCheckArgs) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_HandleExistenceCheckArgs.Size(m)
|
|
|
|
}
|
|
|
|
func (m *HandleExistenceCheckArgs) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_HandleExistenceCheckArgs.DiscardUnknown(m)
|
|
|
|
}
|
|
|
|
|
|
|
|
var xxx_messageInfo_HandleExistenceCheckArgs proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *HandleExistenceCheckArgs) GetStorageID() uint32 {
|
|
|
|
if m != nil {
|
|
|
|
return m.StorageID
|
|
|
|
}
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *HandleExistenceCheckArgs) GetRequest() *Request {
|
|
|
|
if m != nil {
|
|
|
|
return m.Request
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// HandleExistenceCheckReply is the reply for HandleExistenceCheck method.
|
|
|
|
type HandleExistenceCheckReply struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
CheckFound bool `sentinel:"" protobuf:"varint,1,opt,name=check_found,json=checkFound,proto3" json:"check_found,omitempty"`
|
|
|
|
Exists bool `sentinel:"" protobuf:"varint,2,opt,name=exists,proto3" json:"exists,omitempty"`
|
|
|
|
Err *ProtoError `sentinel:"" protobuf:"bytes,3,opt,name=err,proto3" json:"err,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *HandleExistenceCheckReply) Reset() { *m = HandleExistenceCheckReply{} }
|
|
|
|
func (m *HandleExistenceCheckReply) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*HandleExistenceCheckReply) ProtoMessage() {}
|
|
|
|
func (*HandleExistenceCheckReply) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{15}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *HandleExistenceCheckReply) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_HandleExistenceCheckReply.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *HandleExistenceCheckReply) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_HandleExistenceCheckReply.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *HandleExistenceCheckReply) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_HandleExistenceCheckReply.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *HandleExistenceCheckReply) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_HandleExistenceCheckReply.Size(m)
|
|
|
|
}
|
|
|
|
func (m *HandleExistenceCheckReply) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_HandleExistenceCheckReply.DiscardUnknown(m)
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
var xxx_messageInfo_HandleExistenceCheckReply proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *HandleExistenceCheckReply) GetCheckFound() bool {
|
|
|
|
if m != nil {
|
|
|
|
return m.CheckFound
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *HandleExistenceCheckReply) GetExists() bool {
|
|
|
|
if m != nil {
|
|
|
|
return m.Exists
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *HandleExistenceCheckReply) GetErr() *ProtoError {
|
|
|
|
if m != nil {
|
|
|
|
return m.Err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetupArgs is the args for Setup method.
|
|
|
|
type SetupArgs struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
BrokerID uint32 `sentinel:"" protobuf:"varint,1,opt,name=broker_id,json=brokerId,proto3" json:"broker_id,omitempty"`
|
|
|
|
Config map[string]string `sentinel:"" protobuf:"bytes,2,rep,name=Config,proto3" json:"Config,omitempty" protobuf_key:"bytes,1,opt,name=key,proto3" protobuf_val:"bytes,2,opt,name=value,proto3"`
|
|
|
|
BackendUUID string `sentinel:"" protobuf:"bytes,3,opt,name=backendUUID,proto3" json:"backendUUID,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
func (m *SetupArgs) Reset() { *m = SetupArgs{} }
|
|
|
|
func (m *SetupArgs) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*SetupArgs) ProtoMessage() {}
|
|
|
|
func (*SetupArgs) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{16}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *SetupArgs) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_SetupArgs.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *SetupArgs) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_SetupArgs.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *SetupArgs) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_SetupArgs.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *SetupArgs) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_SetupArgs.Size(m)
|
|
|
|
}
|
|
|
|
func (m *SetupArgs) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_SetupArgs.DiscardUnknown(m)
|
|
|
|
}
|
|
|
|
|
|
|
|
var xxx_messageInfo_SetupArgs proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *SetupArgs) GetBrokerID() uint32 {
|
|
|
|
if m != nil {
|
|
|
|
return m.BrokerID
|
|
|
|
}
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *SetupArgs) GetConfig() map[string]string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Config
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-03-21 19:04:27 +00:00
|
|
|
func (m *SetupArgs) GetBackendUUID() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.BackendUUID
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
2018-01-18 21:49:20 +00:00
|
|
|
// SetupReply is the reply for Setup method.
|
|
|
|
type SetupReply struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
Err string `sentinel:"" protobuf:"bytes,1,opt,name=err,proto3" json:"err,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *SetupReply) Reset() { *m = SetupReply{} }
|
|
|
|
func (m *SetupReply) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*SetupReply) ProtoMessage() {}
|
|
|
|
func (*SetupReply) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{17}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *SetupReply) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_SetupReply.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *SetupReply) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_SetupReply.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *SetupReply) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_SetupReply.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *SetupReply) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_SetupReply.Size(m)
|
|
|
|
}
|
|
|
|
func (m *SetupReply) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_SetupReply.DiscardUnknown(m)
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
var xxx_messageInfo_SetupReply proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *SetupReply) GetErr() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Err
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
// TypeReply is the reply for the Type method.
|
|
|
|
type TypeReply struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
Type uint32 `sentinel:"" protobuf:"varint,1,opt,name=type,proto3" json:"type,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *TypeReply) Reset() { *m = TypeReply{} }
|
|
|
|
func (m *TypeReply) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*TypeReply) ProtoMessage() {}
|
|
|
|
func (*TypeReply) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{18}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *TypeReply) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_TypeReply.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *TypeReply) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_TypeReply.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *TypeReply) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_TypeReply.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *TypeReply) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_TypeReply.Size(m)
|
|
|
|
}
|
|
|
|
func (m *TypeReply) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_TypeReply.DiscardUnknown(m)
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
var xxx_messageInfo_TypeReply proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *TypeReply) GetType() uint32 {
|
|
|
|
if m != nil {
|
|
|
|
return m.Type
|
|
|
|
}
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
type InvalidateKeyArgs struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
Key string `sentinel:"" protobuf:"bytes,1,opt,name=key,proto3" json:"key,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
func (m *InvalidateKeyArgs) Reset() { *m = InvalidateKeyArgs{} }
|
|
|
|
func (m *InvalidateKeyArgs) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*InvalidateKeyArgs) ProtoMessage() {}
|
|
|
|
func (*InvalidateKeyArgs) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{19}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *InvalidateKeyArgs) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_InvalidateKeyArgs.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *InvalidateKeyArgs) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_InvalidateKeyArgs.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *InvalidateKeyArgs) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_InvalidateKeyArgs.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *InvalidateKeyArgs) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_InvalidateKeyArgs.Size(m)
|
|
|
|
}
|
|
|
|
func (m *InvalidateKeyArgs) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_InvalidateKeyArgs.DiscardUnknown(m)
|
|
|
|
}
|
|
|
|
|
|
|
|
var xxx_messageInfo_InvalidateKeyArgs proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *InvalidateKeyArgs) GetKey() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Key
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
type StorageEntry struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
Key string `sentinel:"" protobuf:"bytes,1,opt,name=key,proto3" json:"key,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
Value []byte `sentinel:"" protobuf:"bytes,2,opt,name=value,proto3" json:"value,omitempty"`
|
2018-07-11 00:49:48 +00:00
|
|
|
SealWrap bool `sentinel:"" protobuf:"varint,3,opt,name=seal_wrap,json=sealWrap,proto3" json:"seal_wrap,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *StorageEntry) Reset() { *m = StorageEntry{} }
|
|
|
|
func (m *StorageEntry) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*StorageEntry) ProtoMessage() {}
|
|
|
|
func (*StorageEntry) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{20}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *StorageEntry) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_StorageEntry.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *StorageEntry) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_StorageEntry.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *StorageEntry) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_StorageEntry.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *StorageEntry) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_StorageEntry.Size(m)
|
|
|
|
}
|
|
|
|
func (m *StorageEntry) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_StorageEntry.DiscardUnknown(m)
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
var xxx_messageInfo_StorageEntry proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *StorageEntry) GetKey() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Key
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *StorageEntry) GetValue() []byte {
|
|
|
|
if m != nil {
|
|
|
|
return m.Value
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *StorageEntry) GetSealWrap() bool {
|
|
|
|
if m != nil {
|
|
|
|
return m.SealWrap
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
type StorageListArgs struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
Prefix string `sentinel:"" protobuf:"bytes,1,opt,name=prefix,proto3" json:"prefix,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
func (m *StorageListArgs) Reset() { *m = StorageListArgs{} }
|
|
|
|
func (m *StorageListArgs) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*StorageListArgs) ProtoMessage() {}
|
|
|
|
func (*StorageListArgs) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{21}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *StorageListArgs) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_StorageListArgs.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *StorageListArgs) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_StorageListArgs.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *StorageListArgs) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_StorageListArgs.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *StorageListArgs) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_StorageListArgs.Size(m)
|
|
|
|
}
|
|
|
|
func (m *StorageListArgs) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_StorageListArgs.DiscardUnknown(m)
|
|
|
|
}
|
|
|
|
|
|
|
|
var xxx_messageInfo_StorageListArgs proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *StorageListArgs) GetPrefix() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Prefix
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
type StorageListReply struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
Keys []string `sentinel:"" protobuf:"bytes,1,rep,name=keys,proto3" json:"keys,omitempty"`
|
|
|
|
Err string `sentinel:"" protobuf:"bytes,2,opt,name=err,proto3" json:"err,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
func (m *StorageListReply) Reset() { *m = StorageListReply{} }
|
|
|
|
func (m *StorageListReply) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*StorageListReply) ProtoMessage() {}
|
|
|
|
func (*StorageListReply) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{22}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *StorageListReply) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_StorageListReply.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *StorageListReply) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_StorageListReply.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *StorageListReply) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_StorageListReply.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *StorageListReply) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_StorageListReply.Size(m)
|
|
|
|
}
|
|
|
|
func (m *StorageListReply) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_StorageListReply.DiscardUnknown(m)
|
|
|
|
}
|
|
|
|
|
|
|
|
var xxx_messageInfo_StorageListReply proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *StorageListReply) GetKeys() []string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Keys
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *StorageListReply) GetErr() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Err
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
type StorageGetArgs struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
Key string `sentinel:"" protobuf:"bytes,1,opt,name=key,proto3" json:"key,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *StorageGetArgs) Reset() { *m = StorageGetArgs{} }
|
|
|
|
func (m *StorageGetArgs) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*StorageGetArgs) ProtoMessage() {}
|
|
|
|
func (*StorageGetArgs) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{23}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *StorageGetArgs) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_StorageGetArgs.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *StorageGetArgs) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_StorageGetArgs.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *StorageGetArgs) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_StorageGetArgs.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *StorageGetArgs) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_StorageGetArgs.Size(m)
|
|
|
|
}
|
|
|
|
func (m *StorageGetArgs) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_StorageGetArgs.DiscardUnknown(m)
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
var xxx_messageInfo_StorageGetArgs proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *StorageGetArgs) GetKey() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Key
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
type StorageGetReply struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
Entry *StorageEntry `sentinel:"" protobuf:"bytes,1,opt,name=entry,proto3" json:"entry,omitempty"`
|
|
|
|
Err string `sentinel:"" protobuf:"bytes,2,opt,name=err,proto3" json:"err,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
func (m *StorageGetReply) Reset() { *m = StorageGetReply{} }
|
|
|
|
func (m *StorageGetReply) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*StorageGetReply) ProtoMessage() {}
|
|
|
|
func (*StorageGetReply) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{24}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *StorageGetReply) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_StorageGetReply.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *StorageGetReply) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_StorageGetReply.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *StorageGetReply) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_StorageGetReply.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *StorageGetReply) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_StorageGetReply.Size(m)
|
|
|
|
}
|
|
|
|
func (m *StorageGetReply) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_StorageGetReply.DiscardUnknown(m)
|
|
|
|
}
|
|
|
|
|
|
|
|
var xxx_messageInfo_StorageGetReply proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *StorageGetReply) GetEntry() *StorageEntry {
|
|
|
|
if m != nil {
|
|
|
|
return m.Entry
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *StorageGetReply) GetErr() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Err
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
type StoragePutArgs struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
Entry *StorageEntry `sentinel:"" protobuf:"bytes,1,opt,name=entry,proto3" json:"entry,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
func (m *StoragePutArgs) Reset() { *m = StoragePutArgs{} }
|
|
|
|
func (m *StoragePutArgs) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*StoragePutArgs) ProtoMessage() {}
|
|
|
|
func (*StoragePutArgs) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{25}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *StoragePutArgs) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_StoragePutArgs.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *StoragePutArgs) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_StoragePutArgs.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *StoragePutArgs) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_StoragePutArgs.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *StoragePutArgs) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_StoragePutArgs.Size(m)
|
|
|
|
}
|
|
|
|
func (m *StoragePutArgs) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_StoragePutArgs.DiscardUnknown(m)
|
|
|
|
}
|
|
|
|
|
|
|
|
var xxx_messageInfo_StoragePutArgs proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *StoragePutArgs) GetEntry() *StorageEntry {
|
|
|
|
if m != nil {
|
|
|
|
return m.Entry
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type StoragePutReply struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
Err string `sentinel:"" protobuf:"bytes,1,opt,name=err,proto3" json:"err,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *StoragePutReply) Reset() { *m = StoragePutReply{} }
|
|
|
|
func (m *StoragePutReply) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*StoragePutReply) ProtoMessage() {}
|
|
|
|
func (*StoragePutReply) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{26}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *StoragePutReply) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_StoragePutReply.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *StoragePutReply) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_StoragePutReply.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *StoragePutReply) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_StoragePutReply.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *StoragePutReply) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_StoragePutReply.Size(m)
|
|
|
|
}
|
|
|
|
func (m *StoragePutReply) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_StoragePutReply.DiscardUnknown(m)
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
var xxx_messageInfo_StoragePutReply proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *StoragePutReply) GetErr() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Err
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
type StorageDeleteArgs struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
Key string `sentinel:"" protobuf:"bytes,1,opt,name=key,proto3" json:"key,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *StorageDeleteArgs) Reset() { *m = StorageDeleteArgs{} }
|
|
|
|
func (m *StorageDeleteArgs) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*StorageDeleteArgs) ProtoMessage() {}
|
|
|
|
func (*StorageDeleteArgs) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{27}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *StorageDeleteArgs) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_StorageDeleteArgs.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *StorageDeleteArgs) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_StorageDeleteArgs.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *StorageDeleteArgs) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_StorageDeleteArgs.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *StorageDeleteArgs) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_StorageDeleteArgs.Size(m)
|
