Skip to content
This repository was archived by the owner on Sep 16, 2023. It is now read-only.
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -14354,101 +14354,100 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
+ "sources.proto\022#google.cloud.binaryauthor"
+ "ization.v1\032\037google/api/field_behavior.pr"
+ "oto\032\031google/api/resource.proto\032\037google/p"
+ "rotobuf/timestamp.proto\032\034google/api/anno"
+ "tations.proto\"\370\014\n\006Policy\022\021\n\004name\030\001 \001(\tB\003"
+ "\340A\003\022\030\n\013description\030\006 \001(\tB\003\340A\001\022r\n\035global_"
+ "policy_evaluation_mode\030\007 \001(\0162F.google.cl"
+ "oud.binaryauthorization.v1.Policy.Global"
+ "PolicyEvaluationModeB\003\340A\001\022i\n\034admission_w"
+ "hitelist_patterns\030\002 \003(\0132>.google.cloud.b"
+ "inaryauthorization.v1.AdmissionWhitelist"
+ "PatternB\003\340A\001\022l\n\027cluster_admission_rules\030"
+ "\003 \003(\0132F.google.cloud.binaryauthorization"
+ ".v1.Policy.ClusterAdmissionRulesEntryB\003\340"
+ "A\001\022\205\001\n$kubernetes_namespace_admission_ru"
+ "les\030\n \003(\0132R.google.cloud.binaryauthoriza"
+ "tion.v1.Policy.KubernetesNamespaceAdmiss"
+ "ionRulesEntryB\003\340A\001\022\220\001\n*kubernetes_servic"
+ "e_account_admission_rules\030\010 \003(\0132W.google"
+ ".cloud.binaryauthorization.v1.Policy.Kub"
+ "ernetesServiceAccountAdmissionRulesEntry"
+ "B\003\340A\001\022\210\001\n&istio_service_identity_admissi"
+ "on_rules\030\t \003(\0132S.google.cloud.binaryauth"
+ "orization.v1.Policy.IstioServiceIdentity"
+ "AdmissionRulesEntryB\003\340A\001\022W\n\026default_admi"
+ "ssion_rule\030\004 \001(\01322.google.cloud.binaryau"
+ "thorization.v1.AdmissionRuleB\003\340A\002\0224\n\013upd"
+ "ate_time\030\005 \001(\0132\032.google.protobuf.Timesta"
+ "mpB\003\340A\003\032p\n\032ClusterAdmissionRulesEntry\022\013\n"
+ "\003key\030\001 \001(\t\022A\n\005value\030\002 \001(\01322.google.cloud"
+ ".binaryauthorization.v1.AdmissionRule:\0028"
+ "\001\032|\n&KubernetesNamespaceAdmissionRulesEn"
+ "try\022\013\n\003key\030\001 \001(\t\022A\n\005value\030\002 \001(\01322.google"
+ ".cloud.binaryauthorization.v1.AdmissionR"
+ "ule:\0028\001\032\201\001\n+KubernetesServiceAccountAdmi"
+ "ssionRulesEntry\022\013\n\003key\030\001 \001(\t\022A\n\005value\030\002 "
+ "\001(\01322.google.cloud.binaryauthorization.v"
+ "1.AdmissionRule:\0028\001\032}\n\'IstioServiceIdent"
+ "ityAdmissionRulesEntry\022\013\n\003key\030\001 \001(\t\022A\n\005v"
+ "alue\030\002 \001(\01322.google.cloud.binaryauthoriz"
+ "ation.v1.AdmissionRule:\0028\001\"d\n\032GlobalPoli"
+ "cyEvaluationMode\022-\n)GLOBAL_POLICY_EVALUA"
+ "TION_MODE_UNSPECIFIED\020\000\022\n\n\006ENABLE\020\001\022\013\n\007D"
+ "ISABLE\020\002:f\352Ac\n)binaryauthorization.googl"
+ "eapis.com/Policy\022\031projects/{project}/pol"
+ "icy\022\033locations/{location}/policy\"1\n\031Admi"
