You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
boundary/internal/credential/vault/store/vault.pb.go

1714 lines
63 KiB

// Copyright IBM Corp. 2020, 2025
// SPDX-License-Identifier: BUSL-1.1
// Code generated by protoc-gen-go. DO NOT EDIT.
// versions:
// protoc-gen-go v1.36.11
// protoc (unknown)
// source: controller/storage/credential/vault/store/v1/vault.proto
// Package store provides protobufs for storing types in the vault
// credential package.
package store
import (
timestamp "github.com/hashicorp/boundary/internal/db/timestamp"
_ "github.com/hashicorp/boundary/sdk/pbs/controller/protooptions"
protoreflect "google.golang.org/protobuf/reflect/protoreflect"
protoimpl "google.golang.org/protobuf/runtime/protoimpl"
reflect "reflect"
sync "sync"
unsafe "unsafe"
)
const (
// Verify that this generated code is sufficiently up-to-date.
_ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion)
// Verify that runtime/protoimpl is sufficiently up-to-date.
_ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20)
)
type CredentialStore struct {
state protoimpl.MessageState `protogen:"open.v1"`
// public_id is a surrogate key suitable for use in a public API.
// @inject_tag: `gorm:"primary_key"`
PublicId string `protobuf:"bytes,1,opt,name=public_id,json=publicId,proto3" json:"public_id,omitempty" gorm:"primary_key"`
// The create_time is set by the database.
// @inject_tag: `gorm:"default:current_timestamp"`
CreateTime *timestamp.Timestamp `protobuf:"bytes,2,opt,name=create_time,json=createTime,proto3" json:"create_time,omitempty" gorm:"default:current_timestamp"`
// The update_time is set by the database.
// @inject_tag: `gorm:"default:current_timestamp"`
UpdateTime *timestamp.Timestamp `protobuf:"bytes,3,opt,name=update_time,json=updateTime,proto3" json:"update_time,omitempty" gorm:"default:current_timestamp"`
// The delete_time is set by the application.
// @inject_tag: `gorm:"default:null"`
DeleteTime *timestamp.Timestamp `protobuf:"bytes,4,opt,name=delete_time,json=deleteTime,proto3" json:"delete_time,omitempty" gorm:"default:null"`
// name is optional. If set, it must be unique within project_id.
// @inject_tag: `gorm:"default:null"`
Name string `protobuf:"bytes,5,opt,name=name,proto3" json:"name,omitempty" gorm:"default:null"`
// description is optional.
// @inject_tag: `gorm:"default:null"`
Description string `protobuf:"bytes,6,opt,name=description,proto3" json:"description,omitempty" gorm:"default:null"`
// The project_id of the owning project.
// It must be set.
// @inject_tag: `gorm:"not_null"`
ProjectId string `protobuf:"bytes,7,opt,name=project_id,json=projectId,proto3" json:"project_id,omitempty" gorm:"not_null"`
// version allows optimistic locking of the resource.
// @inject_tag: `gorm:"default:null"`
Version uint32 `protobuf:"varint,8,opt,name=version,proto3" json:"version,omitempty" gorm:"default:null"`
// vault_address is the address of the vault server. This should be a
// complete URL.
// It must be set.
// @inject_tag: `gorm:"not_null"`
VaultAddress string `protobuf:"bytes,9,opt,name=vault_address,json=vaultAddress,proto3" json:"vault_address,omitempty" gorm:"not_null"`
// namespace is the vault namespace the credential store should use.
// It is optional.
// @inject_tag: `gorm:"default:null"`
Namespace string `protobuf:"bytes,10,opt,name=namespace,proto3" json:"namespace,omitempty" gorm:"default:null"`
// ca_cert is a single PEM-encoded CA certificate to verify the Vault
// server's SSL certificate.
// It is optional.
// @inject_tag: `gorm:"default:null"`
CaCert []byte `protobuf:"bytes,11,opt,name=ca_cert,json=caCert,proto3" json:"ca_cert,omitempty" gorm:"default:null"`
// tls_server_name is the name to use as the SNI host when connecting to
// Vault via TLS.
// It is optional.
// @inject_tag: `gorm:"default:null"`
TlsServerName string `protobuf:"bytes,12,opt,name=tls_server_name,json=tlsServerName,proto3" json:"tls_server_name,omitempty" gorm:"default:null"`
// tls_skip_verify disables verification of TLS certificates. Using this
// option is highly discouraged as it decreases the security of data
// transmissions to and from the Vault server.
// @inject_tag: `gorm:"default:false"`
TlsSkipVerify bool `protobuf:"varint,13,opt,name=tls_skip_verify,json=tlsSkipVerify,proto3" json:"tls_skip_verify,omitempty" gorm:"default:false"`
// worker_filter is optional. Filters to the worker(s) who can handle Vault requests for this cred store
// @inject_tag: `gorm:"default:null"`
WorkerFilter string `protobuf:"bytes,14,opt,name=worker_filter,json=workerFilter,proto3" json:"worker_filter,omitempty" gorm:"default:null"`
unknownFields protoimpl.UnknownFields
sizeCache protoimpl.SizeCache
}
func (x *CredentialStore) Reset() {
*x = CredentialStore{}
mi := &file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes[0]
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
ms.StoreMessageInfo(mi)
}
func (x *CredentialStore) String() string {
return protoimpl.X.MessageStringOf(x)
}
func (*CredentialStore) ProtoMessage() {}
func (x *CredentialStore) ProtoReflect() protoreflect.Message {
mi := &file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes[0]
if x != nil {
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
if ms.LoadMessageInfo() == nil {
ms.StoreMessageInfo(mi)
}
return ms
}
return mi.MessageOf(x)
}
// Deprecated: Use CredentialStore.ProtoReflect.Descriptor instead.
func (*CredentialStore) Descriptor() ([]byte, []int) {
return file_controller_storage_credential_vault_store_v1_vault_proto_rawDescGZIP(), []int{0}
}
func (x *CredentialStore) GetPublicId() string {
if x != nil {
return x.PublicId
}
return ""
}
func (x *CredentialStore) GetCreateTime() *timestamp.Timestamp {
if x != nil {
return x.CreateTime
}
return nil
}
func (x *CredentialStore) GetUpdateTime() *timestamp.Timestamp {
if x != nil {
return x.UpdateTime
}
return nil
}
func (x *CredentialStore) GetDeleteTime() *timestamp.Timestamp {
if x != nil {
return x.DeleteTime
}
return nil
}
func (x *CredentialStore) GetName() string {
if x != nil {
return x.Name
}
return ""
}
func (x *CredentialStore) GetDescription() string {
if x != nil {
return x.Description
}
return ""
}
func (x *CredentialStore) GetProjectId() string {
if x != nil {
return x.ProjectId
}
return ""
}
func (x *CredentialStore) GetVersion() uint32 {
if x != nil {
return x.Version
}
return 0
}
func (x *CredentialStore) GetVaultAddress() string {
if x != nil {
return x.VaultAddress
}
return ""
}
func (x *CredentialStore) GetNamespace() string {
if x != nil {
return x.Namespace
}
return ""
}
func (x *CredentialStore) GetCaCert() []byte {
if x != nil {
return x.CaCert
}
return nil
}
func (x *CredentialStore) GetTlsServerName() string {
if x != nil {
return x.TlsServerName
}
return ""
}
func (x *CredentialStore) GetTlsSkipVerify() bool {
if x != nil {
return x.TlsSkipVerify
}
return false
}
func (x *CredentialStore) GetWorkerFilter() string {
if x != nil {
return x.WorkerFilter
}
return ""
}
type Token struct {
state protoimpl.MessageState `protogen:"open.v1"`
// token_hmac is the hmac-sha256 value of the token. The hmac key is the
// blake2b-256 value of the token accessor.
// @inject_tag: `gorm:"primary_key"`
TokenHmac []byte `protobuf:"bytes,1,opt,name=token_hmac,json=tokenHmac,proto3" json:"token_hmac,omitempty" gorm:"primary_key"`
// token is the plain-text of the token data. We are not storing this
// plain-text token in the database.
// @inject_tag: `gorm:"-" wrapping:"pt,token_data"`
Token []byte `protobuf:"bytes,2,opt,name=token,proto3" json:"token,omitempty" gorm:"-" wrapping:"pt,token_data"`
// ct_token is the ciphertext of the token data. It is stored in the database.
// @inject_tag: `gorm:"column:token;not_null" wrapping:"ct,token_data"`
CtToken []byte `protobuf:"bytes,3,opt,name=ct_token,json=ctToken,proto3" json:"ct_token,omitempty" gorm:"column:token;not_null" wrapping:"ct,token_data"`
// store_id is the ID of the owning vault credential store. A vault
// credential store can have 0 or 1 token.
// It must be set.
// @inject_tag: `gorm:"not_null"`
StoreId string `protobuf:"bytes,4,opt,name=store_id,json=storeId,proto3" json:"store_id,omitempty" gorm:"not_null"`
// create_time is set by the database.
// @inject_tag: `gorm:"default:current_timestamp"`
CreateTime *timestamp.Timestamp `protobuf:"bytes,5,opt,name=create_time,json=createTime,proto3" json:"create_time,omitempty" gorm:"default:current_timestamp"`
// update_time is set by the database.