|
|
|
}
|
|
|
|
func (m *StorageDeleteArgs) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_StorageDeleteArgs.DiscardUnknown(m)
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
var xxx_messageInfo_StorageDeleteArgs proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *StorageDeleteArgs) GetKey() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Key
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
type StorageDeleteReply struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
Err string `sentinel:"" protobuf:"bytes,1,opt,name=err,proto3" json:"err,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *StorageDeleteReply) Reset() { *m = StorageDeleteReply{} }
|
|
|
|
func (m *StorageDeleteReply) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*StorageDeleteReply) ProtoMessage() {}
|
|
|
|
func (*StorageDeleteReply) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{28}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *StorageDeleteReply) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_StorageDeleteReply.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *StorageDeleteReply) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_StorageDeleteReply.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *StorageDeleteReply) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_StorageDeleteReply.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *StorageDeleteReply) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_StorageDeleteReply.Size(m)
|
|
|
|
}
|
|
|
|
func (m *StorageDeleteReply) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_StorageDeleteReply.DiscardUnknown(m)
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
var xxx_messageInfo_StorageDeleteReply proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *StorageDeleteReply) GetErr() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Err
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
type TTLReply struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
TTL int64 `sentinel:"" protobuf:"varint,1,opt,name=TTL,proto3" json:"TTL,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
2018-05-03 17:19:39 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
func (m *TTLReply) Reset() { *m = TTLReply{} }
|
|
|
|
func (m *TTLReply) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*TTLReply) ProtoMessage() {}
|
|
|
|
func (*TTLReply) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{29}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *TTLReply) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_TTLReply.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *TTLReply) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_TTLReply.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *TTLReply) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_TTLReply.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *TTLReply) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_TTLReply.Size(m)
|
|
|
|
}
|
|
|
|
func (m *TTLReply) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_TTLReply.DiscardUnknown(m)
|
|
|
|
}
|
|
|
|
|
|
|
|
var xxx_messageInfo_TTLReply proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *TTLReply) GetTTL() int64 {
|
|
|
|
if m != nil {
|
|
|
|
return m.TTL
|
|
|
|
}
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
type SudoPrivilegeArgs struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
Path string `sentinel:"" protobuf:"bytes,1,opt,name=path,proto3" json:"path,omitempty"`
|
|
|
|
Token string `sentinel:"" protobuf:"bytes,2,opt,name=token,proto3" json:"token,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
2018-05-03 17:19:39 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
func (m *SudoPrivilegeArgs) Reset() { *m = SudoPrivilegeArgs{} }
|
|
|
|
func (m *SudoPrivilegeArgs) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*SudoPrivilegeArgs) ProtoMessage() {}
|
|
|
|
func (*SudoPrivilegeArgs) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{30}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *SudoPrivilegeArgs) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_SudoPrivilegeArgs.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *SudoPrivilegeArgs) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_SudoPrivilegeArgs.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *SudoPrivilegeArgs) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_SudoPrivilegeArgs.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *SudoPrivilegeArgs) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_SudoPrivilegeArgs.Size(m)
|
|
|
|
}
|
|
|
|
func (m *SudoPrivilegeArgs) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_SudoPrivilegeArgs.DiscardUnknown(m)
|
|
|
|
}
|
|
|
|
|
|
|
|
var xxx_messageInfo_SudoPrivilegeArgs proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *SudoPrivilegeArgs) GetPath() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Path
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *SudoPrivilegeArgs) GetToken() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Token
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
type SudoPrivilegeReply struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
Sudo bool `sentinel:"" protobuf:"varint,1,opt,name=sudo,proto3" json:"sudo,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *SudoPrivilegeReply) Reset() { *m = SudoPrivilegeReply{} }
|
|
|
|
func (m *SudoPrivilegeReply) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*SudoPrivilegeReply) ProtoMessage() {}
|
|
|
|
func (*SudoPrivilegeReply) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{31}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *SudoPrivilegeReply) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_SudoPrivilegeReply.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *SudoPrivilegeReply) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_SudoPrivilegeReply.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *SudoPrivilegeReply) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_SudoPrivilegeReply.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *SudoPrivilegeReply) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_SudoPrivilegeReply.Size(m)
|
|
|
|
}
|
|
|
|
func (m *SudoPrivilegeReply) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_SudoPrivilegeReply.DiscardUnknown(m)
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
var xxx_messageInfo_SudoPrivilegeReply proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *SudoPrivilegeReply) GetSudo() bool {
|
|
|
|
if m != nil {
|
|
|
|
return m.Sudo
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
type TaintedReply struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
Tainted bool `sentinel:"" protobuf:"varint,1,opt,name=tainted,proto3" json:"tainted,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *TaintedReply) Reset() { *m = TaintedReply{} }
|
|
|
|
func (m *TaintedReply) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*TaintedReply) ProtoMessage() {}
|
|
|
|
func (*TaintedReply) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{32}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *TaintedReply) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_TaintedReply.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *TaintedReply) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_TaintedReply.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *TaintedReply) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_TaintedReply.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *TaintedReply) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_TaintedReply.Size(m)
|
|
|
|
}
|
|
|
|
func (m *TaintedReply) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_TaintedReply.DiscardUnknown(m)
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
var xxx_messageInfo_TaintedReply proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *TaintedReply) GetTainted() bool {
|
|
|
|
if m != nil {
|
|
|
|
return m.Tainted
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
type CachingDisabledReply struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
Disabled bool `sentinel:"" protobuf:"varint,1,opt,name=disabled,proto3" json:"disabled,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *CachingDisabledReply) Reset() { *m = CachingDisabledReply{} }
|
|
|
|
func (m *CachingDisabledReply) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*CachingDisabledReply) ProtoMessage() {}
|
|
|
|
func (*CachingDisabledReply) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{33}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *CachingDisabledReply) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_CachingDisabledReply.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *CachingDisabledReply) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_CachingDisabledReply.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *CachingDisabledReply) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_CachingDisabledReply.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *CachingDisabledReply) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_CachingDisabledReply.Size(m)
|
|
|
|
}
|
|
|
|
func (m *CachingDisabledReply) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_CachingDisabledReply.DiscardUnknown(m)
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
var xxx_messageInfo_CachingDisabledReply proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *CachingDisabledReply) GetDisabled() bool {
|
|
|
|
if m != nil {
|
|
|
|
return m.Disabled
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
type ReplicationStateReply struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
State int32 `sentinel:"" protobuf:"varint,1,opt,name=state,proto3" json:"state,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
func (m *ReplicationStateReply) Reset() { *m = ReplicationStateReply{} }
|
|
|
|
func (m *ReplicationStateReply) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*ReplicationStateReply) ProtoMessage() {}
|
|
|
|
func (*ReplicationStateReply) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{34}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *ReplicationStateReply) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_ReplicationStateReply.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *ReplicationStateReply) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_ReplicationStateReply.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *ReplicationStateReply) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_ReplicationStateReply.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *ReplicationStateReply) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_ReplicationStateReply.Size(m)
|
|
|
|
}
|
|
|
|
func (m *ReplicationStateReply) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_ReplicationStateReply.DiscardUnknown(m)
|
|
|
|
}
|
|
|
|
|
|
|
|
var xxx_messageInfo_ReplicationStateReply proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *ReplicationStateReply) GetState() int32 {
|
|
|
|
if m != nil {
|
|
|
|
return m.State
|
|
|
|
}
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
type ResponseWrapDataArgs struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
Data string `sentinel:"" protobuf:"bytes,1,opt,name=data,proto3" json:"data,omitempty"`
|
|
|
|
TTL int64 `sentinel:"" protobuf:"varint,2,opt,name=TTL,proto3" json:"TTL,omitempty"`
|
|
|
|
JWT bool `sentinel:"" protobuf:"varint,3,opt,name=JWT,proto3" json:"JWT,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *ResponseWrapDataArgs) Reset() { *m = ResponseWrapDataArgs{} }
|
|
|
|
func (m *ResponseWrapDataArgs) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*ResponseWrapDataArgs) ProtoMessage() {}
|
|
|
|
func (*ResponseWrapDataArgs) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{35}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *ResponseWrapDataArgs) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_ResponseWrapDataArgs.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *ResponseWrapDataArgs) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_ResponseWrapDataArgs.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *ResponseWrapDataArgs) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_ResponseWrapDataArgs.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *ResponseWrapDataArgs) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_ResponseWrapDataArgs.Size(m)
|
|
|
|
}
|
|
|
|
func (m *ResponseWrapDataArgs) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_ResponseWrapDataArgs.DiscardUnknown(m)
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
var xxx_messageInfo_ResponseWrapDataArgs proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
2018-01-23 01:56:34 +00:00
|
|
|
func (m *ResponseWrapDataArgs) GetData() string {
|
2018-01-18 21:49:20 +00:00
|
|
|
if m != nil {
|
|
|
|
return m.Data
|
|
|
|
}
|
2018-01-23 01:56:34 +00:00
|
|
|
return ""
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (m *ResponseWrapDataArgs) GetTTL() int64 {
|
|
|
|
if m != nil {
|
|
|
|
return m.TTL
|
|
|
|
}
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *ResponseWrapDataArgs) GetJWT() bool {
|
|
|
|
if m != nil {
|
|
|
|
return m.JWT
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
type ResponseWrapDataReply struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
WrapInfo *ResponseWrapInfo `sentinel:"" protobuf:"bytes,1,opt,name=wrap_info,json=wrapInfo,proto3" json:"wrap_info,omitempty"`
|
|
|
|
Err string `sentinel:"" protobuf:"bytes,2,opt,name=err,proto3" json:"err,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *ResponseWrapDataReply) Reset() { *m = ResponseWrapDataReply{} }
|
|
|
|
func (m *ResponseWrapDataReply) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*ResponseWrapDataReply) ProtoMessage() {}
|
|
|
|
func (*ResponseWrapDataReply) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{36}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *ResponseWrapDataReply) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_ResponseWrapDataReply.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *ResponseWrapDataReply) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_ResponseWrapDataReply.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *ResponseWrapDataReply) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_ResponseWrapDataReply.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *ResponseWrapDataReply) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_ResponseWrapDataReply.Size(m)
|
|
|
|
}
|
|
|
|
func (m *ResponseWrapDataReply) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_ResponseWrapDataReply.DiscardUnknown(m)
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
var xxx_messageInfo_ResponseWrapDataReply proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *ResponseWrapDataReply) GetWrapInfo() *ResponseWrapInfo {
|
|
|
|
if m != nil {
|
|
|
|
return m.WrapInfo
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *ResponseWrapDataReply) GetErr() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Err
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
type MlockEnabledReply struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
Enabled bool `sentinel:"" protobuf:"varint,1,opt,name=enabled,proto3" json:"enabled,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *MlockEnabledReply) Reset() { *m = MlockEnabledReply{} }
|
|
|
|
func (m *MlockEnabledReply) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*MlockEnabledReply) ProtoMessage() {}
|
|
|
|
func (*MlockEnabledReply) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{37}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *MlockEnabledReply) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_MlockEnabledReply.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *MlockEnabledReply) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_MlockEnabledReply.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *MlockEnabledReply) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_MlockEnabledReply.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *MlockEnabledReply) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_MlockEnabledReply.Size(m)
|
|
|
|
}
|
|
|
|
func (m *MlockEnabledReply) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_MlockEnabledReply.DiscardUnknown(m)
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
var xxx_messageInfo_MlockEnabledReply proto.InternalMessageInfo
|
2018-01-18 21:49:20 +00:00
|
|
|
|
|
|
|
func (m *MlockEnabledReply) GetEnabled() bool {
|
|
|
|
if m != nil {
|
|
|
|
return m.Enabled
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2018-02-02 23:17:12 +00:00
|
|
|
type LocalMountReply struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
Local bool `sentinel:"" protobuf:"varint,1,opt,name=local,proto3" json:"local,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *LocalMountReply) Reset() { *m = LocalMountReply{} }
|
|
|
|
func (m *LocalMountReply) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*LocalMountReply) ProtoMessage() {}
|
|
|
|
func (*LocalMountReply) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{38}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *LocalMountReply) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_LocalMountReply.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *LocalMountReply) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_LocalMountReply.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *LocalMountReply) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_LocalMountReply.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *LocalMountReply) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_LocalMountReply.Size(m)
|
|
|
|
}
|
|
|
|
func (m *LocalMountReply) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_LocalMountReply.DiscardUnknown(m)
|
2018-02-02 23:17:12 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
var xxx_messageInfo_LocalMountReply proto.InternalMessageInfo
|
2018-02-02 23:17:12 +00:00
|
|
|
|
|
|
|
func (m *LocalMountReply) GetLocal() bool {
|
|
|
|
if m != nil {
|
|
|
|
return m.Local
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2018-06-04 00:48:12 +00:00
|
|
|
type EntityInfoArgs struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
EntityID string `sentinel:"" protobuf:"bytes,1,opt,name=entity_id,json=entityId,proto3" json:"entity_id,omitempty"`
|
2018-06-04 00:48:12 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *EntityInfoArgs) Reset() { *m = EntityInfoArgs{} }
|
|
|
|
func (m *EntityInfoArgs) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*EntityInfoArgs) ProtoMessage() {}
|
|
|
|
func (*EntityInfoArgs) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{39}
|
2018-06-04 00:48:12 +00:00
|
|
|
}
|
|
|
|
func (m *EntityInfoArgs) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_EntityInfoArgs.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *EntityInfoArgs) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_EntityInfoArgs.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *EntityInfoArgs) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_EntityInfoArgs.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *EntityInfoArgs) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_EntityInfoArgs.Size(m)
|
|
|
|
}
|
|
|
|
func (m *EntityInfoArgs) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_EntityInfoArgs.DiscardUnknown(m)
|
|
|
|
}
|
|
|
|
|
|
|
|
var xxx_messageInfo_EntityInfoArgs proto.InternalMessageInfo
|
|
|
|
|
|
|
|
func (m *EntityInfoArgs) GetEntityID() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.EntityID
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
type EntityInfoReply struct {
|
2018-07-11 00:49:48 +00:00
|
|
|
Entity *logical.Entity `sentinel:"" protobuf:"bytes,1,opt,name=entity,proto3" json:"entity,omitempty"`
|
|
|
|
Err string `sentinel:"" protobuf:"bytes,2,opt,name=err,proto3" json:"err,omitempty"`
|
2018-06-04 00:48:12 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *EntityInfoReply) Reset() { *m = EntityInfoReply{} }
|
|
|
|
func (m *EntityInfoReply) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*EntityInfoReply) ProtoMessage() {}
|
|
|
|
func (*EntityInfoReply) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{40}
|
2018-06-04 00:48:12 +00:00
|
|
|
}
|
|
|
|
func (m *EntityInfoReply) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_EntityInfoReply.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *EntityInfoReply) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_EntityInfoReply.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *EntityInfoReply) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_EntityInfoReply.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *EntityInfoReply) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_EntityInfoReply.Size(m)
|
|
|
|
}
|
|
|
|
func (m *EntityInfoReply) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_EntityInfoReply.DiscardUnknown(m)
|
|
|
|
}
|
|
|
|
|
|
|
|
var xxx_messageInfo_EntityInfoReply proto.InternalMessageInfo
|
|
|
|
|
|
|
|
func (m *EntityInfoReply) GetEntity() *logical.Entity {
|
|
|
|
if m != nil {
|
|
|
|
return m.Entity
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *EntityInfoReply) GetErr() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.Err
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
2018-02-17 01:41:01 +00:00
|
|
|
type Connection struct {
|
|
|
|
// RemoteAddr is the network address that sent the request.