+ "ssionWhitelistPattern\022\024\n\014name_pattern\030\001 "
+ "\001(\t\"\332\003\n\rAdmissionRule\022_\n\017evaluation_mode"
+ "\030\001 \001(\0162A.google.cloud.binaryauthorizatio"
+ "n.v1.AdmissionRule.EvaluationModeB\003\340A\002\022$"
+ "\n\027require_attestations_by\030\002 \003(\tB\003\340A\001\022a\n\020"
+ "enforcement_mode\030\003 \001(\0162B.google.cloud.bi"
+ "naryauthorization.v1.AdmissionRule.Enfor"
+ "cementModeB\003\340A\002\"m\n\016EvaluationMode\022\037\n\033EVA"
+ "LUATION_MODE_UNSPECIFIED\020\000\022\020\n\014ALWAYS_ALL"
+ "OW\020\001\022\027\n\023REQUIRE_ATTESTATION\020\002\022\017\n\013ALWAYS_"
+ "DENY\020\003\"p\n\017EnforcementMode\022 \n\034ENFORCEMENT"
+ "_MODE_UNSPECIFIED\020\000\022 \n\034ENFORCED_BLOCK_AN"
+ "D_AUDIT_LOG\020\001\022\031\n\025DRYRUN_AUDIT_LOG_ONLY\020\002"
+ "\"\267\002\n\010Attestor\022\021\n\004name\030\001 \001(\tB\003\340A\002\022\030\n\013desc"
+ "ription\030\006 \001(\tB\003\340A\001\022\\\n\027user_owned_grafeas"
+ "_note\030\003 \001(\01329.google.cloud.binaryauthori"
+ "zation.v1.UserOwnedGrafeasNoteH\000\0224\n\013upda"
+ "te_time\030\004 \001(\0132\032.google.protobuf.Timestam"
+ "pB\003\340A\003:Y\352AV\n+binaryauthorization.googlea"
+ "pis.com/Attestor\022\'projects/{project}/att"
+ "estors/{attestor}B\017\n\rattestor_type\"\264\001\n\024U"
+ "serOwnedGrafeasNote\022\033\n\016note_reference\030\001 "
+ "\001(\tB\003\340A\002\022P\n\013public_keys\030\002 \003(\01326.google.c"
+ "loud.binaryauthorization.v1.AttestorPubl"
+ "icKeyB\003\340A\001\022-\n delegation_service_account"
+ "_email\030\003 \001(\tB\003\340A\003\"\277\004\n\rPkixPublicKey\022\026\n\016p"
+ "ublic_key_pem\030\001 \001(\t\022b\n\023signature_algorit"
+ "hm\030\002 \001(\0162E.google.cloud.binaryauthorizat"
+ "ion.v1.PkixPublicKey.SignatureAlgorithm\""
+ "\261\003\n\022SignatureAlgorithm\022#\n\037SIGNATURE_ALGO"
+ "RITHM_UNSPECIFIED\020\000\022\027\n\023RSA_PSS_2048_SHA2"
+ "56\020\001\022\027\n\023RSA_PSS_3072_SHA256\020\002\022\027\n\023RSA_PSS"
+ "_4096_SHA256\020\003\022\027\n\023RSA_PSS_4096_SHA512\020\004\022"
+ "\036\n\032RSA_SIGN_PKCS1_2048_SHA256\020\005\022\036\n\032RSA_S"
+ "IGN_PKCS1_3072_SHA256\020\006\022\036\n\032RSA_SIGN_PKCS"
+ "1_4096_SHA256\020\007\022\036\n\032RSA_SIGN_PKCS1_4096_S"
+ "HA512\020\010\022\025\n\021ECDSA_P256_SHA256\020\t\022\027\n\023EC_SIG"
+ "N_P256_SHA256\020\t\022\025\n\021ECDSA_P384_SHA384\020\n\022\027"
+ "\n\023EC_SIGN_P384_SHA384\020\n\022\025\n\021ECDSA_P521_SH"
+ "A512\020\013\022\027\n\023EC_SIGN_P521_SHA512\020\013\032\002\020\001\"\272\001\n\021"
+ "AttestorPublicKey\022\024\n\007comment\030\001 \001(\tB\003\340A\001\022"
+ "\n\n\002id\030\002 \001(\t\022&\n\034ascii_armored_pgp_public_"
+ "key\030\003 \001(\tH\000\022M\n\017pkix_public_key\030\005 \001(\01322.g"
+ "oogle.cloud.binaryauthorization.v1.PkixP"
+ "ublicKeyH\000B\014\n\npublic_keyB\211\002\n5com.google."
+ "protos.google.cloud.binaryauthorization."