// @inject_tag: `gorm:"default:current_timestamp"`
UpdateTime *timestamp.Timestamp `protobuf:"bytes,6,opt,name=update_time,json=updateTime,proto3" json:"update_time,omitempty" gorm:"default:current_timestamp"`
// last_renewal_time is the time the token was last renewed with Vault.
// @inject_tag: `gorm:"default:null"`
LastRenewalTime *timestamp.Timestamp `protobuf:"bytes,8,opt,name=last_renewal_time,json=lastRenewalTime,proto3" json:"last_renewal_time,omitempty" gorm:"default:null"`
// expiration_time is the time the token is expected to expire.
// expiration_time is calculated when the token is renewed.
//
// The calculation is:
//
// expiration_time := time.Now().Add(LeaseDuration * time.Second)
//
// LeaseDuration is a value returned by Vault when the token is renewed.
//
// https://www.vaultproject.io/api-docs/auth/token#renew-a-token-self
//
// @inject_tag: `gorm:"default:null"`
ExpirationTime *timestamp.Timestamp `protobuf:"bytes,9,opt,name=expiration_time,json=expirationTime,proto3" json:"expiration_time,omitempty" gorm:"default:null"`
// The key_id of the kms database key used for encrypting this entry.
// It must be set.
// @inject_tag: `gorm:"not_null"`
KeyId string `protobuf:"bytes,10,opt,name=key_id,json=keyId,proto3" json:"key_id,omitempty" gorm:"not_null"`
// The status of the token.
// It must be set.
// @inject_tag: `gorm:"not_null"`
Status string `protobuf:"bytes,11,opt,name=status,proto3" json:"status,omitempty" gorm:"not_null"`
unknownFields protoimpl.UnknownFields
sizeCache protoimpl.SizeCache
}
func (x *Token) Reset() {
*x = Token{}
mi := &file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes[1]
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
ms.StoreMessageInfo(mi)
}
func (x *Token) String() string {
return protoimpl.X.MessageStringOf(x)
}
func (*Token) ProtoMessage() {}
func (x *Token) ProtoReflect() protoreflect.Message {
mi := &file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes[1]
if x != nil {
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
if ms.LoadMessageInfo() == nil {
ms.StoreMessageInfo(mi)
}
return ms
}
return mi.MessageOf(x)
}
// Deprecated: Use Token.ProtoReflect.Descriptor instead.
func (*Token) Descriptor() ([]byte, []int) {
return file_controller_storage_credential_vault_store_v1_vault_proto_rawDescGZIP(), []int{1}
}
func (x *Token) GetTokenHmac() []byte {
if x != nil {
return x.TokenHmac
}
return nil
}
func (x *Token) GetToken() []byte {
if x != nil {
return x.Token
}
return nil
}
func (x *Token) GetCtToken() []byte {
if x != nil {
return x.CtToken
}
return nil
}
func (x *Token) GetStoreId() string {
if x != nil {
return x.StoreId
}
return ""
}
func (x *Token) GetCreateTime() *timestamp.Timestamp {
if x != nil {
return x.CreateTime
}
return nil
}
func (x *Token) GetUpdateTime() *timestamp.Timestamp {
if x != nil {
return x.UpdateTime
}
return nil
}
func (x *Token) GetLastRenewalTime() *timestamp.Timestamp {
if x != nil {
return x.LastRenewalTime
}
return nil
}
func (x *Token) GetExpirationTime() *timestamp.Timestamp {
if x != nil {
return x.ExpirationTime
}
return nil
}
func (x *Token) GetKeyId() string {
if x != nil {
return x.KeyId
}
return ""
}
func (x *Token) GetStatus() string {
if x != nil {
return x.Status
}
return ""
}
type ClientCertificate struct {
state protoimpl.MessageState `protogen:"open.v1"`
// store_id is the ID of the owning vault credential store. A vault
// credential store can have 0 or 1 client certificate.
// @inject_tag: `gorm:"primary_key"`
StoreId string `protobuf:"bytes,1,opt,name=store_id,json=storeId,proto3" json:"store_id,omitempty" gorm:"primary_key"`
// certificate is the PEM encoded certificate.
// It must be set.
// @inject_tag: `gorm:"not_null"`
Certificate []byte `protobuf:"bytes,2,opt,name=certificate,proto3" json:"certificate,omitempty" gorm:"not_null"`
// certificate_key is the plain-text of the certificate key data. We are
// not storing this plain-text key in the database.
// @inject_tag: `gorm:"-" wrapping:"pt,certificate_key_data"`
CertificateKey []byte `protobuf:"bytes,3,opt,name=certificate_key,json=certificateKey,proto3" json:"certificate_key,omitempty" gorm:"-" wrapping:"pt,certificate_key_data"`
// ct_certificate_key is the ciphertext of the certificate key data. It
// is stored in the database.
// @inject_tag: `gorm:"column:certificate_key;not_null" wrapping:"ct,certificate_key_data"`
CtCertificateKey []byte `protobuf:"bytes,4,opt,name=ct_certificate_key,json=ctCertificateKey,proto3" json:"ct_certificate_key,omitempty" gorm:"column:certificate_key;not_null" wrapping:"ct,certificate_key_data"`
// certificate_key_hmac is a sha256-hmac of the unencrypted certificate_key that
// is returned from the API for read. It is recalculated everytime the raw
// certificate_key is updated.
// @inject_tag: `gorm:"not_null"`
CertificateKeyHmac []byte `protobuf:"bytes,130,opt,name=certificate_key_hmac,json=certificateKeyHmac,proto3" json:"certificate_key_hmac,omitempty" gorm:"not_null"`
// The key_id of the kms database key used for encrypting this entry.
// It must be set.
// @inject_tag: `gorm:"not_null"`
KeyId string `protobuf:"bytes,10,opt,name=key_id,json=keyId,proto3" json:"key_id,omitempty" gorm:"not_null"`
unknownFields protoimpl.UnknownFields
sizeCache protoimpl.SizeCache
}
func (x *ClientCertificate) Reset() {
*x = ClientCertificate{}
mi := &file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes[2]
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
ms.StoreMessageInfo(mi)
}
func (x *ClientCertificate) String() string {
return protoimpl.X.MessageStringOf(x)
}
func (*ClientCertificate) ProtoMessage() {}
func (x *ClientCertificate) ProtoReflect() protoreflect.Message {
mi := &file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes[2]
if x != nil {
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
if ms.LoadMessageInfo() == nil {
ms.StoreMessageInfo(mi)
}
return ms
}
return mi.MessageOf(x)
}
// Deprecated: Use ClientCertificate.ProtoReflect.Descriptor instead.
func (*ClientCertificate) Descriptor() ([]byte, []int) {
return file_controller_storage_credential_vault_store_v1_vault_proto_rawDescGZIP(), []int{2}
}
func (x *ClientCertificate) GetStoreId() string {
if x != nil {
return x.StoreId
}
return ""
}
func (x *ClientCertificate) GetCertificate() []byte {
if x != nil {
return x.Certificate
}
return nil
}
func (x *ClientCertificate) GetCertificateKey() []byte {
if x != nil {
return x.CertificateKey
}
return nil
}
func (x *ClientCertificate) GetCtCertificateKey() []byte {
if x != nil {
return x.CtCertificateKey
}
return nil
}
func (x *ClientCertificate) GetCertificateKeyHmac() []byte {
if x != nil {
return x.CertificateKeyHmac
}
return nil
}
func (x *ClientCertificate) GetKeyId() string {
if x != nil {
return x.KeyId
}
return ""
}
type CredentialLibrary struct {
state protoimpl.MessageState `protogen:"open.v1"`
// public_id is a surrogate key suitable for use in a public API.
// @inject_tag: `gorm:"primary_key"`
PublicId string `protobuf:"bytes,1,opt,name=public_id,json=publicId,proto3" json:"public_id,omitempty" gorm:"primary_key"`
// create_time is set by the database.
// @inject_tag: `gorm:"default:current_timestamp"`
CreateTime *timestamp.Timestamp `protobuf:"bytes,2,opt,name=create_time,json=createTime,proto3" json:"create_time,omitempty" gorm:"default:current_timestamp"`
// update_time is set by the database.
// @inject_tag: `gorm:"default:current_timestamp"`
UpdateTime *timestamp.Timestamp `protobuf:"bytes,3,opt,name=update_time,json=updateTime,proto3" json:"update_time,omitempty" gorm:"default:current_timestamp"`
// name is optional. If set, it must be unique within project_id.
// @inject_tag: `gorm:"default:null"`
Name string `protobuf:"bytes,4,opt,name=name,proto3" json:"name,omitempty" gorm:"default:null"`
// description is optional.
// @inject_tag: `gorm:"default:null"`
Description string `protobuf:"bytes,5,opt,name=description,proto3" json:"description,omitempty" gorm:"default:null"`
// store_id of the owning vault credential store.
// It must be set.
// @inject_tag: `gorm:"not_null"`
StoreId string `protobuf:"bytes,6,opt,name=store_id,json=storeId,proto3" json:"store_id,omitempty" gorm:"not_null"`
// version allows optimistic locking of the resource.
