pub struct ClusterStatusCertificates {
pub client_ca_secret: Option<String>,
pub expirations: Option<BTreeMap<String, String>>,
pub replication_tls_secret: Option<String>,
pub server_alt_dns_names: Option<Vec<String>>,
pub server_ca_secret: Option<String>,
pub server_tls_secret: Option<String>,
}
Expand description
The configuration for the CA and related certificates, initialized with defaults.
Fields§
§client_ca_secret: Option<String>
The secret containing the Client CA certificate. If not defined, a new secret will be created with a self-signed CA and will be used to generate all the client certificates.
Contains:
- ca.crt
: CA that should be used to validate the client certificates, used as ssl_ca_file
of all the instances.
- ca.key
: key used to generate client certificates, if ReplicationTLSSecret is provided, this can be omitted.
expirations: Option<BTreeMap<String, String>>
Expiration dates for all certificates.
replication_tls_secret: Option<String>
The secret of type kubernetes.io/tls containing the client certificate to authenticate as the streaming_replica
user. If not defined, ClientCASecret must provide also ca.key
, and a new secret will be created using the provided CA.
server_alt_dns_names: Option<Vec<String>>
The list of the server alternative DNS names to be added to the generated server TLS certificates, when required.
server_ca_secret: Option<String>
The secret containing the Server CA certificate. If not defined, a new secret will be created with a self-signed CA and will be used to generate the TLS certificate ServerTLSSecret.
Contains:
- ca.crt
: CA that should be used to validate the server certificate, used as sslrootcert
in client connection strings.
- ca.key
: key used to generate Server SSL certs, if ServerTLSSecret is provided, this can be omitted.
server_tls_secret: Option<String>
The secret of type kubernetes.io/tls containing the server TLS certificate and key that will be set as ssl_cert_file
and ssl_key_file
so that clients can connect to postgres securely. If not defined, ServerCASecret must provide also ca.key
and a new secret will be created using the provided CA.
Trait Implementations§
source§impl Clone for ClusterStatusCertificates
impl Clone for ClusterStatusCertificates
source§fn clone(&self) -> ClusterStatusCertificates
fn clone(&self) -> ClusterStatusCertificates
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moresource§impl Debug for ClusterStatusCertificates
impl Debug for ClusterStatusCertificates
source§impl Default for ClusterStatusCertificates
impl Default for ClusterStatusCertificates
source§fn default() -> ClusterStatusCertificates
fn default() -> ClusterStatusCertificates
source§impl<'de> Deserialize<'de> for ClusterStatusCertificates
impl<'de> Deserialize<'de> for ClusterStatusCertificates
source§fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
source§impl JsonSchema for ClusterStatusCertificates
impl JsonSchema for ClusterStatusCertificates
source§fn schema_name() -> String
fn schema_name() -> String
source§fn schema_id() -> Cow<'static, str>
fn schema_id() -> Cow<'static, str>
source§fn json_schema(gen: &mut SchemaGenerator) -> Schema
fn json_schema(gen: &mut SchemaGenerator) -> Schema
source§fn is_referenceable() -> bool
fn is_referenceable() -> bool
$ref
keyword. Read more