|
| 1 | +// @generated by protoc-gen-es v2.8.0 with parameter "target=ts" |
| 2 | +// @generated from file krane/v1/secrets.proto (package krane.v1, syntax proto3) |
| 3 | +/* eslint-disable */ |
| 4 | + |
| 5 | +import type { GenFile, GenMessage, GenService } from "@bufbuild/protobuf/codegenv2"; |
| 6 | +import { fileDesc, messageDesc, serviceDesc } from "@bufbuild/protobuf/codegenv2"; |
| 7 | +import type { Message } from "@bufbuild/protobuf"; |
| 8 | + |
| 9 | +/** |
| 10 | + * Describes the file krane/v1/secrets.proto. |
| 11 | + */ |
| 12 | +export const file_krane_v1_secrets: GenFile = /*@__PURE__*/ |
| 13 | + fileDesc("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"); |
| 14 | + |
| 15 | +/** |
| 16 | + * @generated from message krane.v1.DecryptSecretsBlobRequest |
| 17 | + */ |
| 18 | +export type DecryptSecretsBlobRequest = Message<"krane.v1.DecryptSecretsBlobRequest"> & { |
| 19 | + /** |
| 20 | + * The encrypted secrets blob from the pod spec (UNKEY_SECRETS_BLOB env var). |
| 21 | + * This is the SecretsConfig proto, encrypted with the environment's vault keyring. |
| 22 | + * |
| 23 | + * @generated from field: bytes encrypted_blob = 1; |
| 24 | + */ |
| 25 | + encryptedBlob: Uint8Array; |
| 26 | + |
| 27 | + /** |
| 28 | + * Environment ID (keyring) to use for decryption. |
| 29 | + * |
| 30 | + * @generated from field: string environment_id = 2; |
| 31 | + */ |
| 32 | + environmentId: string; |
| 33 | + |
| 34 | + /** |
| 35 | + * Token for authentication (K8s service account token or DB-stored token). |
| 36 | + * |
| 37 | + * @generated from field: string token = 3; |
| 38 | + */ |
| 39 | + token: string; |
| 40 | + |
| 41 | + /** |
| 42 | + * Deployment ID for token validation. |
| 43 | + * |
| 44 | + * @generated from field: string deployment_id = 4; |
| 45 | + */ |
| 46 | + deploymentId: string; |
| 47 | +}; |
| 48 | + |
| 49 | +/** |
| 50 | + * Describes the message krane.v1.DecryptSecretsBlobRequest. |
| 51 | + * Use `create(DecryptSecretsBlobRequestSchema)` to create a new message. |
| 52 | + */ |
| 53 | +export const DecryptSecretsBlobRequestSchema: GenMessage<DecryptSecretsBlobRequest> = /*@__PURE__*/ |
| 54 | + messageDesc(file_krane_v1_secrets, 0); |
| 55 | + |
| 56 | +/** |
| 57 | + * @generated from message krane.v1.DecryptSecretsBlobResponse |
| 58 | + */ |
| 59 | +export type DecryptSecretsBlobResponse = Message<"krane.v1.DecryptSecretsBlobResponse"> & { |
| 60 | + /** |
| 61 | + * Decrypted environment variables (key -> plaintext value) |
| 62 | + * |
| 63 | + * @generated from field: map<string, string> env_vars = 1; |
| 64 | + */ |
| 65 | + envVars: { [key: string]: string }; |
| 66 | +}; |
| 67 | + |
| 68 | +/** |
| 69 | + * Describes the message krane.v1.DecryptSecretsBlobResponse. |
| 70 | + * Use `create(DecryptSecretsBlobResponseSchema)` to create a new message. |
| 71 | + */ |
| 72 | +export const DecryptSecretsBlobResponseSchema: GenMessage<DecryptSecretsBlobResponse> = /*@__PURE__*/ |
| 73 | + messageDesc(file_krane_v1_secrets, 1); |
| 74 | + |
| 75 | +/** |
| 76 | + * SecretsService provides decrypted secrets to running workloads. |
| 77 | + * Called by the unkey-env binary injected into customer pods/containers. |
| 78 | + * |
| 79 | + * @generated from service krane.v1.SecretsService |
| 80 | + */ |
| 81 | +export const SecretsService: GenService<{ |
| 82 | + /** |
| 83 | + * DecryptSecretsBlob decrypts an encrypted secrets blob passed in the pod spec. |
| 84 | + * This avoids DB lookups - the encrypted blob travels with the pod. |
| 85 | + * Authentication is via K8s service account token or DB-stored token. |
| 86 | + * |
| 87 | + * @generated from rpc krane.v1.SecretsService.DecryptSecretsBlob |
| 88 | + */ |
| 89 | + decryptSecretsBlob: { |
| 90 | + methodKind: "unary"; |
| 91 | + input: typeof DecryptSecretsBlobRequestSchema; |
| 92 | + output: typeof DecryptSecretsBlobResponseSchema; |
| 93 | + }, |
| 94 | +}> = /*@__PURE__*/ |
| 95 | + serviceDesc(file_krane_v1_secrets, 0); |
| 96 | + |
0 commit comments