pub struct BackendTLSPolicyValidation {
pub ca_certificate_refs: Option<Vec<BackendTLSPolicyValidationCaCertificateRefs>>,
pub hostname: String,
pub subject_alt_names: Option<Vec<BackendTLSPolicyValidationSubjectAltNames>>,
pub well_known_ca_certificates: Option<BackendTLSPolicyValidationWellKnownCaCertificates>,
}Expand description
Validation contains backend TLS validation configuration.
Fields§
§ca_certificate_refs: Option<Vec<BackendTLSPolicyValidationCaCertificateRefs>>CACertificateRefs contains one or more references to Kubernetes objects that contain a PEM-encoded TLS CA certificate bundle, which is used to validate a TLS handshake between the Gateway and backend Pod.
If CACertificateRefs is empty or unspecified, then WellKnownCACertificates must be specified. Only one of CACertificateRefs or WellKnownCACertificates may be specified, not both. If CACertificateRefs is empty or unspecified, the configuration for WellKnownCACertificates MUST be honored instead if supported by the implementation.
A CACertificateRef is invalid if:
-
It refers to a resource that cannot be resolved (e.g., the referenced resource does not exist) or is misconfigured (e.g., a ConfigMap does not contain a key named
ca.crt). In this case, the Reason must be set toInvalidCACertificateRefand the Message of the Condition must indicate which reference is invalid and why. -
It refers to an unknown or unsupported kind of resource. In this case, the Reason must be set to
InvalidKindand the Message of the Condition must explain which kind of resource is unknown or unsupported. -
It refers to a resource in another namespace. This may change in future spec updates.
Implementations MAY choose to perform further validation of the certificate content (e.g., checking expiry or enforcing specific formats). In such cases, an implementation-specific Reason and Message must be set for the invalid reference.
In all cases, the implementation MUST ensure the ResolvedRefs Condition on
the BackendTLSPolicy is set to status: False, with a Reason and Message
that indicate the cause of the error. Connections using an invalid
CACertificateRef MUST fail, and the client MUST receive an HTTP 5xx error
response. If ALL CACertificateRefs are invalid, the implementation MUST also
ensure the Accepted Condition on the BackendTLSPolicy is set to
status: False, with a Reason NoValidCACertificate.
A single CACertificateRef to a Kubernetes ConfigMap kind has “Core” support. Implementations MAY choose to support attaching multiple certificates to a backend, but this behavior is implementation-specific.
Support: Core - An optional single reference to a Kubernetes ConfigMap,
with the CA certificate in a key named ca.crt.
Support: Implementation-specific - More than one reference, other kinds of resources, or a single reference that includes multiple certificates.
hostname: StringHostname is used for two purposes in the connection between Gateways and backends:
- Hostname MUST be used as the SNI to connect to the backend (RFC 6066).
- Hostname MUST be used for authentication and MUST match the certificate served by the matching backend, unless SubjectAltNames is specified.
- If SubjectAltNames are specified, Hostname can be used for certificate selection but MUST NOT be used for authentication. If you want to use the value of the Hostname field for authentication, you MUST add it to the SubjectAltNames list.
Support: Core
subject_alt_names: Option<Vec<BackendTLSPolicyValidationSubjectAltNames>>SubjectAltNames contains one or more Subject Alternative Names. When specified the certificate served from the backend MUST have at least one Subject Alternate Name matching one of the specified SubjectAltNames.
Support: Extended
well_known_ca_certificates: Option<BackendTLSPolicyValidationWellKnownCaCertificates>WellKnownCACertificates specifies whether system CA certificates may be used in the TLS handshake between the gateway and backend pod.
If WellKnownCACertificates is unspecified or empty (“”), then CACertificateRefs
must be specified with at least one entry for a valid configuration. Only one of
CACertificateRefs or WellKnownCACertificates may be specified, not both.
If an implementation does not support the WellKnownCACertificates field, or
the supplied value is not recognized, the implementation MUST ensure the
Accepted Condition on the BackendTLSPolicy is set to status: False, with
a Reason Invalid.
Support: Implementation-specific
Trait Implementations§
Source§impl Clone for BackendTLSPolicyValidation
impl Clone for BackendTLSPolicyValidation
Source§fn clone(&self) -> BackendTLSPolicyValidation
fn clone(&self) -> BackendTLSPolicyValidation
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source. Read moreSource§impl Debug for BackendTLSPolicyValidation
impl Debug for BackendTLSPolicyValidation
Source§impl Default for BackendTLSPolicyValidation
impl Default for BackendTLSPolicyValidation
Source§fn default() -> BackendTLSPolicyValidation
fn default() -> BackendTLSPolicyValidation
Source§impl<'de> Deserialize<'de> for BackendTLSPolicyValidation
impl<'de> Deserialize<'de> for BackendTLSPolicyValidation
Source§fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
Source§impl JsonSchema for BackendTLSPolicyValidation
impl JsonSchema for BackendTLSPolicyValidation
Source§fn schema_id() -> Cow<'static, str>
fn schema_id() -> Cow<'static, str>
Source§fn json_schema(generator: &mut SchemaGenerator) -> Schema
fn json_schema(generator: &mut SchemaGenerator) -> Schema
Source§fn inline_schema() -> bool
fn inline_schema() -> bool
$ref keyword. Read moreimpl StructuralPartialEq for BackendTLSPolicyValidation
Auto Trait Implementations§
impl Freeze for BackendTLSPolicyValidation
impl RefUnwindSafe for BackendTLSPolicyValidation
impl Send for BackendTLSPolicyValidation
impl Sync for BackendTLSPolicyValidation
impl Unpin for BackendTLSPolicyValidation
impl UnwindSafe for BackendTLSPolicyValidation
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
Source§impl<T> Instrument for T
impl<T> Instrument for T
Source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
Source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
Source§impl<T> IntoEither for T
impl<T> IntoEither for T
Source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
self into a Left variant of Either<Self, Self>
if into_left is true.
Converts self into a Right variant of Either<Self, Self>
otherwise. Read moreSource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
self into a Left variant of Either<Self, Self>
if into_left(&self) returns true.
Converts self into a Right variant of Either<Self, Self>
otherwise. Read more