|
2018-07-11 00:49:48 +00:00
|
|
|
RemoteAddr string `sentinel:"" protobuf:"bytes,1,opt,name=remote_addr,json=remoteAddr,proto3" json:"remote_addr,omitempty"`
|
2018-05-03 19:38:53 +00:00
|
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
|
|
XXX_unrecognized []byte `json:"-"`
|
|
|
|
XXX_sizecache int32 `json:"-"`
|
2018-02-17 01:41:01 +00:00
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
func (m *Connection) Reset() { *m = Connection{} }
|
|
|
|
func (m *Connection) String() string { return proto.CompactTextString(m) }
|
|
|
|
func (*Connection) ProtoMessage() {}
|
|
|
|
func (*Connection) Descriptor() ([]byte, []int) {
|
2018-07-11 00:49:48 +00:00
|
|
|
return fileDescriptor_backend_47c8b1854cae270c, []int{41}
|
2018-05-03 19:38:53 +00:00
|
|
|
}
|
|
|
|
func (m *Connection) XXX_Unmarshal(b []byte) error {
|
|
|
|
return xxx_messageInfo_Connection.Unmarshal(m, b)
|
|
|
|
}
|
|
|
|
func (m *Connection) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
|
|
return xxx_messageInfo_Connection.Marshal(b, m, deterministic)
|
|
|
|
}
|
|
|
|
func (dst *Connection) XXX_Merge(src proto.Message) {
|
|
|
|
xxx_messageInfo_Connection.Merge(dst, src)
|
|
|
|
}
|
|
|
|
func (m *Connection) XXX_Size() int {
|
|
|
|
return xxx_messageInfo_Connection.Size(m)
|
|
|
|
}
|
|
|
|
func (m *Connection) XXX_DiscardUnknown() {
|
|
|
|
xxx_messageInfo_Connection.DiscardUnknown(m)
|
|
|
|
}
|
|
|
|
|
|
|
|
var xxx_messageInfo_Connection proto.InternalMessageInfo
|
2018-02-17 01:41:01 +00:00
|
|
|
|
|
|
|
func (m *Connection) GetRemoteAddr() string {
|
|
|
|
if m != nil {
|
|
|
|
return m.RemoteAddr
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
2018-01-18 21:49:20 +00:00
|
|
|
func init() {
|
|
|
|
proto.RegisterType((*Empty)(nil), "pb.Empty")
|
|
|
|
proto.RegisterType((*Header)(nil), "pb.Header")
|
|
|
|
proto.RegisterType((*ProtoError)(nil), "pb.ProtoError")
|
|
|
|
proto.RegisterType((*Paths)(nil), "pb.Paths")
|
|
|
|
proto.RegisterType((*Request)(nil), "pb.Request")
|
2018-05-03 19:38:53 +00:00
|
|
|
proto.RegisterMapType((map[string]*Header)(nil), "pb.Request.HeadersEntry")
|
2018-01-18 21:49:20 +00:00
|
|
|
proto.RegisterType((*Auth)(nil), "pb.Auth")
|
2018-05-03 19:38:53 +00:00
|
|
|
proto.RegisterMapType((map[string]string)(nil), "pb.Auth.MetadataEntry")
|
2018-01-18 21:49:20 +00:00
|
|
|
proto.RegisterType((*LeaseOptions)(nil), "pb.LeaseOptions")
|
|
|
|
proto.RegisterType((*Secret)(nil), "pb.Secret")
|
|
|
|
proto.RegisterType((*Response)(nil), "pb.Response")
|
|
|
|
proto.RegisterType((*ResponseWrapInfo)(nil), "pb.ResponseWrapInfo")
|
|
|
|
proto.RegisterType((*RequestWrapInfo)(nil), "pb.RequestWrapInfo")
|
|
|
|
proto.RegisterType((*HandleRequestArgs)(nil), "pb.HandleRequestArgs")
|
|
|
|
proto.RegisterType((*HandleRequestReply)(nil), "pb.HandleRequestReply")
|
|
|
|
proto.RegisterType((*SpecialPathsReply)(nil), "pb.SpecialPathsReply")
|
|
|
|
proto.RegisterType((*HandleExistenceCheckArgs)(nil), "pb.HandleExistenceCheckArgs")
|
|
|
|
proto.RegisterType((*HandleExistenceCheckReply)(nil), "pb.HandleExistenceCheckReply")
|
|
|
|
proto.RegisterType((*SetupArgs)(nil), "pb.SetupArgs")
|
2018-05-03 19:38:53 +00:00
|
|
|
proto.RegisterMapType((map[string]string)(nil), "pb.SetupArgs.ConfigEntry")
|
2018-01-18 21:49:20 +00:00
|
|
|
proto.RegisterType((*SetupReply)(nil), "pb.SetupReply")
|
|
|
|
proto.RegisterType((*TypeReply)(nil), "pb.TypeReply")
|
|
|
|
proto.RegisterType((*InvalidateKeyArgs)(nil), "pb.InvalidateKeyArgs")
|
|
|
|
proto.RegisterType((*StorageEntry)(nil), "pb.StorageEntry")
|
|
|
|
proto.RegisterType((*StorageListArgs)(nil), "pb.StorageListArgs")
|
|
|
|
proto.RegisterType((*StorageListReply)(nil), "pb.StorageListReply")
|
|
|
|
proto.RegisterType((*StorageGetArgs)(nil), "pb.StorageGetArgs")
|
|
|
|
proto.RegisterType((*StorageGetReply)(nil), "pb.StorageGetReply")
|
|
|
|
proto.RegisterType((*StoragePutArgs)(nil), "pb.StoragePutArgs")
|
|
|
|
proto.RegisterType((*StoragePutReply)(nil), "pb.StoragePutReply")
|
|
|
|
proto.RegisterType((*StorageDeleteArgs)(nil), "pb.StorageDeleteArgs")
|
|
|
|
proto.RegisterType((*StorageDeleteReply)(nil), "pb.StorageDeleteReply")
|
|
|
|
proto.RegisterType((*TTLReply)(nil), "pb.TTLReply")
|
|
|
|
proto.RegisterType((*SudoPrivilegeArgs)(nil), "pb.SudoPrivilegeArgs")
|
|
|
|
proto.RegisterType((*SudoPrivilegeReply)(nil), "pb.SudoPrivilegeReply")
|
|
|
|
proto.RegisterType((*TaintedReply)(nil), "pb.TaintedReply")
|
|
|
|
proto.RegisterType((*CachingDisabledReply)(nil), "pb.CachingDisabledReply")
|
|
|
|
proto.RegisterType((*ReplicationStateReply)(nil), "pb.ReplicationStateReply")
|
|
|
|
proto.RegisterType((*ResponseWrapDataArgs)(nil), "pb.ResponseWrapDataArgs")
|
|
|
|
proto.RegisterType((*ResponseWrapDataReply)(nil), "pb.ResponseWrapDataReply")
|
|
|
|
proto.RegisterType((*MlockEnabledReply)(nil), "pb.MlockEnabledReply")
|
2018-02-02 23:17:12 +00:00
|
|
|
proto.RegisterType((*LocalMountReply)(nil), "pb.LocalMountReply")
|
2018-06-04 00:48:12 +00:00
|
|
|
proto.RegisterType((*EntityInfoArgs)(nil), "pb.EntityInfoArgs")
|
|
|
|
proto.RegisterType((*EntityInfoReply)(nil), "pb.EntityInfoReply")
|
2018-02-17 01:41:01 +00:00
|
|
|
proto.RegisterType((*Connection)(nil), "pb.Connection")
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Reference imports to suppress errors if they are not otherwise used.
|
|
|
|
var _ context.Context
|
|
|
|
var _ grpc.ClientConn
|
|
|
|
|
|
|
|
// This is a compile-time assertion to ensure that this generated file
|
|
|
|
// is compatible with the grpc package it is being compiled against.
|
|
|
|
const _ = grpc.SupportPackageIsVersion4
|
|
|
|
|
2018-05-29 22:23:51 +00:00
|
|
|
// BackendClient is the client API for Backend service.
|
|
|
|
//
|
|
|
|
// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream.
|
2018-01-18 21:49:20 +00:00
|
|
|
type BackendClient interface {
|
2018-02-15 22:20:50 +00:00
|
|
|
// HandleRequest is used to handle a request and generate a response.
|
|
|
|
// The plugins must check the operation type and handle appropriately.
|
2018-01-18 21:49:20 +00:00
|
|
|
HandleRequest(ctx context.Context, in *HandleRequestArgs, opts ...grpc.CallOption) (*HandleRequestReply, error)
|
2018-02-15 22:20:50 +00:00
|
|
|
// SpecialPaths is a list of paths that are special in some way.
|
|
|
|
// See PathType for the types of special paths. The key is the type
|
|
|
|
// of the special path, and the value is a list of paths for this type.
|
|
|
|
// This is not a regular expression but is an exact match. If the path
|
|
|
|
// ends in '*' then it is a prefix-based match. The '*' can only appear
|
|
|
|
// at the end.
|
2018-01-18 21:49:20 +00:00
|
|
|
SpecialPaths(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*SpecialPathsReply, error)
|
2018-02-15 22:20:50 +00:00
|
|
|
// HandleExistenceCheck is used to handle a request and generate a response
|
|
|
|
// indicating whether the given path exists or not; this is used to
|
|
|
|
// understand whether the request must have a Create or Update capability
|
|
|
|
// ACL applied. The first bool indicates whether an existence check
|
|
|
|
// function was found for the backend; the second indicates whether, if an
|
|
|
|
// existence check function was found, the item exists or not.
|
2018-01-18 21:49:20 +00:00
|
|
|
HandleExistenceCheck(ctx context.Context, in *HandleExistenceCheckArgs, opts ...grpc.CallOption) (*HandleExistenceCheckReply, error)
|
2018-02-15 22:20:50 +00:00
|
|
|
// Cleanup is invoked during an unmount of a backend to allow it to
|
|
|
|
// handle any cleanup like connection closing or releasing of file handles.
|
|
|
|
// Cleanup is called right before Vault closes the plugin process.
|
2018-01-18 21:49:20 +00:00
|
|
|
Cleanup(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*Empty, error)
|
2018-02-15 22:20:50 +00:00
|
|
|
// InvalidateKey may be invoked when an object is modified that belongs
|
|
|
|
// to the backend. The backend can use this to clear any caches or reset
|
|
|
|
// internal state as needed.
|
2018-01-18 21:49:20 +00:00
|
|
|
InvalidateKey(ctx context.Context, in *InvalidateKeyArgs, opts ...grpc.CallOption) (*Empty, error)
|
2018-02-15 22:20:50 +00:00
|
|
|
// Setup is used to set up the backend based on the provided backend
|
|
|
|
// configuration. The plugin's setup implementation should use the provided
|
|
|
|
// broker_id to create a connection back to Vault for use with the Storage
|
|
|
|
// and SystemView clients.
|
2018-01-18 21:49:20 +00:00
|
|
|
Setup(ctx context.Context, in *SetupArgs, opts ...grpc.CallOption) (*SetupReply, error)
|
2018-02-15 22:20:50 +00:00
|
|
|
// Type returns the BackendType for the particular backend
|
2018-01-18 21:49:20 +00:00
|
|
|
Type(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*TypeReply, error)
|
|
|
|
}
|
|
|
|
|
|
|
|
type backendClient struct {
|
|
|
|
cc *grpc.ClientConn
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewBackendClient(cc *grpc.ClientConn) BackendClient {
|
|
|
|
return &backendClient{cc}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *backendClient) HandleRequest(ctx context.Context, in *HandleRequestArgs, opts ...grpc.CallOption) (*HandleRequestReply, error) {
|
|
|
|
out := new(HandleRequestReply)
|
2018-05-29 22:23:51 +00:00
|
|
|
err := c.cc.Invoke(ctx, "/pb.Backend/HandleRequest", in, out, opts...)
|
2018-01-18 21:49:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *backendClient) SpecialPaths(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*SpecialPathsReply, error) {
|
|
|
|
out := new(SpecialPathsReply)
|
2018-05-29 22:23:51 +00:00
|
|
|
err := c.cc.Invoke(ctx, "/pb.Backend/SpecialPaths", in, out, opts...)
|
2018-01-18 21:49:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *backendClient) HandleExistenceCheck(ctx context.Context, in *HandleExistenceCheckArgs, opts ...grpc.CallOption) (*HandleExistenceCheckReply, error) {
|
|
|
|
out := new(HandleExistenceCheckReply)
|
2018-05-29 22:23:51 +00:00
|
|
|
err := c.cc.Invoke(ctx, "/pb.Backend/HandleExistenceCheck", in, out, opts...)
|
2018-01-18 21:49:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *backendClient) Cleanup(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*Empty, error) {
|
|
|
|
out := new(Empty)
|
2018-05-29 22:23:51 +00:00
|
|
|
err := c.cc.Invoke(ctx, "/pb.Backend/Cleanup", in, out, opts...)