+ "v1P\000ZVgoogle.golang.org/genproto/googlea"
+ "pis/cloud/binaryauthorization/v1;binarya"
+ "uthorization\370\001\001\252\002#Google.Cloud.BinaryAut"
+ "horization.V1\312\002#Google\\Cloud\\BinaryAutho"
+ "rization\\V1\352\002&Google::Cloud::BinaryAutho"
+ "rization::V1b\006proto3"
+ "rotobuf/timestamp.proto\"\370\014\n\006Policy\022\021\n\004na"
+ "me\030\001 \001(\tB\003\340A\003\022\030\n\013description\030\006 \001(\tB\003\340A\001\022"
+ "r\n\035global_policy_evaluation_mode\030\007 \001(\0162F"
+ ".google.cloud.binaryauthorization.v1.Pol"
+ "icy.GlobalPolicyEvaluationModeB\003\340A\001\022i\n\034a"
+ "dmission_whitelist_patterns\030\002 \003(\0132>.goog"
+ "le.cloud.binaryauthorization.v1.Admissio"
+ "nWhitelistPatternB\003\340A\001\022l\n\027cluster_admiss"
+ "ion_rules\030\003 \003(\0132F.google.cloud.binaryaut"
+ "horization.v1.Policy.ClusterAdmissionRul"
+ "esEntryB\003\340A\001\022\205\001\n$kubernetes_namespace_ad"
+ "mission_rules\030\n \003(\0132R.google.cloud.binar"
+ "yauthorization.v1.Policy.KubernetesNames"
+ "paceAdmissionRulesEntryB\003\340A\001\022\220\001\n*kuberne"
+ "tes_service_account_admission_rules\030\010 \003("
+ "\0132W.google.cloud.binaryauthorization.v1."
+ "Policy.KubernetesServiceAccountAdmission"
+ "RulesEntryB\003\340A\001\022\210\001\n&istio_service_identi"
+ "ty_admission_rules\030\t \003(\0132S.google.cloud."
+ "binaryauthorization.v1.Policy.IstioServi"
+ "ceIdentityAdmissionRulesEntryB\003\340A\001\022W\n\026de"
+ "fault_admission_rule\030\004 \001(\01322.google.clou"
+ "d.binaryauthorization.v1.AdmissionRuleB\003"
+ "\340A\002\0224\n\013update_time\030\005 \001(\0132\032.google.protob"
+ "uf.TimestampB\003\340A\003\032p\n\032ClusterAdmissionRul"
+ "esEntry\022\013\n\003key\030\001 \001(\t\022A\n\005value\030\002 \001(\01322.go"
+ "ogle.cloud.binaryauthorization.v1.Admiss"
+ "ionRule:\0028\001\032|\n&KubernetesNamespaceAdmiss"
+ "ionRulesEntry\022\013\n\003key\030\001 \001(\t\022A\n\005value\030\002 \001("
+ "\01322.google.cloud.binaryauthorization.v1."
+ "AdmissionRule:\0028\001\032\201\001\n+KubernetesServiceA"
+ "ccountAdmissionRulesEntry\022\013\n\003key\030\001 \001(\t\022A"
+ "\n\005value\030\002 \001(\01322.google.cloud.binaryautho"
+ "rization.v1.AdmissionRule:\0028\001\032}\n\'IstioSe"
+ "rviceIdentityAdmissionRulesEntry\022\013\n\003key\030"
+ "\001 \001(\t\022A\n\005value\030\002 \001(\01322.google.cloud.bina"
+ "ryauthorization.v1.AdmissionRule:\0028\001\"d\n\032"
+ "GlobalPolicyEvaluationMode\022-\n)GLOBAL_POL"
+ "ICY_EVALUATION_MODE_UNSPECIFIED\020\000\022\n\n\006ENA"
+ "BLE\020\001\022\013\n\007DISABLE\020\002:f\352Ac\n)binaryauthoriza"
+ "tion.googleapis.com/Policy\022\031projects/{pr"
+ "oject}/policy\022\033locations/{location}/poli"
+ "cy\"1\n\031AdmissionWhitelistPattern\022\024\n\014name_"
+ "pattern\030\001 \001(\t\"\332\003\n\rAdmissionRule\022_\n\017evalu"
+ "ation_mode\030\001 \001(\0162A.google.cloud.binaryau"
+ "thorization.v1.AdmissionRule.EvaluationM"
+ "odeB\003\340A\002\022$\n\027require_attestations_by\030\002 \003("
+ "\tB\003\340A\001\022a\n\020enforcement_mode\030\003 \001(\0162B.googl"
+ "e.cloud.binaryauthorization.v1.Admission"
+ "Rule.EnforcementModeB\003\340A\002\"m\n\016EvaluationM"
+ "ode\022\037\n\033EVALUATION_MODE_UNSPECIFIED\020\000\022\020\n\014"
+ "ALWAYS_ALLOW\020\001\022\027\n\023REQUIRE_ATTESTATION\020\002\022"
+ "\017\n\013ALWAYS_DENY\020\003\"p\n\017EnforcementMode\022 \n\034E"
+ "NFORCEMENT_MODE_UNSPECIFIED\020\000\022 \n\034ENFORCE"
+ "D_BLOCK_AND_AUDIT_LOG\020\001\022\031\n\025DRYRUN_AUDIT_"