// @inject_tag: `gorm:"default:null"`
Version uint32 `protobuf:"varint,7,opt,name=version,proto3" json:"version,omitempty" gorm:"default:null"`
// vault_path is the path in Vault to request credentials from.
// It must be set.
// @inject_tag: `gorm:"not_null"`
VaultPath string `protobuf:"bytes,8,opt,name=vault_path,json=vaultPath,proto3" json:"vault_path,omitempty" gorm:"not_null"`
// The HTTP method the library uses to communicate with Vault.
// It must be set. Can only be GET or POST.
// @inject_tag: `gorm:"not_null"`
HttpMethod string `protobuf:"bytes,9,opt,name=http_method,json=httpMethod,proto3" json:"http_method,omitempty" gorm:"not_null"`
// The body of the HTTP request the library sends to Vault.
// Can only be set if http_method is POST.
// @inject_tag: `gorm:"default:null"`
HttpRequestBody []byte `protobuf:"bytes,10,opt,name=http_request_body,json=httpRequestBody,proto3" json:"http_request_body,omitempty" gorm:"default:null"`
// credential_type is optional. If set, it indicates the type of
// credential the library returns.
// @inject_tag: `gorm:"default:null"`
CredentialType string `protobuf:"bytes,11,opt,name=credential_type,json=credentialType,proto3" json:"credential_type,omitempty" gorm:"default:null"`
unknownFields protoimpl.UnknownFields
sizeCache protoimpl.SizeCache
}
func (x *CredentialLibrary) Reset() {
*x = CredentialLibrary{}
mi := &file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes[3]
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
ms.StoreMessageInfo(mi)
}
func (x *CredentialLibrary) String() string {
return protoimpl.X.MessageStringOf(x)
}
func (*CredentialLibrary) ProtoMessage() {}
func (x *CredentialLibrary) ProtoReflect() protoreflect.Message {
mi := &file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes[3]
if x != nil {
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
if ms.LoadMessageInfo() == nil {
ms.StoreMessageInfo(mi)
}
return ms
}
return mi.MessageOf(x)
}
// Deprecated: Use CredentialLibrary.ProtoReflect.Descriptor instead.
func (*CredentialLibrary) Descriptor() ([]byte, []int) {
return file_controller_storage_credential_vault_store_v1_vault_proto_rawDescGZIP(), []int{3}
}
func (x *CredentialLibrary) GetPublicId() string {
if x != nil {
return x.PublicId
}
return ""
}
func (x *CredentialLibrary) GetCreateTime() *timestamp.Timestamp {
if x != nil {
return x.CreateTime
}
return nil
}
func (x *CredentialLibrary) GetUpdateTime() *timestamp.Timestamp {
if x != nil {
return x.UpdateTime
}
return nil
}
func (x *CredentialLibrary) GetName() string {
if x != nil {
return x.Name
}
return ""
}
func (x *CredentialLibrary) GetDescription() string {
if x != nil {
return x.Description
}
return ""
}
func (x *CredentialLibrary) GetStoreId() string {
if x != nil {
return x.StoreId
}
return ""
}
func (x *CredentialLibrary) GetVersion() uint32 {
if x != nil {
return x.Version
}
return 0
}
func (x *CredentialLibrary) GetVaultPath() string {
if x != nil {
return x.VaultPath
}
return ""
}
func (x *CredentialLibrary) GetHttpMethod() string {
if x != nil {
return x.HttpMethod
}
return ""
}
func (x *CredentialLibrary) GetHttpRequestBody() []byte {
if x != nil {
return x.HttpRequestBody
}
return nil
}
func (x *CredentialLibrary) GetCredentialType() string {
if x != nil {
return x.CredentialType
}
return ""
}
type SSHCertificateCredentialLibrary struct {
state protoimpl.MessageState `protogen:"open.v1"`
// public_id is a surrogate key suitable for use in a public API.
// @inject_tag: `gorm:"primary_key"`
PublicId string `protobuf:"bytes,1,opt,name=public_id,json=publicId,proto3" json:"public_id,omitempty" gorm:"primary_key"`
// create_time is set by the database.
// @inject_tag: `gorm:"default:current_timestamp"`
CreateTime *timestamp.Timestamp `protobuf:"bytes,2,opt,name=create_time,json=createTime,proto3" json:"create_time,omitempty" gorm:"default:current_timestamp"`
// update_time is set by the database.
// @inject_tag: `gorm:"default:current_timestamp"`
UpdateTime *timestamp.Timestamp `protobuf:"bytes,3,opt,name=update_time,json=updateTime,proto3" json:"update_time,omitempty" gorm:"default:current_timestamp"`
// name is optional. If set, it must be unique within project_id.
// @inject_tag: `gorm:"default:null"`
Name string `protobuf:"bytes,4,opt,name=name,proto3" json:"name,omitempty" gorm:"default:null"`
// description is optional.
// @inject_tag: `gorm:"default:null"`
Description string `protobuf:"bytes,5,opt,name=description,proto3" json:"description,omitempty" gorm:"default:null"`
// store_id of the owning vault credential store.
// It must be set.
// @inject_tag: `gorm:"not_null"`
StoreId string `protobuf:"bytes,6,opt,name=store_id,json=storeId,proto3" json:"store_id,omitempty" gorm:"not_null"`
// version allows optimistic locking of the resource.
// @inject_tag: `gorm:"default:null"`
Version uint32 `protobuf:"varint,7,opt,name=version,proto3" json:"version,omitempty" gorm:"default:null"`
// vault_path is the path in Vault to request credentials from.
// It must be set.
// @inject_tag: `gorm:"not_null"`
VaultPath string `protobuf:"bytes,8,opt,name=vault_path,json=vaultPath,proto3" json:"vault_path,omitempty" gorm:"not_null"`
// username is the username to use when making an SSH connection.
// It must be set.
// @inject_tag: `gorm:"not_null"`
Username string `protobuf:"bytes,9,opt,name=username,proto3" json:"username,omitempty" gorm:"not_null"`
// key_type specifies the key type to use when generating an SSH private key.
// Values must be "rsa", "ed25519", or "ecdsa".
// @inject_tag: `gorm:"not_null"`
KeyType string `protobuf:"bytes,10,opt,name=key_type,json=keyType,proto3" json:"key_type,omitempty" gorm:"not_null"`
// key_bits specifies the number of bits to use to generate an SSH private key.
// Not used if key_type is ed25519.
// @inject_tag: `gorm:"not_null"`
KeyBits uint32 `protobuf:"varint,11,opt,name=key_bits,json=keyBits,proto3" json:"key_bits,omitempty" gorm:"not_null"`
// ttl specifies the requested time to live for the certificate.
// @inject_tag: `gorm:"default:null"`
Ttl string `protobuf:"bytes,12,opt,name=ttl,proto3" json:"ttl,omitempty" gorm:"default:null"`
// key_id specifies the key id that the created certificate should have.
// @inject_tag: `gorm:"default:null"`
KeyId string `protobuf:"bytes,13,opt,name=key_id,json=keyId,proto3" json:"key_id,omitempty" gorm:"default:null"`
// critical_options specifies a map of the critical options that the certificate should be signed for.
// @inject_tag: `gorm:"default:null"`
CriticalOptions string `protobuf:"bytes,14,opt,name=critical_options,json=criticalOptions,proto3" json:"critical_options,omitempty" gorm:"default:null"`
// extensions specifies a map of the extensions that the certificate should be signed for.
// @inject_tag: `gorm:"default:null"`
Extensions string `protobuf:"bytes,15,opt,name=extensions,proto3" json:"extensions,omitempty" gorm:"default:null"`
// credential_type is always ssh_certificate
// @inject_tag: `gorm:"default:null"`
CredentialType string `protobuf:"bytes,16,opt,name=credential_type,json=credentialType,proto3" json:"credential_type,omitempty" gorm:"default:null"`
// additional_valid_principals are strings that will be sent to vault in the "valid_principles"
// api field in addition to the username.