|
2018-01-18 21:49:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *backendClient) InvalidateKey(ctx context.Context, in *InvalidateKeyArgs, opts ...grpc.CallOption) (*Empty, error) {
|
|
|
|
out := new(Empty)
|
2018-05-29 22:23:51 +00:00
|
|
|
err := c.cc.Invoke(ctx, "/pb.Backend/InvalidateKey", in, out, opts...)
|
2018-01-18 21:49:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *backendClient) Setup(ctx context.Context, in *SetupArgs, opts ...grpc.CallOption) (*SetupReply, error) {
|
|
|
|
out := new(SetupReply)
|
2018-05-29 22:23:51 +00:00
|
|
|
err := c.cc.Invoke(ctx, "/pb.Backend/Setup", in, out, opts...)
|
2018-01-18 21:49:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *backendClient) Type(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*TypeReply, error) {
|
|
|
|
out := new(TypeReply)
|
2018-05-29 22:23:51 +00:00
|
|
|
err := c.cc.Invoke(ctx, "/pb.Backend/Type", in, out, opts...)
|
2018-01-18 21:49:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
2018-05-29 22:23:51 +00:00
|
|
|
// BackendServer is the server API for Backend service.
|
2018-01-18 21:49:20 +00:00
|
|
|
type BackendServer interface {
|
2018-02-15 22:20:50 +00:00
|
|
|
// HandleRequest is used to handle a request and generate a response.
|
|
|
|
// The plugins must check the operation type and handle appropriately.
|
2018-01-18 21:49:20 +00:00
|
|
|
HandleRequest(context.Context, *HandleRequestArgs) (*HandleRequestReply, error)
|
2018-02-15 22:20:50 +00:00
|
|
|
// SpecialPaths is a list of paths that are special in some way.
|
|
|
|
// See PathType for the types of special paths. The key is the type
|
|
|
|
// of the special path, and the value is a list of paths for this type.
|
|
|
|
// This is not a regular expression but is an exact match. If the path
|
|
|
|
// ends in '*' then it is a prefix-based match. The '*' can only appear
|
|
|
|
// at the end.
|
2018-01-18 21:49:20 +00:00
|
|
|
SpecialPaths(context.Context, *Empty) (*SpecialPathsReply, error)
|
2018-02-15 22:20:50 +00:00
|
|
|
// HandleExistenceCheck is used to handle a request and generate a response
|
|
|
|
// indicating whether the given path exists or not; this is used to
|
|
|
|
// understand whether the request must have a Create or Update capability
|
|
|
|
// ACL applied. The first bool indicates whether an existence check
|
|
|
|
// function was found for the backend; the second indicates whether, if an
|
|
|
|
// existence check function was found, the item exists or not.
|
2018-01-18 21:49:20 +00:00
|
|
|
HandleExistenceCheck(context.Context, *HandleExistenceCheckArgs) (*HandleExistenceCheckReply, error)
|
2018-02-15 22:20:50 +00:00
|
|
|
// Cleanup is invoked during an unmount of a backend to allow it to
|
|
|
|
// handle any cleanup like connection closing or releasing of file handles.
|
|
|
|
// Cleanup is called right before Vault closes the plugin process.
|
2018-01-18 21:49:20 +00:00
|
|
|
Cleanup(context.Context, *Empty) (*Empty, error)
|
2018-02-15 22:20:50 +00:00
|
|
|
// InvalidateKey may be invoked when an object is modified that belongs
|
|
|
|
// to the backend. The backend can use this to clear any caches or reset
|
|
|
|
// internal state as needed.
|
2018-01-18 21:49:20 +00:00
|
|
|
InvalidateKey(context.Context, *InvalidateKeyArgs) (*Empty, error)
|
2018-02-15 22:20:50 +00:00
|
|
|
// Setup is used to set up the backend based on the provided backend
|
|
|
|
// configuration. The plugin's setup implementation should use the provided
|
|
|
|
// broker_id to create a connection back to Vault for use with the Storage
|
|
|
|
// and SystemView clients.
|
2018-01-18 21:49:20 +00:00
|
|
|
Setup(context.Context, *SetupArgs) (*SetupReply, error)
|
2018-02-15 22:20:50 +00:00
|
|
|
// Type returns the BackendType for the particular backend
|
2018-01-18 21:49:20 +00:00
|
|
|
Type(context.Context, *Empty) (*TypeReply, error)
|
|
|
|
}
|
|
|
|
|
|
|
|
func RegisterBackendServer(s *grpc.Server, srv BackendServer) {
|
|
|
|
s.RegisterService(&_Backend_serviceDesc, srv)
|
|
|
|
}
|
|
|
|
|
|
|
|
func _Backend_HandleRequest_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
|
|
in := new(HandleRequestArgs)
|
|
|
|
if err := dec(in); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if interceptor == nil {
|
|
|
|
return srv.(BackendServer).HandleRequest(ctx, in)
|
|
|
|
}
|
|
|
|
info := &grpc.UnaryServerInfo{
|
|
|
|
Server: srv,
|
|
|
|
FullMethod: "/pb.Backend/HandleRequest",
|
|
|
|
}
|
|
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
|
|
return srv.(BackendServer).HandleRequest(ctx, req.(*HandleRequestArgs))
|
|
|
|
}
|
|
|
|
return interceptor(ctx, in, info, handler)
|
|
|
|
}
|
|
|
|
|
|
|
|
func _Backend_SpecialPaths_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
|
|
in := new(Empty)
|
|
|
|
if err := dec(in); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if interceptor == nil {
|
|
|
|
return srv.(BackendServer).SpecialPaths(ctx, in)
|
|
|
|
}
|
|
|
|
info := &grpc.UnaryServerInfo{
|
|
|
|
Server: srv,
|
|
|
|
FullMethod: "/pb.Backend/SpecialPaths",
|
|
|
|
}
|
|
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
|
|
return srv.(BackendServer).SpecialPaths(ctx, req.(*Empty))
|
|
|
|
}
|
|
|
|
return interceptor(ctx, in, info, handler)
|
|
|
|
}
|
|
|
|
|
|
|
|
func _Backend_HandleExistenceCheck_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
|
|
in := new(HandleExistenceCheckArgs)
|
|
|
|
if err := dec(in); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if interceptor == nil {
|
|
|
|
return srv.(BackendServer).HandleExistenceCheck(ctx, in)
|
|
|
|
}
|
|
|
|
info := &grpc.UnaryServerInfo{
|
|
|
|
Server: srv,
|
|
|
|
FullMethod: "/pb.Backend/HandleExistenceCheck",
|
|
|
|
}
|
|
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
|
|
return srv.(BackendServer).HandleExistenceCheck(ctx, req.(*HandleExistenceCheckArgs))
|
|
|
|
}
|
|
|
|
return interceptor(ctx, in, info, handler)
|
|
|
|
}
|
|
|
|
|
|
|
|
func _Backend_Cleanup_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
|
|
in := new(Empty)
|
|
|
|
if err := dec(in); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if interceptor == nil {
|
|
|
|
return srv.(BackendServer).Cleanup(ctx, in)
|
|
|
|
}
|
|
|
|
info := &grpc.UnaryServerInfo{
|
|
|
|
Server: srv,
|
|
|
|
FullMethod: "/pb.Backend/Cleanup",
|
|
|
|
}
|
|
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
|
|
return srv.(BackendServer).Cleanup(ctx, req.(*Empty))
|
|
|
|
}
|
|
|
|
return interceptor(ctx, in, info, handler)
|
|
|
|
}
|
|
|
|
|
|
|
|
func _Backend_InvalidateKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
|
|
in := new(InvalidateKeyArgs)
|
|
|
|
if err := dec(in); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if interceptor == nil {
|
|
|
|
return srv.(BackendServer).InvalidateKey(ctx, in)
|
|
|
|
}
|
|
|
|
info := &grpc.UnaryServerInfo{
|
|
|
|
Server: srv,
|
|
|
|
FullMethod: "/pb.Backend/InvalidateKey",
|
|
|
|
}
|
|
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
|
|
return srv.(BackendServer).InvalidateKey(ctx, req.(*InvalidateKeyArgs))
|
|
|
|
}
|
|
|
|
return interceptor(ctx, in, info, handler)
|
|
|
|
}
|
|
|
|
|
|
|
|
func _Backend_Setup_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
|
|
in := new(SetupArgs)
|
|
|
|
if err := dec(in); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if interceptor == nil {
|
|
|
|
return srv.(BackendServer).Setup(ctx, in)
|
|
|
|
}
|
|
|
|
info := &grpc.UnaryServerInfo{
|
|
|
|
Server: srv,
|
|
|
|
FullMethod: "/pb.Backend/Setup",
|
|
|
|
}
|
|
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
|
|
return srv.(BackendServer).Setup(ctx, req.(*SetupArgs))
|
|
|
|
}
|
|
|
|
return interceptor(ctx, in, info, handler)
|
|
|
|
}
|
|
|
|
|
|
|
|
func _Backend_Type_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
|
|
in := new(Empty)
|
|
|
|
if err := dec(in); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if interceptor == nil {
|
|
|
|
return srv.(BackendServer).Type(ctx, in)
|
|
|
|
}
|
|
|
|
info := &grpc.UnaryServerInfo{
|
|
|
|
Server: srv,
|
|
|
|
FullMethod: "/pb.Backend/Type",
|
|
|
|
}
|
|
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
|
|
return srv.(BackendServer).Type(ctx, req.(*Empty))
|
|
|
|
}
|
|
|
|
return interceptor(ctx, in, info, handler)
|
|
|
|
}
|
|
|
|
|
|
|
|
var _Backend_serviceDesc = grpc.ServiceDesc{
|
|
|
|
ServiceName: "pb.Backend",
|
|
|
|
HandlerType: (*BackendServer)(nil),
|
|
|
|
Methods: []grpc.MethodDesc{
|
|
|
|
{
|
|
|
|
MethodName: "HandleRequest",
|
|
|
|
Handler: _Backend_HandleRequest_Handler,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
MethodName: "SpecialPaths",
|
|
|
|
Handler: _Backend_SpecialPaths_Handler,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
MethodName: "HandleExistenceCheck",
|
|
|
|
Handler: _Backend_HandleExistenceCheck_Handler,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
MethodName: "Cleanup",
|
|
|
|
Handler: _Backend_Cleanup_Handler,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
MethodName: "InvalidateKey",
|
|
|
|
Handler: _Backend_InvalidateKey_Handler,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
MethodName: "Setup",
|
|
|
|
Handler: _Backend_Setup_Handler,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
MethodName: "Type",
|
|
|
|
Handler: _Backend_Type_Handler,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Streams: []grpc.StreamDesc{},
|
|
|
|
Metadata: "logical/plugin/pb/backend.proto",
|
|
|
|
}
|
|
|
|
|
2018-05-29 22:23:51 +00:00
|
|
|
// StorageClient is the client API for Storage service.
|
|
|
|
//
|
|
|
|
// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream.
|
2018-01-18 21:49:20 +00:00
|
|
|
type StorageClient interface {
|
|
|
|
List(ctx context.Context, in *StorageListArgs, opts ...grpc.CallOption) (*StorageListReply, error)
|
|
|
|
Get(ctx context.Context, in *StorageGetArgs, opts ...grpc.CallOption) (*StorageGetReply, error)
|
|
|
|
Put(ctx context.Context, in *StoragePutArgs, opts ...grpc.CallOption) (*StoragePutReply, error)
|
|
|
|
Delete(ctx context.Context, in *StorageDeleteArgs, opts ...grpc.CallOption) (*StorageDeleteReply, error)
|
|
|
|
}
|
|
|
|
|
|
|
|
type storageClient struct {
|
|
|
|
cc *grpc.ClientConn
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewStorageClient(cc *grpc.ClientConn) StorageClient {
|
|
|
|
return &storageClient{cc}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *storageClient) List(ctx context.Context, in *StorageListArgs, opts ...grpc.CallOption) (*StorageListReply, error) {
|
|
|
|
out := new(StorageListReply)
|
2018-05-29 22:23:51 +00:00
|
|
|
err := c.cc.Invoke(ctx, "/pb.Storage/List", in, out, opts...)
|
2018-01-18 21:49:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *storageClient) Get(ctx context.Context, in *StorageGetArgs, opts ...grpc.CallOption) (*StorageGetReply, error) {
|
|
|
|
out := new(StorageGetReply)
|
2018-05-29 22:23:51 +00:00
|
|
|
err := c.cc.Invoke(ctx, "/pb.Storage/Get", in, out, opts...)
|
2018-01-18 21:49:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *storageClient) Put(ctx context.Context, in *StoragePutArgs, opts ...grpc.CallOption) (*StoragePutReply, error) {
|
|
|
|
out := new(StoragePutReply)
|
2018-05-29 22:23:51 +00:00
|
|
|
err := c.cc.Invoke(ctx, "/pb.Storage/Put", in, out, opts...)
|
2018-01-18 21:49:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *storageClient) Delete(ctx context.Context, in *StorageDeleteArgs, opts ...grpc.CallOption) (*StorageDeleteReply, error) {
|
|
|
|
out := new(StorageDeleteReply)
|
2018-05-29 22:23:51 +00:00
|
|
|
err := c.cc.Invoke(ctx, "/pb.Storage/Delete", in, out, opts...)
|
2018-01-18 21:49:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
2018-05-29 22:23:51 +00:00
|
|
|
// StorageServer is the server API for Storage service.
