pub struct UserManagedKeysConfig {
pub aggregation_ca: Option<String>,
pub cluster_ca: Option<String>,
pub control_plane_disk_encryption_key: Option<String>,
pub control_plane_disk_encryption_key_versions: Option<Vec<String>>,
pub etcd_api_ca: Option<String>,
pub etcd_peer_ca: Option<String>,
pub gkeops_etcd_backup_encryption_key: Option<String>,
pub service_account_signing_keys: Option<Vec<String>>,
pub service_account_verification_keys: Option<Vec<String>>,
}Expand description
UserManagedKeysConfig holds the resource address to Keys which are used for signing certs and token that are used for communication within cluster.
This type is not used in any activity, and only used as part of another schema.
Fields§
§aggregation_ca: Option<String>The Certificate Authority Service caPool to use for the aggregation CA in this cluster.
cluster_ca: Option<String>The Certificate Authority Service caPool to use for the cluster CA in this cluster.
control_plane_disk_encryption_key: Option<String>The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control plane nodes.
control_plane_disk_encryption_key_versions: Option<Vec<String>>Output only. All of the versions of the Cloud KMS cryptoKey that are used by Confidential Hyperdisks on the control plane nodes.
etcd_api_ca: Option<String>Resource path of the Certificate Authority Service caPool to use for the etcd API CA in this cluster.
etcd_peer_ca: Option<String>Resource path of the Certificate Authority Service caPool to use for the etcd peer CA in this cluster.
gkeops_etcd_backup_encryption_key: Option<String>Resource path of the Cloud KMS cryptoKey to use for encryption of internal etcd backups.
service_account_signing_keys: Option<Vec<String>>The Cloud KMS cryptoKeyVersions to use for signing service account JWTs issued by this cluster. Format: projects/{project}/locations/{location}/keyRings/{keyring}/cryptoKeys/{cryptoKey}/cryptoKeyVersions/{cryptoKeyVersion}
service_account_verification_keys: Option<Vec<String>>The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs issued by this cluster. Format: projects/{project}/locations/{location}/keyRings/{keyring}/cryptoKeys/{cryptoKey}/cryptoKeyVersions/{cryptoKeyVersion}
Trait Implementations§
Source§impl Clone for UserManagedKeysConfig
impl Clone for UserManagedKeysConfig
Source§fn clone(&self) -> UserManagedKeysConfig
fn clone(&self) -> UserManagedKeysConfig
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source. Read more