// @inject_tag: `gorm:"default:null"`
AdditionalValidPrincipals string `protobuf:"bytes,17,opt,name=additional_valid_principals,json=additionalValidPrincipals,proto3" json:"additional_valid_principals,omitempty" gorm:"default:null"`
unknownFields protoimpl.UnknownFields
sizeCache protoimpl.SizeCache
}
func (x *SSHCertificateCredentialLibrary) Reset() {
*x = SSHCertificateCredentialLibrary{}
mi := &file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes[4]
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
ms.StoreMessageInfo(mi)
}
func (x *SSHCertificateCredentialLibrary) String() string {
return protoimpl.X.MessageStringOf(x)
}
func (*SSHCertificateCredentialLibrary) ProtoMessage() {}
func (x *SSHCertificateCredentialLibrary) ProtoReflect() protoreflect.Message {
mi := &file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes[4]
if x != nil {
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
if ms.LoadMessageInfo() == nil {
ms.StoreMessageInfo(mi)
}
return ms
}
return mi.MessageOf(x)
}
// Deprecated: Use SSHCertificateCredentialLibrary.ProtoReflect.Descriptor instead.
func (*SSHCertificateCredentialLibrary) Descriptor() ([]byte, []int) {
return file_controller_storage_credential_vault_store_v1_vault_proto_rawDescGZIP(), []int{4}
}
func (x *SSHCertificateCredentialLibrary) GetPublicId() string {
if x != nil {
return x.PublicId
}
return ""
}
func (x *SSHCertificateCredentialLibrary) GetCreateTime() *timestamp.Timestamp {
if x != nil {
return x.CreateTime
}
return nil
}
func (x *SSHCertificateCredentialLibrary) GetUpdateTime() *timestamp.Timestamp {
if x != nil {
return x.UpdateTime
}
return nil
}
func (x *SSHCertificateCredentialLibrary) GetName() string {
if x != nil {
return x.Name
}
return ""
}
func (x *SSHCertificateCredentialLibrary) GetDescription() string {
if x != nil {
return x.Description
}
return ""
}
func (x *SSHCertificateCredentialLibrary) GetStoreId() string {
if x != nil {
return x.StoreId
}
return ""
}
func (x *SSHCertificateCredentialLibrary) GetVersion() uint32 {
if x != nil {
return x.Version
}
return 0
}
func (x *SSHCertificateCredentialLibrary) GetVaultPath() string {
if x != nil {
return x.VaultPath
}
return ""
}
func (x *SSHCertificateCredentialLibrary) GetUsername() string {
if x != nil {
return x.Username
}
return ""
}
func (x *SSHCertificateCredentialLibrary) GetKeyType() string {
if x != nil {
return x.KeyType
}
return ""
}
func (x *SSHCertificateCredentialLibrary) GetKeyBits() uint32 {
if x != nil {
return x.KeyBits
}
return 0
}
func (x *SSHCertificateCredentialLibrary) GetTtl() string {
if x != nil {
return x.Ttl
}
return ""
}
func (x *SSHCertificateCredentialLibrary) GetKeyId() string {
if x != nil {
return x.KeyId
}
return ""
}
func (x *SSHCertificateCredentialLibrary) GetCriticalOptions() string {
if x != nil {
return x.CriticalOptions
}
return ""
}
func (x *SSHCertificateCredentialLibrary) GetExtensions() string {
if x != nil {
return x.Extensions
}
return ""
}
func (x *SSHCertificateCredentialLibrary) GetCredentialType() string {
if x != nil {
return x.CredentialType
}
return ""
}
func (x *SSHCertificateCredentialLibrary) GetAdditionalValidPrincipals() string {
if x != nil {
return x.AdditionalValidPrincipals
}
return ""
}
type Credential struct {
state protoimpl.MessageState `protogen:"open.v1"`
// public_id is a surrogate key suitable for use in a public API.
// @inject_tag: `gorm:"primary_key"`
PublicId string `protobuf:"bytes,1,opt,name=public_id,json=publicId,proto3" json:"public_id,omitempty" gorm:"primary_key"`
// library_id of the owning vault credential library.
// It must be set.
LibraryId string `protobuf:"bytes,2,opt,name=library_id,json=libraryId,proto3" json:"library_id,omitempty"`
// session_id of the session the credential was created for.
// It must be set.
SessionId string `protobuf:"bytes,3,opt,name=session_id,json=sessionId,proto3" json:"session_id,omitempty"`
// token_hmac is the foreign key of the token used to acquire the secret.
// @inject_tag: `gorm:"not_null"`
TokenHmac []byte `protobuf:"bytes,4,opt,name=token_hmac,json=tokenHmac,proto3" json:"token_hmac,omitempty" gorm:"not_null"`
// create_time is set by the database.
// @inject_tag: `gorm:"default:current_timestamp"`
CreateTime *timestamp.Timestamp `protobuf:"bytes,5,opt,name=create_time,json=createTime,proto3" json:"create_time,omitempty" gorm:"default:current_timestamp"`
// update_time is set by the database.
// @inject_tag: `gorm:"default:current_timestamp"`
UpdateTime *timestamp.Timestamp `protobuf:"bytes,6,opt,name=update_time,json=updateTime,proto3" json:"update_time,omitempty" gorm:"default:current_timestamp"`
// version allows optimistic locking of the resource.
// @inject_tag: `gorm:"default:null"`
Version uint32 `protobuf:"varint,7,opt,name=version,proto3" json:"version,omitempty" gorm:"default:null"`
// external_id is the lease ID returned from Vault.
// @inject_tag: `gorm:"not_null"`
ExternalId string `protobuf:"bytes,8,opt,name=external_id,json=externalId,proto3" json:"external_id,omitempty" gorm:"not_null"`
// last_renewal_time is the time the lease was last renewed with Vault.
// @inject_tag: `gorm:"default:null"`
LastRenewalTime *timestamp.Timestamp `protobuf:"bytes,9,opt,name=last_renewal_time,json=lastRenewalTime,proto3" json:"last_renewal_time,omitempty" gorm:"default:null"`
// expiration_time is the time the lease is expected to expire.
// expiration_time is calculated when the credential is initially
// retrieved and whenever the credential's lease is renewed.
//
// The calculation is:
//
// expiration_time := time.Now().Add(LeaseDuration * time.Second)
//
// LeaseDuration is a value returned by Vault when the credential is
// retrieved or the lease for the credential is renewed.
//
// https://www.vaultproject.io/docs/concepts/lease
//
// @inject_tag: `gorm:"default:null"`
ExpirationTime *timestamp.Timestamp `protobuf:"bytes,10,opt,name=expiration_time,json=expirationTime,proto3" json:"expiration_time,omitempty" gorm:"default:null"`
// is_renewable indicates if the lease can be renewed.
// @inject_tag: `gorm:"default:false"`
IsRenewable bool `protobuf:"varint,11,opt,name=is_renewable,json=isRenewable,proto3" json:"is_renewable,omitempty" gorm:"default:false"`
// The status of the credential.
// It must be set.
// @inject_tag: `gorm:"not_null"`
Status string `protobuf:"bytes,12,opt,name=status,proto3" json:"status,omitempty" gorm:"not_null"`
unknownFields protoimpl.UnknownFields
sizeCache protoimpl.SizeCache
}
func (x *Credential) Reset() {
*x = Credential{}
mi := &file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes[5]
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
ms.StoreMessageInfo(mi)
}
func (x *Credential) String() string {
return protoimpl.X.MessageStringOf(x)
}
func (*Credential) ProtoMessage() {}
func (x *Credential) ProtoReflect() protoreflect.Message {
mi := &file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes[5]
if x != nil {
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
if ms.LoadMessageInfo() == nil {
ms.StoreMessageInfo(mi)
}
return ms
}
return mi.MessageOf(x)
}
// Deprecated: Use Credential.ProtoReflect.Descriptor instead.
func (*Credential) Descriptor() ([]byte, []int) {
return file_controller_storage_credential_vault_store_v1_vault_proto_rawDescGZIP(), []int{5}
}
func (x *Credential) GetPublicId() string {
if x != nil {
return x.PublicId
}
return ""
}
func (x *Credential) GetLibraryId() string {
if x != nil {
return x.LibraryId
}
return ""
}
func (x *Credential) GetSessionId() string {
if x != nil {
return x.SessionId
}
return ""
}
func (x *Credential) GetTokenHmac() []byte {
if x != nil {
return x.TokenHmac
}
return nil
}
func (x *Credential) GetCreateTime() *timestamp.Timestamp {
if x != nil {
return x.CreateTime
}
return nil
}
func (x *Credential) GetUpdateTime() *timestamp.Timestamp {
if x != nil {
return x.UpdateTime
}
return nil
}
func (x *Credential) GetVersion() uint32 {
if x != nil {
return x.Version
}
return 0
}
func (x *Credential) GetExternalId() string {
if x != nil {
return x.ExternalId
}
return ""
}
func (x *Credential) GetLastRenewalTime() *timestamp.Timestamp {
if x != nil {
return x.LastRenewalTime
}
return nil
}
func (x *Credential) GetExpirationTime() *timestamp.Timestamp {
if x != nil {
return x.ExpirationTime
}
return nil
}
func (x *Credential) GetIsRenewable() bool {
if x != nil {
return x.IsRenewable
}
return false
}
func (x *Credential) GetStatus() string {
if x != nil {
return x.Status
}
return ""
}
type UsernamePasswordOverride struct {
state protoimpl.MessageState `protogen:"open.v1"`
// library_id of the owning vault credential library.
// @inject_tag: `gorm:"primary_key"`
LibraryId string `protobuf:"bytes,1,opt,name=library_id,json=libraryId,proto3" json:"library_id,omitempty" gorm:"primary_key"`
// username_attribute is the name of the attribute in the Data field of a
// Vault api.Secret that maps to a username.
// If set, it overrides any default attribute names the system uses to
// find a username attribute.
//
// See https://github.com/hashicorp/vault/blob/5e505ec039177e8212cbbab74ccb644c46e62e63/api/secret.go#L25
//
// @inject_tag: `gorm:"default:null"`
UsernameAttribute string `protobuf:"bytes,2,opt,name=username_attribute,json=usernameAttribute,proto3" json:"username_attribute,omitempty" gorm:"default:null"`
// password_attribute is the name of the attribute in the Data field of a
// Vault api.Secret that maps to a password.