|
2018-01-18 21:49:20 +00:00
|
|
|
type StorageServer interface {
|
|
|
|
List(context.Context, *StorageListArgs) (*StorageListReply, error)
|
|
|
|
Get(context.Context, *StorageGetArgs) (*StorageGetReply, error)
|
|
|
|
Put(context.Context, *StoragePutArgs) (*StoragePutReply, error)
|
|
|
|
Delete(context.Context, *StorageDeleteArgs) (*StorageDeleteReply, error)
|
|
|
|
}
|
|
|
|
|
|
|
|
func RegisterStorageServer(s *grpc.Server, srv StorageServer) {
|
|
|
|
s.RegisterService(&_Storage_serviceDesc, srv)
|
|
|
|
}
|
|
|
|
|
|
|
|
func _Storage_List_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
|
|
in := new(StorageListArgs)
|
|
|
|
if err := dec(in); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if interceptor == nil {
|
|
|
|
return srv.(StorageServer).List(ctx, in)
|
|
|
|
}
|
|
|
|
info := &grpc.UnaryServerInfo{
|
|
|
|
Server: srv,
|
|
|
|
FullMethod: "/pb.Storage/List",
|
|
|
|
}
|
|
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
|
|
return srv.(StorageServer).List(ctx, req.(*StorageListArgs))
|
|
|
|
}
|
|
|
|
return interceptor(ctx, in, info, handler)
|
|
|
|
}
|
|
|
|
|
|
|
|
func _Storage_Get_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
|
|
in := new(StorageGetArgs)
|
|
|
|
if err := dec(in); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if interceptor == nil {
|
|
|
|
return srv.(StorageServer).Get(ctx, in)
|
|
|
|
}
|
|
|
|
info := &grpc.UnaryServerInfo{
|
|
|
|
Server: srv,
|
|
|
|
FullMethod: "/pb.Storage/Get",
|
|
|
|
}
|
|
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
|
|
return srv.(StorageServer).Get(ctx, req.(*StorageGetArgs))
|
|
|
|
}
|
|
|
|
return interceptor(ctx, in, info, handler)
|
|
|
|
}
|
|
|
|
|
|
|
|
func _Storage_Put_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
|
|
in := new(StoragePutArgs)
|
|
|
|
if err := dec(in); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if interceptor == nil {
|
|
|
|
return srv.(StorageServer).Put(ctx, in)
|
|
|
|
}
|
|
|
|
info := &grpc.UnaryServerInfo{
|
|
|
|
Server: srv,
|
|
|
|
FullMethod: "/pb.Storage/Put",
|
|
|
|
}
|
|
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
|
|
return srv.(StorageServer).Put(ctx, req.(*StoragePutArgs))
|
|
|
|
}
|
|
|
|
return interceptor(ctx, in, info, handler)
|
|
|
|
}
|
|
|
|
|
|
|
|
func _Storage_Delete_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
|
|
in := new(StorageDeleteArgs)
|
|
|
|
if err := dec(in); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if interceptor == nil {
|
|
|
|
return srv.(StorageServer).Delete(ctx, in)
|
|
|
|
}
|
|
|
|
info := &grpc.UnaryServerInfo{
|
|
|
|
Server: srv,
|
|
|
|
FullMethod: "/pb.Storage/Delete",
|
|
|
|
}
|
|
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
|
|
return srv.(StorageServer).Delete(ctx, req.(*StorageDeleteArgs))
|
|
|
|
}
|
|
|
|
return interceptor(ctx, in, info, handler)
|
|
|
|
}
|
|
|
|
|
|
|
|
var _Storage_serviceDesc = grpc.ServiceDesc{
|
|
|
|
ServiceName: "pb.Storage",
|
|
|
|
HandlerType: (*StorageServer)(nil),
|
|
|
|
Methods: []grpc.MethodDesc{
|
|
|
|
{
|
|
|
|
MethodName: "List",
|
|
|
|
Handler: _Storage_List_Handler,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
MethodName: "Get",
|
|
|
|
Handler: _Storage_Get_Handler,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
MethodName: "Put",
|
|
|
|
Handler: _Storage_Put_Handler,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
MethodName: "Delete",
|
|
|
|
Handler: _Storage_Delete_Handler,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Streams: []grpc.StreamDesc{},
|
|
|
|
Metadata: "logical/plugin/pb/backend.proto",
|
|
|
|
}
|
|
|
|
|
2018-05-29 22:23:51 +00:00
|
|
|
// SystemViewClient is the client API for SystemView service.
|
|
|
|
//
|
|
|
|
// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream.
|
2018-01-18 21:49:20 +00:00
|
|
|
type SystemViewClient interface {
|
2018-02-15 22:20:50 +00:00
|
|
|
// DefaultLeaseTTL returns the default lease TTL set in Vault configuration
|
2018-01-18 21:49:20 +00:00
|
|
|
DefaultLeaseTTL(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*TTLReply, error)
|
2018-02-15 22:20:50 +00:00
|
|
|
// MaxLeaseTTL returns the max lease TTL set in Vault configuration; backend
|
|
|
|
// authors should take care not to issue credentials that last longer than
|
|
|
|
// this value, as Vault will revoke them
|
2018-01-18 21:49:20 +00:00
|
|
|
MaxLeaseTTL(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*TTLReply, error)
|
2018-02-15 22:20:50 +00:00
|
|
|
// SudoPrivilege returns true if given path has sudo privileges
|
|
|
|
// for the given client token
|
2018-01-18 21:49:20 +00:00
|
|
|
SudoPrivilege(ctx context.Context, in *SudoPrivilegeArgs, opts ...grpc.CallOption) (*SudoPrivilegeReply, error)
|
2018-02-17 01:41:01 +00:00
|
|
|
// Tainted, returns true if the mount is tainted. A mount is tainted if it is in the
|
2018-02-15 22:20:50 +00:00
|
|
|
// process of being unmounted. This should only be used in special
|
|
|
|
// circumstances; a primary use-case is as a guard in revocation functions.
|
|
|
|
// If revocation of a backend's leases fails it can keep the unmounting
|
|
|
|
// process from being successful. If the reason for this failure is not
|
|
|
|
// relevant when the mount is tainted (for instance, saving a CRL to disk
|
|
|
|
// when the stored CRL will be removed during the unmounting process
|
|
|
|
// anyways), we can ignore the errors to allow unmounting to complete.
|
2018-01-18 21:49:20 +00:00
|
|
|
Tainted(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*TaintedReply, error)
|
2018-02-17 01:41:01 +00:00
|
|
|
// CachingDisabled returns true if caching is disabled. If true, no caches
|
|
|
|
// should be used, despite known slowdowns.
|
2018-01-18 21:49:20 +00:00
|
|
|
CachingDisabled(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*CachingDisabledReply, error)
|
2018-02-15 22:20:50 +00:00
|
|
|
// ReplicationState indicates the state of cluster replication
|
2018-01-18 21:49:20 +00:00
|
|
|
ReplicationState(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ReplicationStateReply, error)
|
2018-02-15 22:20:50 +00:00
|
|
|
// ResponseWrapData wraps the given data in a cubbyhole and returns the
|
|
|
|
// token used to unwrap.
|
2018-01-18 21:49:20 +00:00
|
|
|
ResponseWrapData(ctx context.Context, in *ResponseWrapDataArgs, opts ...grpc.CallOption) (*ResponseWrapDataReply, error)
|
2018-02-15 22:20:50 +00:00
|
|
|
// MlockEnabled returns the configuration setting for enabling mlock on
|
|
|
|
// plugins.
|
2018-01-18 21:49:20 +00:00
|
|
|
MlockEnabled(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*MlockEnabledReply, error)
|
2018-02-17 01:41:01 +00:00
|
|
|
// LocalMount, when run from a system view attached to a request, indicates
|
|
|
|
// whether the request is affecting a local mount or not
|
2018-02-02 23:17:12 +00:00
|
|
|
LocalMount(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*LocalMountReply, error)
|
2018-06-04 00:48:12 +00:00
|
|
|
// EntityInfo returns the basic entity information for the given entity id
|
|
|
|
EntityInfo(ctx context.Context, in *EntityInfoArgs, opts ...grpc.CallOption) (*EntityInfoReply, error)
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type systemViewClient struct {
|
|
|
|
cc *grpc.ClientConn
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewSystemViewClient(cc *grpc.ClientConn) SystemViewClient {
|
|
|
|
return &systemViewClient{cc}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *systemViewClient) DefaultLeaseTTL(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*TTLReply, error) {
|
|
|
|
out := new(TTLReply)
|
2018-05-29 22:23:51 +00:00
|
|
|
err := c.cc.Invoke(ctx, "/pb.SystemView/DefaultLeaseTTL", in, out, opts...)
|
2018-01-18 21:49:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *systemViewClient) MaxLeaseTTL(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*TTLReply, error) {
|
|
|
|
out := new(TTLReply)
|
2018-05-29 22:23:51 +00:00
|
|
|
err := c.cc.Invoke(ctx, "/pb.SystemView/MaxLeaseTTL", in, out, opts...)
|
2018-01-18 21:49:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *systemViewClient) SudoPrivilege(ctx context.Context, in *SudoPrivilegeArgs, opts ...grpc.CallOption) (*SudoPrivilegeReply, error) {
|
|
|
|
out := new(SudoPrivilegeReply)
|
2018-05-29 22:23:51 +00:00
|
|
|
err := c.cc.Invoke(ctx, "/pb.SystemView/SudoPrivilege", in, out, opts...)
|
2018-01-18 21:49:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *systemViewClient) Tainted(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*TaintedReply, error) {
|
|
|
|
out := new(TaintedReply)
|
2018-05-29 22:23:51 +00:00
|
|
|
err := c.cc.Invoke(ctx, "/pb.SystemView/Tainted", in, out, opts...)
|
2018-01-18 21:49:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *systemViewClient) CachingDisabled(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*CachingDisabledReply, error) {
|
|
|
|
out := new(CachingDisabledReply)
|
2018-05-29 22:23:51 +00:00
|
|
|
err := c.cc.Invoke(ctx, "/pb.SystemView/CachingDisabled", in, out, opts...)
|
2018-01-18 21:49:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *systemViewClient) ReplicationState(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*ReplicationStateReply, error) {
|
|
|
|
out := new(ReplicationStateReply)
|
2018-05-29 22:23:51 +00:00
|
|
|
err := c.cc.Invoke(ctx, "/pb.SystemView/ReplicationState", in, out, opts...)
|
2018-01-18 21:49:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *systemViewClient) ResponseWrapData(ctx context.Context, in *ResponseWrapDataArgs, opts ...grpc.CallOption) (*ResponseWrapDataReply, error) {
|
|
|
|
out := new(ResponseWrapDataReply)
|
2018-05-29 22:23:51 +00:00
|
|
|
err := c.cc.Invoke(ctx, "/pb.SystemView/ResponseWrapData", in, out, opts...)
|
2018-01-18 21:49:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *systemViewClient) MlockEnabled(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*MlockEnabledReply, error) {
|
|
|
|
out := new(MlockEnabledReply)
|
2018-05-29 22:23:51 +00:00
|
|
|
err := c.cc.Invoke(ctx, "/pb.SystemView/MlockEnabled", in, out, opts...)
|
2018-01-18 21:49:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
2018-02-02 23:17:12 +00:00
|
|
|
func (c *systemViewClient) LocalMount(ctx context.Context, in *Empty, opts ...grpc.CallOption) (*LocalMountReply, error) {
|
|
|
|
out := new(LocalMountReply)
|
2018-05-29 22:23:51 +00:00
|
|
|
err := c.cc.Invoke(ctx, "/pb.SystemView/LocalMount", in, out, opts...)
|
2018-02-02 23:17:12 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
2018-06-04 00:48:12 +00:00
|
|
|
func (c *systemViewClient) EntityInfo(ctx context.Context, in *EntityInfoArgs, opts ...grpc.CallOption) (*EntityInfoReply, error) {
|
|
|
|
out := new(EntityInfoReply)
|
|
|
|
err := c.cc.Invoke(ctx, "/pb.SystemView/EntityInfo", in, out, opts...)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
2018-05-29 22:23:51 +00:00
|
|
|
// SystemViewServer is the server API for SystemView service.
|
2018-01-18 21:49:20 +00:00
|
|
|
type SystemViewServer interface {
|
2018-02-15 22:20:50 +00:00
|
|
|
// DefaultLeaseTTL returns the default lease TTL set in Vault configuration
|
2018-01-18 21:49:20 +00:00
|
|
|
DefaultLeaseTTL(context.Context, *Empty) (*TTLReply, error)
|
2018-02-15 22:20:50 +00:00
|
|
|
// MaxLeaseTTL returns the max lease TTL set in Vault configuration; backend
|
|
|
|
// authors should take care not to issue credentials that last longer than
|
|
|
|
// this value, as Vault will revoke them
|
2018-01-18 21:49:20 +00:00
|
|
|
MaxLeaseTTL(context.Context, *Empty) (*TTLReply, error)
|
2018-02-15 22:20:50 +00:00
|
|
|
// SudoPrivilege returns true if given path has sudo privileges
|
|
|
|
// for the given client token
|
2018-01-18 21:49:20 +00:00
|
|
|
SudoPrivilege(context.Context, *SudoPrivilegeArgs) (*SudoPrivilegeReply, error)
|
2018-02-17 01:41:01 +00:00
|
|
|
// Tainted, returns true if the mount is tainted. A mount is tainted if it is in the
|
2018-02-15 22:20:50 +00:00
|
|
|
// process of being unmounted. This should only be used in special
|
|
|
|
// circumstances; a primary use-case is as a guard in revocation functions.
|
|
|
|
// If revocation of a backend's leases fails it can keep the unmounting
|
|
|
|
// process from being successful. If the reason for this failure is not
|
|
|
|
// relevant when the mount is tainted (for instance, saving a CRL to disk
|
|
|
|
// when the stored CRL will be removed during the unmounting process
|
|
|
|
// anyways), we can ignore the errors to allow unmounting to complete.
|
2018-01-18 21:49:20 +00:00
|
|
|
Tainted(context.Context, *Empty) (*TaintedReply, error)
|
2018-02-17 01:41:01 +00:00
|
|
|
// CachingDisabled returns true if caching is disabled. If true, no caches
|
|
|
|
// should be used, despite known slowdowns.
|
2018-01-18 21:49:20 +00:00
|
|
|
CachingDisabled(context.Context, *Empty) (*CachingDisabledReply, error)
|
2018-02-15 22:20:50 +00:00
|
|
|
// ReplicationState indicates the state of cluster replication
|
2018-01-18 21:49:20 +00:00
|
|
|
ReplicationState(context.Context, *Empty) (*ReplicationStateReply, error)
|
2018-02-15 22:20:50 +00:00
|
|
|
// ResponseWrapData wraps the given data in a cubbyhole and returns the
|
|
|
|
// token used to unwrap.
|
2018-01-18 21:49:20 +00:00
|
|
|
ResponseWrapData(context.Context, *ResponseWrapDataArgs) (*ResponseWrapDataReply, error)
|
2018-02-15 22:20:50 +00:00
|
|
|
// MlockEnabled returns the configuration setting for enabling mlock on
|
|
|
|
// plugins.
