Get desktop application:
View/edit binary Protocol Buffers messages
Used in:
Used in:
Used in:
If set, the user has privileges to select and apply predicates on the column during scans.
Used in:
The actual token data. This is a serialized TokenPB protobuf. However, we use a 'bytes' field, since protobuf doesn't guarantee that if two implementations serialize a protobuf, they'll necessary get bytewise identical results, particularly in the presence of unknown fields.
The cryptographic signature of 'token_contents'.
The sequence number of the key which produced 'signature'.
Used in:
The ID of the table to which the privileges apply.
If set, the user is authorized to select and apply predicates to all columns when scanning the table, and `column_privileges` is ignored. If unset, the user may only scan and apply predicates to columns with the privileges specified in `column_privileges`.
If set, the user is authorized to insert rows into the table.
If set, the user is authorized to update rows in the table.
If set, the user is authorized to delete rows in the table.
Per-column privileges, indexed by column ID.
The time at which this token expires, in seconds since the unix epoch.
List of incompatible features used by this token. If a feature is listed in the token and a server verifying/authorizing the token sees an UNKNOWN value in this list, it should reject the token. This allows us to safely add "restrictive" content to tokens and have a "default deny" policy on servers that may not understand them. We use an int32 here but the values correspond to the 'Feature' enum above. This is to deal with protobuf's odd handling of unknown enum values (see KUDU-1850).
Protobuf doesn't let us define a enum with no values, so we've got this placeholder in here for now. When we add the first real feature flag, we can remove this.
A private key used to sign tokens.
The private key material, in DER format.
The time at which signatures made by this key should no longer be valid.
A public key corresponding to the private key used to sign tokens. Only this part is necessary for token verification.
The public key material, in DER format.
The time at which signatures made by this key should no longer be valid.