// If set, it overrides any default attribute names the system uses to
// find a password attribute.
//
// See https://github.com/hashicorp/vault/blob/5e505ec039177e8212cbbab74ccb644c46e62e63/api/secret.go#L25
//
// @inject_tag: `gorm:"default:null"`
PasswordAttribute string `protobuf:"bytes,3,opt,name=password_attribute,json=passwordAttribute,proto3" json:"password_attribute,omitempty" gorm:"default:null"`
unknownFields protoimpl.UnknownFields
sizeCache protoimpl.SizeCache
}
func (x *UsernamePasswordOverride) Reset() {
*x = UsernamePasswordOverride{}
mi := &file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes[6]
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
ms.StoreMessageInfo(mi)
}
func (x *UsernamePasswordOverride) String() string {
return protoimpl.X.MessageStringOf(x)
}
func (*UsernamePasswordOverride) ProtoMessage() {}
func (x *UsernamePasswordOverride) ProtoReflect() protoreflect.Message {
mi := &file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes[6]
if x != nil {
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
if ms.LoadMessageInfo() == nil {
ms.StoreMessageInfo(mi)
}
return ms
}
return mi.MessageOf(x)
}
// Deprecated: Use UsernamePasswordOverride.ProtoReflect.Descriptor instead.
func (*UsernamePasswordOverride) Descriptor() ([]byte, []int) {
return file_controller_storage_credential_vault_store_v1_vault_proto_rawDescGZIP(), []int{6}
}
func (x *UsernamePasswordOverride) GetLibraryId() string {
if x != nil {
return x.LibraryId
}
return ""
}
func (x *UsernamePasswordOverride) GetUsernameAttribute() string {
if x != nil {
return x.UsernameAttribute
}
return ""
}
func (x *UsernamePasswordOverride) GetPasswordAttribute() string {
if x != nil {
return x.PasswordAttribute
}
return ""
}
type UsernamePasswordDomainOverride struct {
state protoimpl.MessageState `protogen:"open.v1"`
// library_id of the owning vault credential library.
// @inject_tag: `gorm:"primary_key"`
LibraryId string `protobuf:"bytes,1,opt,name=library_id,json=libraryId,proto3" json:"library_id,omitempty" gorm:"primary_key"`
// username_attribute is the name of the attribute in the Data field of a
// Vault api.Secret that maps to a username.
// If set, it overrides any default attribute names the system uses to
// find a username attribute.
//
// See https://github.com/hashicorp/vault/blob/5e505ec039177e8212cbbab74ccb644c46e62e63/api/secret.go#L25
//
// @inject_tag: `gorm:"default:null"`
UsernameAttribute string `protobuf:"bytes,2,opt,name=username_attribute,json=usernameAttribute,proto3" json:"username_attribute,omitempty" gorm:"default:null"`
// password_attribute is the name of the attribute in the Data field of a
// Vault api.Secret that maps to a password.
// If set, it overrides any default attribute names the system uses to
// find a password attribute.
//
// See https://github.com/hashicorp/vault/blob/5e505ec039177e8212cbbab74ccb644c46e62e63/api/secret.go#L25
//
// @inject_tag: `gorm:"default:null"`
PasswordAttribute string `protobuf:"bytes,3,opt,name=password_attribute,json=passwordAttribute,proto3" json:"password_attribute,omitempty" gorm:"default:null"`
// domain_attribute is the name of the attribute in the Data field of a
// Vault api.Secret that maps to a domain.
// If set, it overrides any default attribute names the system uses to
// find a domain attribute.
//
// See https://github.com/hashicorp/vault/blob/5e505ec039177e8212cbbab74ccb644c46e62e63/api/secret.go#L25
//
// @inject_tag: `gorm:"default:null"`
DomainAttribute string `protobuf:"bytes,4,opt,name=domain_attribute,json=domainAttribute,proto3" json:"domain_attribute,omitempty" gorm:"default:null"`
unknownFields protoimpl.UnknownFields
sizeCache protoimpl.SizeCache
}
func (x *UsernamePasswordDomainOverride) Reset() {
*x = UsernamePasswordDomainOverride{}
mi := &file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes[7]
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
ms.StoreMessageInfo(mi)
}
func (x *UsernamePasswordDomainOverride) String() string {
return protoimpl.X.MessageStringOf(x)
}
func (*UsernamePasswordDomainOverride) ProtoMessage() {}
func (x *UsernamePasswordDomainOverride) ProtoReflect() protoreflect.Message {
mi := &file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes[7]
if x != nil {
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
if ms.LoadMessageInfo() == nil {
ms.StoreMessageInfo(mi)
}
return ms
}
return mi.MessageOf(x)
}
// Deprecated: Use UsernamePasswordDomainOverride.ProtoReflect.Descriptor instead.
func (*UsernamePasswordDomainOverride) Descriptor() ([]byte, []int) {
return file_controller_storage_credential_vault_store_v1_vault_proto_rawDescGZIP(), []int{7}
}
func (x *UsernamePasswordDomainOverride) GetLibraryId() string {
if x != nil {
return x.LibraryId
}
return ""
}
func (x *UsernamePasswordDomainOverride) GetUsernameAttribute() string {
if x != nil {
return x.UsernameAttribute
}
return ""
}
func (x *UsernamePasswordDomainOverride) GetPasswordAttribute() string {
if x != nil {
return x.PasswordAttribute
}
return ""
}
func (x *UsernamePasswordDomainOverride) GetDomainAttribute() string {
if x != nil {
return x.DomainAttribute
}
return ""
}
type PasswordOverride struct {
state protoimpl.MessageState `protogen:"open.v1"`
// library_id of the owning vault credential library.
// @inject_tag: `gorm:"primary_key"`
LibraryId string `protobuf:"bytes,1,opt,name=library_id,json=libraryId,proto3" json:"library_id,omitempty" gorm:"primary_key"`
// password_attribute is the name of the attribute in the Data field of a
// Vault api.Secret that maps to a password.
// If set, it overrides any default attribute names the system uses to
// find a password attribute.
//
// See https://github.com/hashicorp/vault/blob/5e505ec039177e8212cbbab74ccb644c46e62e63/api/secret.go#L25
//
// @inject_tag: `gorm:"default:null"`
PasswordAttribute string `protobuf:"bytes,2,opt,name=password_attribute,json=passwordAttribute,proto3" json:"password_attribute,omitempty" gorm:"default:null"`
unknownFields protoimpl.UnknownFields
sizeCache protoimpl.SizeCache
}
func (x *PasswordOverride) Reset() {
*x = PasswordOverride{}
mi := &file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes[8]
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
ms.StoreMessageInfo(mi)
}
func (x *PasswordOverride) String() string {
return protoimpl.X.MessageStringOf(x)
}
func (*PasswordOverride) ProtoMessage() {}
func (x *PasswordOverride) ProtoReflect() protoreflect.Message {
mi := &file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes[8]
if x != nil {
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
if ms.LoadMessageInfo() == nil {
ms.StoreMessageInfo(mi)
}
return ms
}
return mi.MessageOf(x)
}
// Deprecated: Use PasswordOverride.ProtoReflect.Descriptor instead.
func (*PasswordOverride) Descriptor() ([]byte, []int) {
return file_controller_storage_credential_vault_store_v1_vault_proto_rawDescGZIP(), []int{8}
}
func (x *PasswordOverride) GetLibraryId() string {
if x != nil {
return x.LibraryId
}
return ""
}
func (x *PasswordOverride) GetPasswordAttribute() string {
if x != nil {
return x.PasswordAttribute
}
return ""
}
type SshPrivateKeyOverride struct {
state protoimpl.MessageState `protogen:"open.v1"`
// library_id of the owning vault credential library.
// @inject_tag: `gorm:"primary_key"`
LibraryId string `protobuf:"bytes,1,opt,name=library_id,json=libraryId,proto3" json:"library_id,omitempty" gorm:"primary_key"`
// username_attribute is the name of the attribute in the Data field of a
// Vault api.Secret that maps to a username.
// If set, it overrides any default attribute names the system uses to
// find a username attribute.
//
// See https://github.com/hashicorp/vault/blob/5e505ec039177e8212cbbab74ccb644c46e62e63/api/secret.go#L25
//
// @inject_tag: `gorm:"default:null"`
UsernameAttribute string `protobuf:"bytes,2,opt,name=username_attribute,json=usernameAttribute,proto3" json:"username_attribute,omitempty" gorm:"default:null"`
// private_key_attribute is the name of the attribute in the Data field of a
// Vault api.Secret that maps to a private key.
// If set, it overrides any default attribute names the system uses to
// find a private_key attribute.
//
// See https://github.com/hashicorp/vault/blob/5e505ec039177e8212cbbab74ccb644c46e62e63/api/secret.go#L25
//
// @inject_tag: `gorm:"default:null"`
PrivateKeyAttribute string `protobuf:"bytes,3,opt,name=private_key_attribute,json=privateKeyAttribute,proto3" json:"private_key_attribute,omitempty" gorm:"default:null"`
// private_key_passphrase_attribute is the name of the attribute in the Data
// field of a Vault api.Secret that maps to a private key passphrase. If set,
// it overrides any default attribute names the system uses to find a
// private_key_passphrase attribute.