|
2018-01-18 21:49:20 +00:00
|
|
|
MlockEnabled(context.Context, *Empty) (*MlockEnabledReply, error)
|
2018-02-17 01:41:01 +00:00
|
|
|
// LocalMount, when run from a system view attached to a request, indicates
|
|
|
|
// whether the request is affecting a local mount or not
|
2018-02-02 23:17:12 +00:00
|
|
|
LocalMount(context.Context, *Empty) (*LocalMountReply, error)
|
2018-06-04 00:48:12 +00:00
|
|
|
// EntityInfo returns the basic entity information for the given entity id
|
|
|
|
EntityInfo(context.Context, *EntityInfoArgs) (*EntityInfoReply, error)
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func RegisterSystemViewServer(s *grpc.Server, srv SystemViewServer) {
|
|
|
|
s.RegisterService(&_SystemView_serviceDesc, srv)
|
|
|
|
}
|
|
|
|
|
|
|
|
func _SystemView_DefaultLeaseTTL_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
|
|
in := new(Empty)
|
|
|
|
if err := dec(in); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if interceptor == nil {
|
|
|
|
return srv.(SystemViewServer).DefaultLeaseTTL(ctx, in)
|
|
|
|
}
|
|
|
|
info := &grpc.UnaryServerInfo{
|
|
|
|
Server: srv,
|
|
|
|
FullMethod: "/pb.SystemView/DefaultLeaseTTL",
|
|
|
|
}
|
|
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
|
|
return srv.(SystemViewServer).DefaultLeaseTTL(ctx, req.(*Empty))
|
|
|
|
}
|
|
|
|
return interceptor(ctx, in, info, handler)
|
|
|
|
}
|
|
|
|
|
|
|
|
func _SystemView_MaxLeaseTTL_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
|
|
in := new(Empty)
|
|
|
|
if err := dec(in); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if interceptor == nil {
|
|
|
|
return srv.(SystemViewServer).MaxLeaseTTL(ctx, in)
|
|
|
|
}
|
|
|
|
info := &grpc.UnaryServerInfo{
|
|
|
|
Server: srv,
|
|
|
|
FullMethod: "/pb.SystemView/MaxLeaseTTL",
|
|
|
|
}
|
|
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
|
|
return srv.(SystemViewServer).MaxLeaseTTL(ctx, req.(*Empty))
|
|
|
|
}
|
|
|
|
return interceptor(ctx, in, info, handler)
|
|
|
|
}
|
|
|
|
|
|
|
|
func _SystemView_SudoPrivilege_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
|
|
in := new(SudoPrivilegeArgs)
|
|
|
|
if err := dec(in); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if interceptor == nil {
|
|
|
|
return srv.(SystemViewServer).SudoPrivilege(ctx, in)
|
|
|
|
}
|
|
|
|
info := &grpc.UnaryServerInfo{
|
|
|
|
Server: srv,
|
|
|
|
FullMethod: "/pb.SystemView/SudoPrivilege",
|
|
|
|
}
|
|
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
|
|
return srv.(SystemViewServer).SudoPrivilege(ctx, req.(*SudoPrivilegeArgs))
|
|
|
|
}
|
|
|
|
return interceptor(ctx, in, info, handler)
|
|
|
|
}
|
|
|
|
|
|
|
|
func _SystemView_Tainted_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
|
|
in := new(Empty)
|
|
|
|
if err := dec(in); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if interceptor == nil {
|
|
|
|
return srv.(SystemViewServer).Tainted(ctx, in)
|
|
|
|
}
|
|
|
|
info := &grpc.UnaryServerInfo{
|
|
|
|
Server: srv,
|
|
|
|
FullMethod: "/pb.SystemView/Tainted",
|
|
|
|
}
|
|
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
|
|
return srv.(SystemViewServer).Tainted(ctx, req.(*Empty))
|
|
|
|
}
|
|
|
|
return interceptor(ctx, in, info, handler)
|
|
|
|
}
|
|
|
|
|
|
|
|
func _SystemView_CachingDisabled_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
|
|
in := new(Empty)
|
|
|
|
if err := dec(in); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if interceptor == nil {
|
|
|
|
return srv.(SystemViewServer).CachingDisabled(ctx, in)
|
|
|
|
}
|
|
|
|
info := &grpc.UnaryServerInfo{
|
|
|
|
Server: srv,
|
|
|
|
FullMethod: "/pb.SystemView/CachingDisabled",
|
|
|
|
}
|
|
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
|
|
return srv.(SystemViewServer).CachingDisabled(ctx, req.(*Empty))
|
|
|
|
}
|
|
|
|
return interceptor(ctx, in, info, handler)
|
|
|
|
}
|
|
|
|
|
|
|
|
func _SystemView_ReplicationState_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
|
|
in := new(Empty)
|
|
|
|
if err := dec(in); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if interceptor == nil {
|
|
|
|
return srv.(SystemViewServer).ReplicationState(ctx, in)
|
|
|
|
}
|
|
|
|
info := &grpc.UnaryServerInfo{
|
|
|
|
Server: srv,
|
|
|
|
FullMethod: "/pb.SystemView/ReplicationState",
|
|
|
|
}
|
|
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
|
|
return srv.(SystemViewServer).ReplicationState(ctx, req.(*Empty))
|
|
|
|
}
|
|
|
|
return interceptor(ctx, in, info, handler)
|
|
|
|
}
|
|
|
|
|
|
|
|
func _SystemView_ResponseWrapData_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
|
|
in := new(ResponseWrapDataArgs)
|
|
|
|
if err := dec(in); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if interceptor == nil {
|
|
|
|
return srv.(SystemViewServer).ResponseWrapData(ctx, in)
|
|
|
|
}
|
|
|
|
info := &grpc.UnaryServerInfo{
|
|
|
|
Server: srv,
|
|
|
|
FullMethod: "/pb.SystemView/ResponseWrapData",
|
|
|
|
}
|
|
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
|
|
return srv.(SystemViewServer).ResponseWrapData(ctx, req.(*ResponseWrapDataArgs))
|
|
|
|
}
|
|
|
|
return interceptor(ctx, in, info, handler)
|
|
|
|
}
|
|
|
|
|
|
|
|
func _SystemView_MlockEnabled_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
|
|
in := new(Empty)
|
|
|
|
if err := dec(in); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if interceptor == nil {
|
|
|
|
return srv.(SystemViewServer).MlockEnabled(ctx, in)
|
|
|
|
}
|
|
|
|
info := &grpc.UnaryServerInfo{
|
|
|
|
Server: srv,
|
|
|
|
FullMethod: "/pb.SystemView/MlockEnabled",
|
|
|
|
}
|
|
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
|
|
return srv.(SystemViewServer).MlockEnabled(ctx, req.(*Empty))
|
|
|
|
}
|
|
|
|
return interceptor(ctx, in, info, handler)
|
|
|
|
}
|
|
|
|
|
2018-02-02 23:17:12 +00:00
|
|
|
func _SystemView_LocalMount_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
|
|
in := new(Empty)
|
|
|
|
if err := dec(in); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if interceptor == nil {
|
|
|
|
return srv.(SystemViewServer).LocalMount(ctx, in)
|
|
|
|
}
|
|
|
|
info := &grpc.UnaryServerInfo{
|
|
|
|
Server: srv,
|
|
|
|
FullMethod: "/pb.SystemView/LocalMount",
|
|
|
|
}
|
|
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
|
|
return srv.(SystemViewServer).LocalMount(ctx, req.(*Empty))
|
|
|
|
}
|
|
|
|
return interceptor(ctx, in, info, handler)
|
|
|
|
}
|
|
|
|
|
2018-06-04 00:48:12 +00:00
|
|
|
func _SystemView_EntityInfo_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) {
|
|
|
|
in := new(EntityInfoArgs)
|
|
|
|
if err := dec(in); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if interceptor == nil {
|
|
|
|
return srv.(SystemViewServer).EntityInfo(ctx, in)
|
|
|
|
}
|
|
|
|
info := &grpc.UnaryServerInfo{
|
|
|
|
Server: srv,
|
|
|
|
FullMethod: "/pb.SystemView/EntityInfo",
|
|
|
|
}
|
|
|
|
handler := func(ctx context.Context, req interface{}) (interface{}, error) {
|
|
|
|
return srv.(SystemViewServer).EntityInfo(ctx, req.(*EntityInfoArgs))
|
|
|
|
}
|
|
|
|
return interceptor(ctx, in, info, handler)
|
|
|
|
}
|
|
|
|
|
2018-01-18 21:49:20 +00:00
|
|
|
var _SystemView_serviceDesc = grpc.ServiceDesc{
|
|
|
|
ServiceName: "pb.SystemView",
|
|
|
|
HandlerType: (*SystemViewServer)(nil),
|
|
|
|
Methods: []grpc.MethodDesc{
|
|
|
|
{
|
|
|
|
MethodName: "DefaultLeaseTTL",
|
|
|
|
Handler: _SystemView_DefaultLeaseTTL_Handler,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
MethodName: "MaxLeaseTTL",
|
|
|
|
Handler: _SystemView_MaxLeaseTTL_Handler,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
MethodName: "SudoPrivilege",
|
|
|
|
Handler: _SystemView_SudoPrivilege_Handler,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
MethodName: "Tainted",
|
|
|
|
Handler: _SystemView_Tainted_Handler,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
MethodName: "CachingDisabled",