+ "LOG_ONLY\020\002\"\267\002\n\010Attestor\022\021\n\004name\030\001 \001(\tB\003\340"
+ "A\002\022\030\n\013description\030\006 \001(\tB\003\340A\001\022\\\n\027user_own"
+ "ed_grafeas_note\030\003 \001(\01329.google.cloud.bin"
+ "aryauthorization.v1.UserOwnedGrafeasNote"
+ "H\000\0224\n\013update_time\030\004 \001(\0132\032.google.protobu"
+ "f.TimestampB\003\340A\003:Y\352AV\n+binaryauthorizati"
+ "on.googleapis.com/Attestor\022\'projects/{pr"
+ "oject}/attestors/{attestor}B\017\n\rattestor_"
+ "type\"\264\001\n\024UserOwnedGrafeasNote\022\033\n\016note_re"
+ "ference\030\001 \001(\tB\003\340A\002\022P\n\013public_keys\030\002 \003(\0132"
+ "6.google.cloud.binaryauthorization.v1.At"
+ "testorPublicKeyB\003\340A\001\022-\n delegation_servi"
+ "ce_account_email\030\003 \001(\tB\003\340A\003\"\277\004\n\rPkixPubl"
+ "icKey\022\026\n\016public_key_pem\030\001 \001(\t\022b\n\023signatu"
+ "re_algorithm\030\002 \001(\0162E.google.cloud.binary"
+ "authorization.v1.PkixPublicKey.Signature"
+ "Algorithm\"\261\003\n\022SignatureAlgorithm\022#\n\037SIGN"
+ "ATURE_ALGORITHM_UNSPECIFIED\020\000\022\027\n\023RSA_PSS"
+ "_2048_SHA256\020\001\022\027\n\023RSA_PSS_3072_SHA256\020\002\022"
+ "\027\n\023RSA_PSS_4096_SHA256\020\003\022\027\n\023RSA_PSS_4096"
+ "_SHA512\020\004\022\036\n\032RSA_SIGN_PKCS1_2048_SHA256\020"
+ "\005\022\036\n\032RSA_SIGN_PKCS1_3072_SHA256\020\006\022\036\n\032RSA"
+ "_SIGN_PKCS1_4096_SHA256\020\007\022\036\n\032RSA_SIGN_PK"
+ "CS1_4096_SHA512\020\010\022\025\n\021ECDSA_P256_SHA256\020\t"
+ "\022\027\n\023EC_SIGN_P256_SHA256\020\t\022\025\n\021ECDSA_P384_"
+ "SHA384\020\n\022\027\n\023EC_SIGN_P384_SHA384\020\n\022\025\n\021ECD"
+ "SA_P521_SHA512\020\013\022\027\n\023EC_SIGN_P521_SHA512\020"
+ "\013\032\002\020\001\"\272\001\n\021AttestorPublicKey\022\024\n\007comment\030\001"
+ " \001(\tB\003\340A\001\022\n\n\002id\030\002 \001(\t\022&\n\034ascii_armored_p"
+ "gp_public_key\030\003 \001(\tH\000\022M\n\017pkix_public_key"
+ "\030\005 \001(\01322.google.cloud.binaryauthorizatio"
+ "n.v1.PkixPublicKeyH\000B\014\n\npublic_keyB\211\002\n5c"
+ "om.google.protos.google.cloud.binaryauth"
+ "orization.v1P\000ZVgoogle.golang.org/genpro"
+ "to/googleapis/cloud/binaryauthorization/"
+ "v1;binaryauthorization\370\001\001\252\002#Google.Cloud"
+ ".BinaryAuthorization.V1\312\002#Google\\Cloud\\B"
+ "inaryAuthorization\\V1\352\002&Google::Cloud::B"
+ "inaryAuthorization::V1b\006proto3"
};
descriptor =
com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom(
Expand All @@ -14457,7 +14456,6 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
com.google.api.FieldBehaviorProto.getDescriptor(),
com.google.api.ResourceProto.getDescriptor(),
com.google.protobuf.TimestampProto.getDescriptor(),
com.google.api.AnnotationsProto.getDescriptor(),
});
internal_static_google_cloud_binaryauthorization_v1_Policy_descriptor =
getDescriptor().getMessageTypes().get(0);
Expand Down Expand Up @@ -14573,7 +14571,6 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
com.google.api.FieldBehaviorProto.getDescriptor();
com.google.api.ResourceProto.getDescriptor();
com.google.protobuf.TimestampProto.getDescriptor();
com.google.api.AnnotationsProto.getDescriptor();
}

// @@protoc_insertion_point(outer_class_scope)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,6 @@ package google.cloud.binaryauthorization.v1;
import "google/api/field_behavior.proto";
import "google/api/resource.proto";
import "google/protobuf/timestamp.proto";
import "google/api/annotations.proto";

option cc_enable_arenas = true;
option csharp_namespace = "Google.Cloud.BinaryAuthorization.V1";
Expand Down
Loading