//
// See
// https://github.com/hashicorp/vault/blob/5e505ec039177e8212cbbab74ccb644c46e62e63/api/secret.go#L25
//
// @inject_tag: `gorm:"default:null"`
PrivateKeyPassphraseAttribute string `protobuf:"bytes,4,opt,name=private_key_passphrase_attribute,json=privateKeyPassphraseAttribute,proto3" json:"private_key_passphrase_attribute,omitempty" gorm:"default:null"`
unknownFields protoimpl.UnknownFields
sizeCache protoimpl.SizeCache
}
func (x *SshPrivateKeyOverride) Reset() {
*x = SshPrivateKeyOverride{}
mi := &file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes[9]
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
ms.StoreMessageInfo(mi)
}
func (x *SshPrivateKeyOverride) String() string {
return protoimpl.X.MessageStringOf(x)
}
func (*SshPrivateKeyOverride) ProtoMessage() {}
func (x *SshPrivateKeyOverride) ProtoReflect() protoreflect.Message {
mi := &file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes[9]
if x != nil {
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
if ms.LoadMessageInfo() == nil {
ms.StoreMessageInfo(mi)
}
return ms
}
return mi.MessageOf(x)
}
// Deprecated: Use SshPrivateKeyOverride.ProtoReflect.Descriptor instead.
func (*SshPrivateKeyOverride) Descriptor() ([]byte, []int) {
return file_controller_storage_credential_vault_store_v1_vault_proto_rawDescGZIP(), []int{9}
}
func (x *SshPrivateKeyOverride) GetLibraryId() string {
if x != nil {
return x.LibraryId
}
return ""
}
func (x *SshPrivateKeyOverride) GetUsernameAttribute() string {
if x != nil {
return x.UsernameAttribute
}
return ""
}
func (x *SshPrivateKeyOverride) GetPrivateKeyAttribute() string {
if x != nil {
return x.PrivateKeyAttribute
}
return ""
}
func (x *SshPrivateKeyOverride) GetPrivateKeyPassphraseAttribute() string {
if x != nil {
return x.PrivateKeyPassphraseAttribute
}
return ""
}
type LdapCredentialLibrary struct {
state protoimpl.MessageState `protogen:"open.v1"`
// public_id is a surrogate key suitable for use in a public API.
// @inject_tag: `gorm:"primary_key"`
PublicId string `protobuf:"bytes,1,opt,name=public_id,json=publicId,proto3" json:"public_id,omitempty" gorm:"primary_key"`
// create_time is set by the database.
// @inject_tag: `gorm:"default:current_timestamp"`
CreateTime *timestamp.Timestamp `protobuf:"bytes,2,opt,name=create_time,json=createTime,proto3" json:"create_time,omitempty" gorm:"default:current_timestamp"`
// update_time is set by the database.
// @inject_tag: `gorm:"default:current_timestamp"`
UpdateTime *timestamp.Timestamp `protobuf:"bytes,3,opt,name=update_time,json=updateTime,proto3" json:"update_time,omitempty" gorm:"default:current_timestamp"`
// name is optional. If set, it must be unique within project_id.
// @inject_tag: `gorm:"default:null"`
Name string `protobuf:"bytes,4,opt,name=name,proto3" json:"name,omitempty" gorm:"default:null"`
// description is optional.
// @inject_tag: `gorm:"default:null"`
Description string `protobuf:"bytes,5,opt,name=description,proto3" json:"description,omitempty" gorm:"default:null"`
// store_id of the owning vault credential store.
// It must be set.
// @inject_tag: `gorm:"not_null"`
StoreId string `protobuf:"bytes,6,opt,name=store_id,json=storeId,proto3" json:"store_id,omitempty" gorm:"not_null"`
// version allows optimistic locking of the resource.
// @inject_tag: `gorm:"default:null"`
Version uint32 `protobuf:"varint,7,opt,name=version,proto3" json:"version,omitempty" gorm:"default:null"`
// vault_path is the path in Vault to request credentials from.
// It must be set.
// @inject_tag: `gorm:"not_null"`
VaultPath string `protobuf:"bytes,8,opt,name=vault_path,json=vaultPath,proto3" json:"vault_path,omitempty" gorm:"not_null"`
// credential_type is always ssh_certificate
// @inject_tag: `gorm:"default:null"`
CredentialType string `protobuf:"bytes,9,opt,name=credential_type,json=credentialType,proto3" json:"credential_type,omitempty" gorm:"default:null"`
unknownFields protoimpl.UnknownFields
sizeCache protoimpl.SizeCache
}
func (x *LdapCredentialLibrary) Reset() {
*x = LdapCredentialLibrary{}
mi := &file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes[10]
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
ms.StoreMessageInfo(mi)
}
func (x *LdapCredentialLibrary) String() string {
return protoimpl.X.MessageStringOf(x)
}
func (*LdapCredentialLibrary) ProtoMessage() {}
func (x *LdapCredentialLibrary) ProtoReflect() protoreflect.Message {
mi := &file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes[10]
if x != nil {
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
if ms.LoadMessageInfo() == nil {
ms.StoreMessageInfo(mi)
}
return ms
}
return mi.MessageOf(x)
}
// Deprecated: Use LdapCredentialLibrary.ProtoReflect.Descriptor instead.
func (*LdapCredentialLibrary) Descriptor() ([]byte, []int) {
return file_controller_storage_credential_vault_store_v1_vault_proto_rawDescGZIP(), []int{10}
}
func (x *LdapCredentialLibrary) GetPublicId() string {
if x != nil {
return x.PublicId
}
return ""
}
func (x *LdapCredentialLibrary) GetCreateTime() *timestamp.Timestamp {
if x != nil {
return x.CreateTime
}
return nil
}
func (x *LdapCredentialLibrary) GetUpdateTime() *timestamp.Timestamp {
if x != nil {
return x.UpdateTime
}
return nil
}
func (x *LdapCredentialLibrary) GetName() string {
if x != nil {
return x.Name
}
return ""
}
func (x *LdapCredentialLibrary) GetDescription() string {
if x != nil {
return x.Description
}
return ""
}
func (x *LdapCredentialLibrary) GetStoreId() string {
if x != nil {
return x.StoreId
}
return ""
}
func (x *LdapCredentialLibrary) GetVersion() uint32 {
if x != nil {
return x.Version
}
return 0
}
func (x *LdapCredentialLibrary) GetVaultPath() string {
if x != nil {
return x.VaultPath
}
return ""
}
func (x *LdapCredentialLibrary) GetCredentialType() string {
if x != nil {
return x.CredentialType
}
return ""
}
var File_controller_storage_credential_vault_store_v1_vault_proto protoreflect.FileDescriptor
const file_controller_storage_credential_vault_store_v1_vault_proto_rawDesc = "" +
"\n" +
"8controller/storage/credential/vault/store/v1/vault.proto\x12,controller.storage.credential.vault.store.v1\x1a*controller/custom_options/v1/options.proto\x1a/controller/storage/timestamp/v1/timestamp.proto\"\x88\a\n" +
"\x0fCredentialStore\x12\x1b\n" +
"\tpublic_id\x18\x01 \x01(\tR\bpublicId\x12K\n" +
"\vcreate_time\x18\x02 \x01(\v2*.controller.storage.timestamp.v1.TimestampR\n" +
"createTime\x12K\n" +
"\vupdate_time\x18\x03 \x01(\v2*.controller.storage.timestamp.v1.TimestampR\n" +
"updateTime\x12K\n" +
"\vdelete_time\x18\x04 \x01(\v2*.controller.storage.timestamp.v1.TimestampR\n" +
"deleteTime\x12$\n" +
"\x04name\x18\x05 \x01(\tB\x10\xc2\xdd)\f\n" +
"\x04Name\x12\x04nameR\x04name\x12@\n" +
"\vdescription\x18\x06 \x01(\tB\x1e\xc2\xdd)\x1a\n" +
"\vDescription\x12\vdescriptionR\vdescription\x12\x1d\n" +
"\n" +
"project_id\x18\a \x01(\tR\tprojectId\x12\x18\n" +