|
|
|
|
Handler: _SystemView_CachingDisabled_Handler,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
MethodName: "ReplicationState",
|
|
|
|
Handler: _SystemView_ReplicationState_Handler,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
MethodName: "ResponseWrapData",
|
|
|
|
Handler: _SystemView_ResponseWrapData_Handler,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
MethodName: "MlockEnabled",
|
|
|
|
Handler: _SystemView_MlockEnabled_Handler,
|
|
|
|
},
|
2018-02-02 23:17:12 +00:00
|
|
|
{
|
|
|
|
MethodName: "LocalMount",
|
|
|
|
Handler: _SystemView_LocalMount_Handler,
|
|
|
|
},
|
2018-06-04 00:48:12 +00:00
|
|
|
{
|
|
|
|
MethodName: "EntityInfo",
|
|
|
|
Handler: _SystemView_EntityInfo_Handler,
|
|
|
|
},
|
2018-01-18 21:49:20 +00:00
|
|
|
},
|
|
|
|
Streams: []grpc.StreamDesc{},
|
|
|
|
Metadata: "logical/plugin/pb/backend.proto",
|
|
|
|
}
|
|
|
|
|
2018-05-03 19:38:53 +00:00
|
|
|
func init() {
|
2018-07-11 00:49:48 +00:00
|
|
|
proto.RegisterFile("logical/plugin/pb/backend.proto", fileDescriptor_backend_47c8b1854cae270c)
|
2018-06-04 14:19:26 +00:00
|
|
|
}
|
|
|
|
|
2018-07-11 00:49:48 +00:00
|
|
|
var fileDescriptor_backend_47c8b1854cae270c = []byte{
|
2018-06-04 14:19:26 +00:00
|
|
|
// 2201 bytes of a gzipped FileDescriptorProto
|
|
|
|
0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xb4, 0x58, 0x5f, 0x73, 0xdb, 0xc6,
|
|
|
|
0x11, 0x1f, 0xfe, 0x07, 0x97, 0xa4, 0x28, 0x9d, 0x15, 0x17, 0xa6, 0x9d, 0x9a, 0x45, 0x6a, 0x9b,
|
|
|
|
0xf1, 0xc4, 0x94, 0xcd, 0x34, 0xad, 0xd3, 0x4e, 0xd2, 0x51, 0x24, 0xc5, 0x51, 0x23, 0x25, 0x1a,
|
|
|
|
0x48, 0x6e, 0xfa, 0x6f, 0x86, 0x39, 0x02, 0x2b, 0x12, 0x23, 0x10, 0x40, 0x0f, 0x07, 0xc9, 0x7c,
|
|
|
|
0xea, 0xb7, 0xe8, 0x43, 0x67, 0xfa, 0x19, 0xfa, 0xda, 0xb7, 0xbe, 0x76, 0xa6, 0xcf, 0xfd, 0x1a,
|
|
|
|
0xfd, 0x0c, 0x9d, 0xfb, 0x03, 0x10, 0x20, 0xa9, 0xc6, 0x9d, 0x69, 0xdf, 0x6e, 0xff, 0xdd, 0xde,
|
|
|
|
0x2e, 0x76, 0x7f, 0x7b, 0x07, 0x78, 0xe8, 0x87, 0x53, 0xcf, 0xa1, 0xfe, 0x5e, 0xe4, 0x27, 0x53,
|
|
|
|
0x2f, 0xd8, 0x8b, 0x26, 0x7b, 0x13, 0xea, 0x5c, 0x61, 0xe0, 0x0e, 0x23, 0x16, 0xf2, 0x90, 0x94,
|
|
|
|
0xa3, 0x49, 0xef, 0xe1, 0x34, 0x0c, 0xa7, 0x3e, 0xee, 0x49, 0xce, 0x24, 0xb9, 0xdc, 0xe3, 0xde,
|
|
|
|
0x1c, 0x63, 0x4e, 0xe7, 0x91, 0x52, 0xea, 0xdd, 0x4d, 0x77, 0xf1, 0x5c, 0x0c, 0xb8, 0xc7, 0x17,
|
|
|
|
0x8a, 0x6f, 0x35, 0xa0, 0x76, 0x34, 0x8f, 0xf8, 0xc2, 0xea, 0x43, 0xfd, 0x0b, 0xa4, 0x2e, 0x32,
|
|
|
|
0x72, 0x17, 0xea, 0x33, 0xb9, 0x32, 0x4b, 0xfd, 0xca, 0xa0, 0x69, 0x6b, 0xca, 0xfa, 0x2d, 0xc0,
|
|
|
|
0x99, 0xb0, 0x39, 0x62, 0x2c, 0x64, 0xe4, 0x1e, 0x18, 0xc8, 0xd8, 0x98, 0x2f, 0x22, 0x34, 0x4b,
|
|
|
|
0xfd, 0xd2, 0xa0, 0x63, 0x37, 0x90, 0xb1, 0x8b, 0x45, 0x84, 0xe4, 0x7b, 0x20, 0x96, 0xe3, 0x79,
|
|
|
|
0x3c, 0x35, 0xcb, 0xfd, 0x92, 0xd8, 0x01, 0x19, 0x3b, 0x8d, 0xa7, 0xa9, 0x8d, 0x13, 0xba, 0x68,
|
|
|
|
0x56, 0xfa, 0xa5, 0x41, 0x45, 0xda, 0x1c, 0x84, 0x2e, 0x5a, 0x7f, 0x2c, 0x41, 0xed, 0x8c, 0xf2,
|
|
|
|
0x59, 0x4c, 0x08, 0x54, 0x59, 0x18, 0x72, 0xed, 0x5c, 0xae, 0xc9, 0x00, 0xba, 0x49, 0x40, 0x13,
|
|
|
|
0x3e, 0x13, 0x67, 0x77, 0x28, 0x47, 0xd7, 0x2c, 0x4b, 0xf1, 0x2a, 0x9b, 0xbc, 0x07, 0x1d, 0x3f,
|
|
|
|
0x74, 0xa8, 0x3f, 0x8e, 0x79, 0xc8, 0xe8, 0x54, 0xf8, 0x11, 0x7a, 0x6d, 0xc9, 0x3c, 0x57, 0x3c,
|
|
|
|
0xf2, 0x14, 0x76, 0x62, 0xa4, 0xfe, 0xf8, 0x86, 0xd1, 0x28, 0x53, 0xac, 0xaa, 0x0d, 0x85, 0xe0,
|
|
|
|
0x1b, 0x46, 0x23, 0xad, 0x6b, 0xfd, 0xad, 0x0e, 0x0d, 0x1b, 0x7f, 0x9f, 0x60, 0xcc, 0xc9, 0x16,
|
|
|
|
0x94, 0x3d, 0x57, 0x46, 0xdb, 0xb4, 0xcb, 0x9e, 0x4b, 0x86, 0x40, 0x6c, 0x8c, 0x7c, 0xe1, 0xda,
|
|
|
|
0x0b, 0x83, 0x03, 0x3f, 0x89, 0x39, 0x32, 0x1d, 0xf3, 0x06, 0x09, 0x79, 0x00, 0xcd, 0x30, 0x42,
|
|
|
|
0x26, 0x79, 0x32, 0x01, 0x4d, 0x7b, 0xc9, 0x10, 0x81, 0x47, 0x94, 0xcf, 0xcc, 0xaa, 0x14, 0xc8,
|
|
|
|
0xb5, 0xe0, 0xb9, 0x94, 0x53, 0xb3, 0xa6, 0x78, 0x62, 0x4d, 0x2c, 0xa8, 0xc7, 0xe8, 0x30, 0xe4,
|
|
|
|
0x66, 0xbd, 0x5f, 0x1a, 0xb4, 0x46, 0x30, 0x8c, 0x26, 0xc3, 0x73, 0xc9, 0xb1, 0xb5, 0x84, 0x3c,
|
|
|
|
0x80, 0xaa, 0xc8, 0x8b, 0xd9, 0x90, 0x1a, 0x86, 0xd0, 0xd8, 0x4f, 0xf8, 0xcc, 0x96, 0x5c, 0x32,
|
|
|
|
0x82, 0x86, 0xfa, 0xa6, 0xb1, 0x69, 0xf4, 0x2b, 0x83, 0xd6, 0xc8, 0x14, 0x0a, 0x3a, 0xca, 0xa1,
|
|
|
|
0x2a, 0x83, 0xf8, 0x28, 0xe0, 0x6c, 0x61, 0xa7, 0x8a, 0xe4, 0x07, 0xd0, 0x76, 0x7c, 0x0f, 0x03,
|
|
|
|
0x3e, 0xe6, 0xe1, 0x15, 0x06, 0x66, 0x53, 0x9e, 0xa8, 0xa5, 0x78, 0x17, 0x82, 0x45, 0x46, 0xf0,
|
|
|
|
0x4e, 0x5e, 0x65, 0x4c, 0x1d, 0x07, 0xe3, 0x38, 0x64, 0x26, 0x48, 0xdd, 0x3b, 0x39, 0xdd, 0x7d,
|
|
|
|
0x2d, 0x12, 0xdb, 0xba, 0x5e, 0x1c, 0xf9, 0x74, 0x31, 0x0e, 0xe8, 0x1c, 0xcd, 0x96, 0xda, 0x56,
|
|
|
|
0xf3, 0xbe, 0xa2, 0x73, 0x24, 0x0f, 0xa1, 0x35, 0x0f, 0x93, 0x80, 0x8f, 0xa3, 0xd0, 0x0b, 0xb8,
|
|
|
|
0xd9, 0x96, 0x1a, 0x20, 0x59, 0x67, 0x82, 0x43, 0xde, 0x05, 0x45, 0xa9, 0x62, 0xec, 0xa8, 0xbc,
|
|
|
|
0x4a, 0x8e, 0x2c, 0xc7, 0x47, 0xb0, 0xa5, 0xc4, 0xd9, 0x79, 0xb6, 0xa4, 0x4a, 0x47, 0x72, 0xb3,
|
|
|
|
0x93, 0x3c, 0x87, 0xa6, 0xac, 0x07, 0x2f, 0xb8, 0x0c, 0xcd, 0xae, 0xcc, 0xdb, 0x9d, 0x5c, 0x5a,
|
|
|
|
0x44, 0x4d, 0x1c, 0x07, 0x97, 0xa1, 0x6d, 0xdc, 0xe8, 0x15, 0xf9, 0x04, 0xee, 0x17, 0xe2, 0x65,
|
|
|
|
0x38, 0xa7, 0x5e, 0xe0, 0x05, 0xd3, 0x71, 0x12, 0x63, 0x6c, 0x6e, 0xcb, 0x0a, 0x37, 0x73, 0x51,
|
|
|
|
0xdb, 0xa9, 0xc2, 0xeb, 0x18, 0x63, 0x72, 0x1f, 0x9a, 0xaa, 0x15, 0xc7, 0x9e, 0x6b, 0xee, 0xc8,
|
|
|
|
0x23, 0x19, 0x8a, 0x71, 0xec, 0x92, 0x27, 0xd0, 0x8d, 0x42, 0xdf, 0x73, 0x16, 0xe3, 0xf0, 0x1a,
|
|
|
|
0x19, 0xf3, 0x5c, 0x34, 0x49, 0xbf, 0x34, 0x30, 0xec, 0x2d, 0xc5, 0xfe, 0x5a, 0x73, 0x37, 0xb5,
|
|
|
|
0xc6, 0x1d, 0xa9, 0xb8, 0xd6, 0x1a, 0x43, 0x00, 0x27, 0x0c, 0x02, 0x74, 0x64, 0xf9, 0xed, 0xca,
|
|
|
|
0x08, 0xb7, 0x44, 0x84, 0x07, 0x19, 0xd7, 0xce, 0x69, 0xf4, 0x3e, 0x87, 0x76, 0xbe, 0x14, 0xc8,
|
|
|
|
0x36, 0x54, 0xae, 0x70, 0xa1, 0xcb, 0x5f, 0x2c, 0x49, 0x1f, 0x6a, 0xd7, 0xd4, 0x4f, 0x50, 0x96,
|
|
|
|
0xbc, 0x2e, 0x44, 0x65, 0x62, 0x2b, 0xc1, 0x4f, 0xcb, 0x2f, 0x4b, 0xd6, 0x9f, 0xab, 0x50, 0x15,
|
|
|
|
0xc5, 0x47, 0x3e, 0x82, 0x8e, 0x8f, 0x34, 0xc6, 0x71, 0x18, 0x09, 0x07, 0xb1, 0xdc, 0xaa, 0x35,
|
|
|
|
0xda, 0x16, 0x66, 0x27, 0x42, 0xf0, 0xb5, 0xe2, 0xdb, 0x6d, 0x3f, 0x47, 0x89, 0x96, 0xf6, 0x02,
|
|
|
|
0x8e, 0x2c, 0xa0, 0xfe, 0x58, 0x36, 0x83, 0x6a, 0xb0, 0x76, 0xca, 0x3c, 0x14, 0x4d, 0xb1, 0x5a,
|
|
|
|
0x47, 0x95, 0xf5, 0x3a, 0xea, 0x81, 0x21, 0x73, 0xe7, 0x61, 0xac, 0x9b, 0x3d, 0xa3, 0xc9, 0x08,
|
|
|
|
0x8c, 0x39, 0x72, 0xaa, 0x7b, 0x4d, 0xb4, 0xc4, 0xdd, 0xb4, 0x67, 0x86, 0xa7, 0x5a, 0xa0, 0x1a,
|
|
|
|
0x22, 0xd3, 0x5b, 0xeb, 0x88, 0xfa, 0x7a, 0x47, 0xf4, 0xc0, 0xc8, 0x8a, 0xae, 0xa1, 0xbe, 0x70,
|
|
|
|
0x4a, 0x0b, 0x98, 0x8d, 0x90, 0x79, 0xa1, 0x6b, 0x1a, 0xb2, 0x50, 0x34, 0x25, 0x40, 0x32, 0x48,
|
|
|
|
0xe6, 0xaa, 0x84, 0x9a, 0x0a, 0x24, 0x83, 0x64, 0xbe, 0x5e, 0x31, 0xb0, 0x52, 0x31, 0x3f, 0x84,
|
|
|
|
0x1a, 0xf5, 0x3d, 0x1a, 0xcb, 0x16, 0x12, 0x5f, 0x56, 0x23, 0xfe, 0x70, 0x5f, 0x70, 0x6d, 0x25,
|
|
|
|
0x24, 0x1f, 0x42, 0x67, 0xca, 0xc2, 0x24, 0x1a, 0x4b, 0x12, 0x63, 0xb3, 0x2d, 0xa3, 0x5d, 0xd5,
|
|
|
|
0x6e, 0x4b, 0xa5, 0x7d, 0xa5, 0x23, 0x3a, 0x70, 0x12, 0x26, 0x81, 0x3b, 0x76, 0x3c, 0x97, 0xc5,
|
|
|
|
0x66, 0x47, 0x26, 0x0f, 0x24, 0xeb, 0x40, 0x70, 0x7a, 0x3f, 0x83, 0x4e, 0x21, 0x4b, 0x1b, 0x6a,
|
|
|
|
0x65, 0x37, 0x5f, 0x2b, 0xcd, 0x7c, 0x7d, 0xfc, 0xa5, 0x04, 0xed, 0xfc, 0xe7, 0x17, 0xc6, 0x17,
|
|
|
|
0x17, 0x27, 0xd2, 0xb8, 0x62, 0x8b, 0xa5, 0x00, 0x4e, 0x86, 0x01, 0xde, 0xd0, 0x89, 0xaf, 0x36,
|
|
|
|
0x30, 0xec, 0x25, 0x43, 0x48, 0xbd, 0xc0, 0x61, 0x38, 0xc7, 0x80, 0xeb, 0xb9, 0xb2, 0x64, 0x90,
|
|
|
|
0x8f, 0x01, 0xbc, 0x38, 0x4e, 0x70, 0x2c, 0x46, 0xa2, 0x04, 0xd7, 0xd6, 0xa8, 0x37, 0x54, 0xf3,
|
|
|
|
0x72, 0x98, 0xce, 0xcb, 0xe1, 0x45, 0x3a, 0x2f, 0xed, 0xa6, 0xd4, 0x16, 0xb4, 0xf8, 0x44, 0xa7,
|
|
|
|
0xf4, 0x8d, 0x38, 0x4b, 0x4d, 0x7d, 0x22, 0x45, 0x59, 0x7f, 0x80, 0xba, 0xc2, 0xdb, 0xff, 0x6b,
|
|
|
|
0x49, 0xdf, 0x03, 0x43, 0xed, 0xed, 0xb9, 0xba, 0x9c, 0x1b, 0x92, 0x3e, 0x76, 0xad, 0x7f, 0x94,
|
|
|
|
0xc0, 0xb0, 0x31, 0x8e, 0xc2, 0x20, 0xc6, 0xdc, 0x3c, 0x28, 0x7d, 0xe7, 0x3c, 0x28, 0x6f, 0x9c,
|
|
|
|
0x07, 0xe9, 0x94, 0xa9, 0xe4, 0xa6, 0x4c, 0x0f, 0x0c, 0x86, 0xae, 0xc7, 0xd0, 0xe1, 0x7a, 0x22,
|
|
|
|
0x65, 0xb4, 0x90, 0xdd, 0x50, 0x26, 0x80, 0x2c, 0x96, 0xdd, 0xd2, 0xb4, 0x33, 0x9a, 0xbc, 0xc8,
|
|
|
|
0xc3, 0xa8, 0x1a, 0x50, 0xbb, 0x0a, 0x46, 0xd5, 0x71, 0xd7, 0x71, 0xd4, 0xfa, 0x7b, 0x19, 0xb6,
|
|
|
|
0x57, 0xc5, 0x1b, 0x8a, 0x60, 0x17, 0x6a, 0xaa, 0xd1, 0x74, 0x05, 0xf1, 0xb5, 0x16, 0xab, 0xac,
|
|
|
|
0xb4, 0xd8, 0xcf, 0xa1, 0xe3, 0x30, 0x94, 0xd3, 0xf5, 0x6d, 0xbf, 0x7e, 0x3b, 0x35, 0x90, 0x05,
|
|
|
|
0xf0, 0x3e, 0x6c, 0x8b, 0x53, 0x46, 0xe8, 0x2e, 0x87, 0x87, 0x1a, 0xc5, 0x5d, 0xcd, 0xcf, 0xc6,
|
|
|
|
0xc7, 0x53, 0xd8, 0x49, 0x55, 0x97, 0x3d, 0x5a, 0x2f, 0xe8, 0x1e, 0xa5, 0xad, 0x7a, 0x17, 0xea,
|
|
|
|
0x97, 0x21, 0x9b, 0x53, 0xae, 0x41, 0x41, 0x53, 0xa2, 0x2c, 0xb2, 0xf3, 0xca, 0xab, 0x80, 0xa1,
|
|
|
|
0xca, 0x22, 0x65, 0x8a, 0x0b, 0x92, 0x00, 0x81, 0xec, 0xf2, 0x22, 0x01, 0xc2, 0xb0, 0x8d, 0xf4,
|
|
|
|
0xd2, 0x62, 0xfd, 0x0a, 0xba, 0x2b, 0xf3, 0x6a, 0x43, 0x22, 0x97, 0xee, 0xcb, 0x05, 0xf7, 0x85,
|
|
|
|
0x9d, 0x2b, 0x2b, 0x3b, 0xff, 0x1a, 0x76, 0xbe, 0xa0, 0x81, 0xeb, 0xa3, 0xde, 0x7f, 0x9f, 0x4d,
|
|
|
|
0x63, 0x31, 0x79, 0xf5, 0xf5, 0x69, 0xac, 0x2f, 0x46, 0x1d, 0xbb, 0xa9, 0x39, 0xc7, 0x2e, 0x79,
|
|
|
|
0x04, 0x0d, 0xa6, 0xb4, 0x75, 0xe1, 0xb5, 0x72, 0x03, 0xd5, 0x4e, 0x65, 0xd6, 0xb7, 0x40, 0x0a,
|
|
|
|
0x5b, 0x8b, 0x9b, 0xd3, 0x82, 0x0c, 0x44, 0x01, 0xaa, 0xa2, 0xd0, 0x85, 0xdd, 0xce, 0xd7, 0x91,
|
|
|
|
0x9d, 0x49, 0x49, 0x1f, 0x2a, 0xc8, 0x98, 0x76, 0x21, 0x27, 0xda, 0xf2, 0x9e, 0x6a, 0x0b, 0x91,
|
|
|
|
0xf5, 0x23, 0xd8, 0x39, 0x8f, 0xd0, 0xf1, 0xa8, 0x2f, 0xef, 0x98, 0xca, 0xc1, 0x43, 0xa8, 0x89,
|
|
|
|
0x24, 0xa7, 0x3d, 0xdb, 0x94, 0x86, 0x52, 0xac, 0xf8, 0xd6, 0xb7, 0x60, 0xaa, 0x73, 0x1d, 0xbd,
|
|
|
|
0xf1, 0x62, 0x8e, 0x81, 0x83, 0x07, 0x33, 0x74, 0xae, 0xfe, 0x87, 0x91, 0x5f, 0xc3, 0xbd, 0x4d,
|
|
|
|
0x1e, 0xd2, 0xf3, 0xb5, 0x1c, 0x41, 0x8d, 0x2f, 0x05, 0xd0, 0x4a, 0x1f, 0x86, 0x0d, 0x92, 0xf5,
|
|
|
|
0xb9, 0xe0, 0x88, 0xef, 0x88, 0xc2, 0x2e, 0xd6, 0x90, 0xa8, 0xa9, 0x34, 0x1f, 0x95, 0xdb, 0xf3,
|
|
|
|
0xf1, 0xd7, 0x12, 0x34, 0xcf, 0x91, 0x27, 0x91, 0x8c, 0xe5, 0x3e, 0x34, 0x27, 0x2c, 0xbc, 0x42,
|
|
|
|
0xb6, 0x0c, 0xc5, 0x50, 0x8c, 0x63, 0x97, 0xbc, 0x80, 0xfa, 0x41, 0x18, 0x5c, 0x7a, 0x53, 0x79,
|
|
|
|
0xe3, 0x6e, 0x8d, 0xee, 0x29, 0x74, 0xd1, 0xb6, 0x43, 0x25, 0x53, 0xa3, 0x51, 0x2b, 0x92, 0x3e,
|
|
|
|
0xb4, 0xf4, 0x0b, 0xe5, 0xf5, 0xeb, 0xe3, 0xc3, 0x74, 0x14, 0xe7, 0x58, 0xbd, 0x8f, 0xa1, 0x95,
|
|
|
|
0x33, 0xfc, 0xaf, 0xa6, 0xc5, 0xf7, 0x01, 0xa4, 0x77, 0x95, 0xa3, 0x6d, 0x15, 0xaa, 0xb6, 0x14,
|
|
|
|
0xa1, 0x3d, 0x84, 0xa6, 0xb8, 0xf5, 0x29, 0x31, 0x81, 0x6a, 0xee, 0x81, 0x22, 0xd7, 0xd6, 0x23,
|
|
|
|
0xd8, 0x39, 0x0e, 0xae, 0xa9, 0xef, 0xb9, 0x94, 0xe3, 0x97, 0xb8, 0x90, 0x29, 0x58, 0x3b, 0x81,
|
|
|
|
0x75, 0x0e, 0x6d, 0xfd, 0x04, 0x78, 0xab, 0x33, 0xb6, 0xf5, 0x19, 0xff, 0x73, 0x13, 0xbd, 0x0f,
|
|
|
|
0x5d, 0xbd, 0xe9, 0x89, 0xa7, 0x5b, 0x48, 0x5c, 0x03, 0x18, 0x5e, 0x7a, 0x6f, 0xf4, 0xd6, 0x9a,
|
|
|
|
0xb2, 0x5e, 0xc2, 0x76, 0x4e, 0x35, 0x0b, 0xe7, 0x0a, 0x17, 0x71, 0xfa, 0x34, 0x12, 0xeb, 0x34,
|
|
|
|
0x03, 0xe5, 0x65, 0x06, 0x2c, 0xd8, 0xd2, 0x96, 0xaf, 0x90, 0xdf, 0x12, 0xdd, 0x97, 0xd9, 0x41,
|
|
|
|
0x5e, 0xa1, 0xde, 0xfc, 0x31, 0xd4, 0x50, 0x44, 0x9a, 0x1f, 0x61, 0xf9, 0x0c, 0xd8, 0x4a, 0xbc,
|
|
|
|
0xc1, 0xe1, 0xcb, 0xcc, 0xe1, 0x59, 0xa2, 0x1c, 0xbe, 0xe5, 0x5e, 0xd6, 0x7b, 0xd9, 0x31, 0xce,
|
|
|
|
0x12, 0x7e, 0xdb, 0x17, 0x7d, 0x04, 0x3b, 0x5a, 0xe9, 0x10, 0x7d, 0xe4, 0x78, 0x4b, 0x48, 0x8f,
|
|
|
|
0x81, 0x14, 0xd4, 0x6e, 0xdb, 0xee, 0x01, 0x18, 0x17, 0x17, 0x27, 0x99, 0xb4, 0x88, 0x8d, 0xd6,
|
|
|
|
0x27, 0xb0, 0x73, 0x9e, 0xb8, 0xe1, 0x19, 0xf3, 0xae, 0x3d, 0x1f, 0xa7, 0xca, 0x59, 0xfa, 0x32,
|
|
|
|
0x2b, 0xe5, 0x5e, 0x66, 0x1b, 0xa7, 0x91, 0x35, 0x00, 0x52, 0x30, 0xcf, 0xbe, 0x5b, 0x9c, 0xb8,
|
|
|
|
0xa1, 0x6e, 0x61, 0xb9, 0xb6, 0x06, 0xd0, 0xbe, 0xa0, 0x62, 0xde, 0xbb, 0x4a, 0xc7, 0x84, 0x06,
|
|
|
|
0x57, 0xb4, 0x56, 0x4b, 0x49, 0x6b, 0x04, 0xbb, 0x07, 0xd4, 0x99, 0x79, 0xc1, 0xf4, 0xd0, 0x8b,
|
|
|
|
0xc5, 0x85, 0x47, 0x5b, 0xf4, 0xc0, 0x70, 0x35, 0x43, 0x9b, 0x64, 0xb4, 0xf5, 0x0c, 0xde, 0xc9,
|
|
|
|
0xbd, 0x3f, 0xcf, 0x39, 0x4d, 0xf3, 0xb1, 0x0b, 0xb5, 0x58, 0x50, 0xd2, 0xa2, 0x66, 0x2b, 0xc2,
|
|
|
|
0xfa, 0x0a, 0x76, 0xf3, 0x03, 0x58, 0x5c, 0x3f, 0xd2, 0xc0, 0xe5, 0xc5, 0xa0, 0x94, 0xbb, 0x18,
|
|
|
|
0xe8, 0x9c, 0x95, 0x97, 0xf3, 0x64, 0x1b, 0x2a, 0xbf, 0xf8, 0xe6, 0x42, 0x17, 0xbb, 0x58, 0x5a,
|
|
|
|
0xbf, 0x13, 0xee, 0x8b, 0xfb, 0x29, 0xf7, 0x85, 0xdb, 0x41, 0xe9, 0x6d, 0x6e, 0x07, 0x1b, 0xea,
|
|
|
|
0xed, 0x19, 0xec, 0x9c, 0xfa, 0xa1, 0x73, 0x75, 0x14, 0xe4, 0xb2, 0x61, 0x42, 0x03, 0x83, 0x7c,
|
|
|
|
0x32, 0x52, 0xd2, 0x7a, 0x02, 0xdd, 0x13, 0xf1, 0xfa, 0x3f, 0x15, 0xcf, 0xbd, 0x2c, 0x0b, 0xf2,
|
|
|
|
0x87, 0x80, 0x56, 0x55, 0x84, 0xf5, 0x0c, 0xb6, 0xf4, 0x88, 0x0e, 0x2e, 0xc3, 0x14, 0x19, 0x97,
|
|
|
|
0xc3, 0xbc, 0x54, 0xbc, 0x70, 0x5b, 0x27, 0xd0, 0x5d, 0xaa, 0xab, 0x7d, 0x9f, 0x40, 0x5d, 0x89,
|
|
|
|
0x75, 0x6c, 0xdd, 0xec, 0x5a, 0xad, 0x34, 0x6d, 0x2d, 0xde, 0x18, 0x14, 0x2c, 0xdf, 0x61, 0x02,
|
|
|
|
0xfb, 0x19, 0xce, 0x43, 0x8e, 0x63, 0xea, 0xba, 0x69, 0xf9, 0x82, 0x62, 0xed, 0xbb, 0x2e, 0x1b,
|
|
|
|
0xfd, 0xab, 0x0c, 0x8d, 0xcf, 0x14, 0xa2, 0x92, 0x4f, 0xa1, 0x53, 0x98, 0x9f, 0xe4, 0x1d, 0xf9,
|
|
|
|
0x10, 0x5b, 0x9d, 0xd6, 0xbd, 0xbb, 0x6b, 0x6c, 0x75, 0xea, 0xe7, 0xd0, 0xce, 0x4f, 0x47, 0x22,
|
|
|
|
0x27, 0xa1, 0xfc, 0x2b, 0xd4, 0x93, 0x3b, 0xad, 0x8f, 0xce, 0x73, 0xd8, 0xdd, 0x34, 0xb7, 0xc8,
|
|
|
|
0x83, 0xa5, 0x87, 0xf5, 0x99, 0xd9, 0x7b, 0xf7, 0x36, 0x69, 0x3a, 0xef, 0x1a, 0x07, 0x3e, 0xd2,
|
|
|
|
0x20, 0x89, 0xf2, 0x27, 0x58, 0x2e, 0xc9, 0x0b, 0xe8, 0x14, 0x90, 0x5b, 0xc5, 0xb9, 0x06, 0xe6,
|
|
|
|
0x79, 0x93, 0xc7, 0x50, 0x93, 0xd3, 0x82, 0x74, 0x0a, 0x63, 0xab, 0xb7, 0x95, 0x91, 0xca, 0x77,
|
|
|
|
0x1f, 0xaa, 0xf2, 0x5f, 0x41, 0xce, 0xb1, 0xb4, 0xc8, 0x46, 0xc9, 0xe8, 0x9f, 0x25, 0x68, 0xa4,
|
|
|
|
0xff, 0x8f, 0x5e, 0x40, 0x55, 0x80, 0x32, 0xb9, 0x93, 0xc3, 0xb5, 0x14, 0xd0, 0x7b, 0xbb, 0x2b,
|
|
|
|
0x4c, 0xe5, 0x60, 0x08, 0x95, 0x57, 0xc8, 0x09, 0xc9, 0x09, 0x35, 0x3a, 0xf7, 0xee, 0x14, 0x79,
|
|
|
|
0x99, 0xfe, 0x59, 0x52, 0xd4, 0xd7, 0xe0, 0x5a, 0xd0, 0xcf, 0x60, 0xf3, 0x27, 0x50, 0x57, 0xb0,
|
|
|
|
0xa7, 0x92, 0xb2, 0x06, 0x98, 0xea, 0xe3, 0xaf, 0x03, 0xe4, 0xe8, 0x4f, 0x55, 0x80, 0xf3, 0x45,
|
|
|
|
0xcc, 0x71, 0xfe, 0x4b, 0x0f, 0x6f, 0xc8, 0x53, 0xe8, 0x1e, 0xe2, 0x25, 0x4d, 0x7c, 0x2e, 0x9f,
|
|
|
|
0x2f, 0xa2, 0xbd, 0x73, 0x39, 0x91, 0x37, 0xb0, 0x0c, 0x3d, 0x1f, 0x43, 0xeb, 0x94, 0xbe, 0xf9,
|
|
|
|
0x6e, 0xbd, 0x4f, 0xa1, 0x53, 0x00, 0x45, 0x7d, 0xc4, 0x55, 0x98, 0xd5, 0x47, 0x5c, 0x87, 0xcf,
|
|
|
|
0xc7, 0xd0, 0xd0, 0x50, 0x99, 0xf7, 0x21, 0x87, 0x4a, 0x01, 0x42, 0x7f, 0x0c, 0xdd, 0x15, 0xa0,
|
|
|
|
0xcc, 0xeb, 0xcb, 0x7f, 0x5c, 0x1b, 0x81, 0xf4, 0xa5, 0x78, 0x7e, 0x14, 0xc1, 0x32, 0x6f, 0x78,
|
|
|
|
0x4f, 0x01, 0xd4, 0x26, 0x34, 0x7d, 0x55, 0x7c, 0xb8, 0xc8, 0x67, 0x9b, 0xb9, 0x8a, 0x67, 0x29,
|
|
|
|
0x9a, 0xa6, 0x1b, 0x6d, 0xc2, 0xc5, 0xe7, 0xd0, 0xce, 0x43, 0xda, 0x5a, 0x0b, 0xae, 0xe3, 0xdd,
|
|
|
|
0x07, 0x00, 0x4b, 0x54, 0xcb, 0xeb, 0xcb, 0xf2, 0x58, 0x05, 0xbc, 0x8f, 0x00, 0x96, 0x58, 0xa5,
|
|
|
|
0xaa, 0xaa, 0x08, 0x75, 0xca, 0x6c, 0x05, 0xcf, 0x3e, 0x1b, 0xfe, 0xe6, 0x83, 0xa9, 0xc7, 0x67,
|
|
|
|
0xc9, 0x64, 0xe8, 0x84, 0xf3, 0xbd, 0x19, 0x8d, 0x67, 0x9e, 0x13, 0xb2, 0x68, 0xef, 0x5a, 0x14,
|
|
|
|
0xc8, 0xde, 0xda, 0x8f, 0xe9, 0x49, 0x5d, 0xbe, 0xa8, 0x3e, 0xfc, 0x77, 0x00, 0x00, 0x00, 0xff,
|
|
|
|
0xff, 0x6e, 0x84, 0x57, 0xb3, 0xb4, 0x16, 0x00, 0x00,
|
2018-01-18 21:49:20 +00:00
|
|
|
}
|