"\aversion\x18\b \x01(\rR\aversion\x12K\n" +
"\rvault_address\x18\t \x01(\tB&\xc2\xdd)\"\n" +
"\fVaultAddress\x12\x12attributes.addressR\fvaultAddress\x12C\n" +
"\tnamespace\x18\n" +
" \x01(\tB%\xc2\xdd)!\n" +
"\tNamespace\x12\x14attributes.namespaceR\tnamespace\x129\n" +
"\aca_cert\x18\v \x01(\fB \xc2\xdd)\x1c\n" +
"\x06CaCert\x12\x12attributes.ca_certR\x06caCert\x12W\n" +
"\x0ftls_server_name\x18\f \x01(\tB/\xc2\xdd)+\n" +
"\rTlsServerName\x12\x1aattributes.tls_server_nameR\rtlsServerName\x12W\n" +
"\x0ftls_skip_verify\x18\r \x01(\bB/\xc2\xdd)+\n" +
"\rTlsSkipVerify\x12\x1aattributes.tls_skip_verifyR\rtlsSkipVerify\x12Q\n" +
"\rworker_filter\x18\x0e \x01(\tB,\xc2\xdd)(\n" +
"\fWorkerFilter\x12\x18attributes.worker_filterR\fworkerFilter\"\x87\x04\n" +
"\x05Token\x12\x1d\n" +
"\n" +
"token_hmac\x18\x01 \x01(\fR\ttokenHmac\x123\n" +
"\x05token\x18\x02 \x01(\fB\x1d\xc2\xdd)\x19\n" +
"\x05Token\x12\x10attributes.tokenR\x05token\x12\x19\n" +
"\bct_token\x18\x03 \x01(\fR\actToken\x12\x19\n" +
"\bstore_id\x18\x04 \x01(\tR\astoreId\x12K\n" +
"\vcreate_time\x18\x05 \x01(\v2*.controller.storage.timestamp.v1.TimestampR\n" +
"createTime\x12K\n" +
"\vupdate_time\x18\x06 \x01(\v2*.controller.storage.timestamp.v1.TimestampR\n" +
"updateTime\x12V\n" +
"\x11last_renewal_time\x18\b \x01(\v2*.controller.storage.timestamp.v1.TimestampR\x0flastRenewalTime\x12S\n" +
"\x0fexpiration_time\x18\t \x01(\v2*.controller.storage.timestamp.v1.TimestampR\x0eexpirationTime\x12\x15\n" +
"\x06key_id\x18\n" +
" \x01(\tR\x05keyId\x12\x16\n" +
"\x06status\x18\v \x01(\tR\x06status\"\xdc\x02\n" +
"\x11ClientCertificate\x12\x19\n" +
"\bstore_id\x18\x01 \x01(\tR\astoreId\x12R\n" +
"\vcertificate\x18\x02 \x01(\fB0\xc2\xdd),\n" +
"\vCertificate\x12\x1dattributes.client_certificateR\vcertificate\x12`\n" +
"\x0fcertificate_key\x18\x03 \x01(\fB7\xc2\xdd)3\n" +
"\x0eCertificateKey\x12!attributes.client_certificate_keyR\x0ecertificateKey\x12,\n" +
"\x12ct_certificate_key\x18\x04 \x01(\fR\x10ctCertificateKey\x121\n" +
"\x14certificate_key_hmac\x18\x82\x01 \x01(\fR\x12certificateKeyHmac\x12\x15\n" +
"\x06key_id\x18\n" +
" \x01(\tR\x05keyId\"\xfd\x04\n" +
"\x11CredentialLibrary\x12\x1b\n" +
"\tpublic_id\x18\x01 \x01(\tR\bpublicId\x12K\n" +
"\vcreate_time\x18\x02 \x01(\v2*.controller.storage.timestamp.v1.TimestampR\n" +
"createTime\x12K\n" +
"\vupdate_time\x18\x03 \x01(\v2*.controller.storage.timestamp.v1.TimestampR\n" +
"updateTime\x12$\n" +
"\x04name\x18\x04 \x01(\tB\x10\xc2\xdd)\f\n" +
"\x04Name\x12\x04nameR\x04name\x12@\n" +
"\vdescription\x18\x05 \x01(\tB\x1e\xc2\xdd)\x1a\n" +
"\vDescription\x12\vdescriptionR\vdescription\x12\x19\n" +
"\bstore_id\x18\x06 \x01(\tR\astoreId\x12\x18\n" +
"\aversion\x18\a \x01(\rR\aversion\x12?\n" +
"\n" +
"vault_path\x18\b \x01(\tB \xc2\xdd)\x1c\n" +
"\tVaultPath\x12\x0fattributes.pathR\tvaultPath\x12I\n" +
"\vhttp_method\x18\t \x01(\tB(\xc2\xdd)$\n" +
"\n" +
"HttpMethod\x12\x16attributes.http_methodR\n" +
"httpMethod\x12_\n" +
"\x11http_request_body\x18\n" +
" \x01(\fB3\xc2\xdd)/\n" +
"\x0fHttpRequestBody\x12\x1cattributes.http_request_bodyR\x0fhttpRequestBody\x12'\n" +
"\x0fcredential_type\x18\v \x01(\tR\x0ecredentialType\"\xb4\b\n" +
"\x1fSSHCertificateCredentialLibrary\x12\x1b\n" +
"\tpublic_id\x18\x01 \x01(\tR\bpublicId\x12K\n" +
"\vcreate_time\x18\x02 \x01(\v2*.controller.storage.timestamp.v1.TimestampR\n" +
"createTime\x12K\n" +
"\vupdate_time\x18\x03 \x01(\v2*.controller.storage.timestamp.v1.TimestampR\n" +
"updateTime\x12$\n" +
"\x04name\x18\x04 \x01(\tB\x10\xc2\xdd)\f\n" +
"\x04Name\x12\x04nameR\x04name\x12@\n" +
"\vdescription\x18\x05 \x01(\tB\x1e\xc2\xdd)\x1a\n" +
"\vDescription\x12\vdescriptionR\vdescription\x12\x19\n" +
"\bstore_id\x18\x06 \x01(\tR\astoreId\x12\x18\n" +
"\aversion\x18\a \x01(\rR\aversion\x12?\n" +
"\n" +
"vault_path\x18\b \x01(\tB \xc2\xdd)\x1c\n" +
"\tVaultPath\x12\x0fattributes.pathR\tvaultPath\x12?\n" +
"\busername\x18\t \x01(\tB#\xc2\xdd)\x1f\n" +
"\bUsername\x12\x13attributes.usernameR\busername\x12=\n" +
"\bkey_type\x18\n" +
" \x01(\tB\"\xc2\xdd)\x1e\n" +
"\aKeyType\x12\x13attributes.key_typeR\akeyType\x12=\n" +
"\bkey_bits\x18\v \x01(\rB\"\xc2\xdd)\x1e\n" +
"\aKeyBits\x12\x13attributes.key_bitsR\akeyBits\x12+\n" +
"\x03ttl\x18\f \x01(\tB\x19\xc2\xdd)\x15\n" +
"\x03Ttl\x12\x0eattributes.ttlR\x03ttl\x125\n" +
"\x06key_id\x18\r \x01(\tB\x1e\xc2\xdd)\x1a\n" +
"\x05KeyId\x12\x11attributes.key_idR\x05keyId\x12]\n" +
"\x10critical_options\x18\x0e \x01(\tB2\xc2\xdd).\n" +
"\x0fCriticalOptions\x12\x1battributes.critical_optionsR\x0fcriticalOptions\x12G\n" +
"\n" +
"extensions\x18\x0f \x01(\tB'\xc2\xdd)#\n" +
"\n" +
"Extensions\x12\x15attributes.extensionsR\n" +
"extensions\x12'\n" +
"\x0fcredential_type\x18\x10 \x01(\tR\x0ecredentialType\x12\x87\x01\n" +
"\x1badditional_valid_principals\x18\x11 \x01(\tBG\xc2\xdd)C\n" +
"\x19AdditionalValidPrincipals\x12&attributes.additional_valid_principalsR\x19additionalValidPrincipals\"\xc3\x04\n" +
"\n" +
"Credential\x12\x1b\n" +
"\tpublic_id\x18\x01 \x01(\tR\bpublicId\x12\x1d\n" +
"\n" +
"library_id\x18\x02 \x01(\tR\tlibraryId\x12\x1d\n" +
"\n" +
"session_id\x18\x03 \x01(\tR\tsessionId\x12\x1d\n" +
"\n" +
"token_hmac\x18\x04 \x01(\fR\ttokenHmac\x12K\n" +
"\vcreate_time\x18\x05 \x01(\v2*.controller.storage.timestamp.v1.TimestampR\n" +
"createTime\x12K\n" +
"\vupdate_time\x18\x06 \x01(\v2*.controller.storage.timestamp.v1.TimestampR\n" +
"updateTime\x12\x18\n" +
"\aversion\x18\a \x01(\rR\aversion\x12\x1f\n" +
"\vexternal_id\x18\b \x01(\tR\n" +
"externalId\x12V\n" +
"\x11last_renewal_time\x18\t \x01(\v2*.controller.storage.timestamp.v1.TimestampR\x0flastRenewalTime\x12S\n" +
"\x0fexpiration_time\x18\n" +
" \x01(\v2*.controller.storage.timestamp.v1.TimestampR\x0eexpirationTime\x12!\n" +
"\fis_renewable\x18\v \x01(\bR\visRenewable\x12\x16\n" +
"\x06status\x18\f \x01(\tR\x06status\"\x97\x01\n" +
"\x18UsernamePasswordOverride\x12\x1d\n" +
"\n" +
"library_id\x18\x01 \x01(\tR\tlibraryId\x12-\n" +
"\x12username_attribute\x18\x02 \x01(\tR\x11usernameAttribute\x12-\n" +
"\x12password_attribute\x18\x03 \x01(\tR\x11passwordAttribute\"\xc8\x01\n" +
"\x1eUsernamePasswordDomainOverride\x12\x1d\n" +
"\n" +
"library_id\x18\x01 \x01(\tR\tlibraryId\x12-\n" +
"\x12username_attribute\x18\x02 \x01(\tR\x11usernameAttribute\x12-\n" +
"\x12password_attribute\x18\x03 \x01(\tR\x11passwordAttribute\x12)\n" +
"\x10domain_attribute\x18\x04 \x01(\tR\x0fdomainAttribute\"`\n" +
"\x10PasswordOverride\x12\x1d\n" +
"\n" +
"library_id\x18\x01 \x01(\tR\tlibraryId\x12-\n" +
"\x12password_attribute\x18\x02 \x01(\tR\x11passwordAttribute\"\xe2\x01\n" +
"\x15SshPrivateKeyOverride\x12\x1d\n" +
"\n" +
"library_id\x18\x01 \x01(\tR\tlibraryId\x12-\n" +
"\x12username_attribute\x18\x02 \x01(\tR\x11usernameAttribute\x122\n" +
"\x15private_key_attribute\x18\x03 \x01(\tR\x13privateKeyAttribute\x12G\n" +
" private_key_passphrase_attribute\x18\x04 \x01(\tR\x1dprivateKeyPassphraseAttribute\"\xd5\x03\n" +
"\x15LdapCredentialLibrary\x12\x1b\n" +
"\tpublic_id\x18\x01 \x01(\tR\bpublicId\x12K\n" +
"\vcreate_time\x18\x02 \x01(\v2*.controller.storage.timestamp.v1.TimestampR\n" +
"createTime\x12K\n" +
"\vupdate_time\x18\x03 \x01(\v2*.controller.storage.timestamp.v1.TimestampR\n" +
"updateTime\x12$\n" +
"\x04name\x18\x04 \x01(\tB\x10\xc2\xdd)\f\n" +
"\x04Name\x12\x04nameR\x04name\x12@\n" +
"\vdescription\x18\x05 \x01(\tB\x1e\xc2\xdd)\x1a\n" +
"\vDescription\x12\vdescriptionR\vdescription\x12\x19\n" +
"\bstore_id\x18\x06 \x01(\tR\astoreId\x12\x18\n" +
"\aversion\x18\a \x01(\rR\aversion\x12?\n" +
"\n" +
"vault_path\x18\b \x01(\tB \xc2\xdd)\x1c\n" +
"\tVaultPath\x12\x0fattributes.pathR\tvaultPath\x12'\n" +
"\x0fcredential_type\x18\t \x01(\tR\x0ecredentialTypeBEZCgithub.com/hashicorp/boundary/internal/credential/vault/store;storeb\x06proto3"
var (
file_controller_storage_credential_vault_store_v1_vault_proto_rawDescOnce sync.Once
file_controller_storage_credential_vault_store_v1_vault_proto_rawDescData []byte
)
func file_controller_storage_credential_vault_store_v1_vault_proto_rawDescGZIP() []byte {
file_controller_storage_credential_vault_store_v1_vault_proto_rawDescOnce.Do(func() {
file_controller_storage_credential_vault_store_v1_vault_proto_rawDescData = protoimpl.X.CompressGZIP(unsafe.Slice(unsafe.StringData(file_controller_storage_credential_vault_store_v1_vault_proto_rawDesc), len(file_controller_storage_credential_vault_store_v1_vault_proto_rawDesc)))
})
return file_controller_storage_credential_vault_store_v1_vault_proto_rawDescData
}
var file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes = make([]protoimpl.MessageInfo, 11)
var file_controller_storage_credential_vault_store_v1_vault_proto_goTypes = []any{
(*CredentialStore)(nil), // 0: controller.storage.credential.vault.store.v1.CredentialStore
(*Token)(nil), // 1: controller.storage.credential.vault.store.v1.Token
(*ClientCertificate)(nil), // 2: controller.storage.credential.vault.store.v1.ClientCertificate
(*CredentialLibrary)(nil), // 3: controller.storage.credential.vault.store.v1.CredentialLibrary
(*SSHCertificateCredentialLibrary)(nil), // 4: controller.storage.credential.vault.store.v1.SSHCertificateCredentialLibrary
(*Credential)(nil), // 5: controller.storage.credential.vault.store.v1.Credential
(*UsernamePasswordOverride)(nil), // 6: controller.storage.credential.vault.store.v1.UsernamePasswordOverride
(*UsernamePasswordDomainOverride)(nil), // 7: controller.storage.credential.vault.store.v1.UsernamePasswordDomainOverride
(*PasswordOverride)(nil), // 8: controller.storage.credential.vault.store.v1.PasswordOverride
(*SshPrivateKeyOverride)(nil), // 9: controller.storage.credential.vault.store.v1.SshPrivateKeyOverride
(*LdapCredentialLibrary)(nil), // 10: controller.storage.credential.vault.store.v1.LdapCredentialLibrary
(*timestamp.Timestamp)(nil), // 11: controller.storage.timestamp.v1.Timestamp
}
var file_controller_storage_credential_vault_store_v1_vault_proto_depIdxs = []int32{
11, // 0: controller.storage.credential.vault.store.v1.CredentialStore.create_time:type_name -> controller.storage.timestamp.v1.Timestamp
11, // 1: controller.storage.credential.vault.store.v1.CredentialStore.update_time:type_name -> controller.storage.timestamp.v1.Timestamp
11, // 2: controller.storage.credential.vault.store.v1.CredentialStore.delete_time:type_name -> controller.storage.timestamp.v1.Timestamp
11, // 3: controller.storage.credential.vault.store.v1.Token.create_time:type_name -> controller.storage.timestamp.v1.Timestamp
11, // 4: controller.storage.credential.vault.store.v1.Token.update_time:type_name -> controller.storage.timestamp.v1.Timestamp
11, // 5: controller.storage.credential.vault.store.v1.Token.last_renewal_time:type_name -> controller.storage.timestamp.v1.Timestamp
11, // 6: controller.storage.credential.vault.store.v1.Token.expiration_time:type_name -> controller.storage.timestamp.v1.Timestamp
11, // 7: controller.storage.credential.vault.store.v1.CredentialLibrary.create_time:type_name -> controller.storage.timestamp.v1.Timestamp
11, // 8: controller.storage.credential.vault.store.v1.CredentialLibrary.update_time:type_name -> controller.storage.timestamp.v1.Timestamp
11, // 9: controller.storage.credential.vault.store.v1.SSHCertificateCredentialLibrary.create_time:type_name -> controller.storage.timestamp.v1.Timestamp
11, // 10: controller.storage.credential.vault.store.v1.SSHCertificateCredentialLibrary.update_time:type_name -> controller.storage.timestamp.v1.Timestamp
11, // 11: controller.storage.credential.vault.store.v1.Credential.create_time:type_name -> controller.storage.timestamp.v1.Timestamp
11, // 12: controller.storage.credential.vault.store.v1.Credential.update_time:type_name -> controller.storage.timestamp.v1.Timestamp
11, // 13: controller.storage.credential.vault.store.v1.Credential.last_renewal_time:type_name -> controller.storage.timestamp.v1.Timestamp
11, // 14: controller.storage.credential.vault.store.v1.Credential.expiration_time:type_name -> controller.storage.timestamp.v1.Timestamp
11, // 15: controller.storage.credential.vault.store.v1.LdapCredentialLibrary.create_time:type_name -> controller.storage.timestamp.v1.Timestamp
11, // 16: controller.storage.credential.vault.store.v1.LdapCredentialLibrary.update_time:type_name -> controller.storage.timestamp.v1.Timestamp
17, // [17:17] is the sub-list for method output_type
17, // [17:17] is the sub-list for method input_type
17, // [17:17] is the sub-list for extension type_name
17, // [17:17] is the sub-list for extension extendee
0, // [0:17] is the sub-list for field type_name
}
func init() { file_controller_storage_credential_vault_store_v1_vault_proto_init() }
func file_controller_storage_credential_vault_store_v1_vault_proto_init() {
if File_controller_storage_credential_vault_store_v1_vault_proto != nil {
return
}
type x struct{}
out := protoimpl.TypeBuilder{
File: protoimpl.DescBuilder{
GoPackagePath: reflect.TypeOf(x{}).PkgPath(),
RawDescriptor: unsafe.Slice(unsafe.StringData(file_controller_storage_credential_vault_store_v1_vault_proto_rawDesc), len(file_controller_storage_credential_vault_store_v1_vault_proto_rawDesc)),
NumEnums: 0,
NumMessages: 11,
NumExtensions: 0,
NumServices: 0,
},
GoTypes: file_controller_storage_credential_vault_store_v1_vault_proto_goTypes,
DependencyIndexes: file_controller_storage_credential_vault_store_v1_vault_proto_depIdxs,
MessageInfos: file_controller_storage_credential_vault_store_v1_vault_proto_msgTypes,
}.Build()
File_controller_storage_credential_vault_store_v1_vault_proto = out.File
file_controller_storage_credential_vault_store_v1_vault_proto_goTypes = nil
file_controller_storage_credential_vault_store_v1_vault_proto_depIdxs = nil
}