harbor_api/models/
authproxy_setting.rs

1/*
2 * Harbor API
3 *
4 * These APIs provide services for manipulating Harbor project.
5 *
6 * The version of the OpenAPI document: 2.0
7 * 
8 * Generated by: https://openapi-generator.tech
9 */
10
11use crate::models;
12use serde::{Deserialize, Serialize};
13
14#[derive(Clone, Default, Debug, PartialEq, Serialize, Deserialize)]
15pub struct AuthproxySetting {
16    /// The fully qualified URI of login endpoint of authproxy, such as 'https://192.168.1.2:8443/login'
17    #[serde(rename = "endpoint", skip_serializing_if = "Option::is_none")]
18    pub endpoint: Option<String>,
19    /// The fully qualified URI of token review endpoint of authproxy, such as 'https://192.168.1.2:8443/tokenreview'
20    #[serde(rename = "tokenreivew_endpoint", skip_serializing_if = "Option::is_none")]
21    pub tokenreivew_endpoint: Option<String>,
22    /// The flag to determine whether Harbor can skip search the user/group when adding him as a member.
23    #[serde(rename = "skip_search", skip_serializing_if = "Option::is_none")]
24    pub skip_search: Option<bool>,
25    /// The flag to determine whether Harbor should verify the certificate when connecting to the auth proxy.
26    #[serde(rename = "verify_cert", skip_serializing_if = "Option::is_none")]
27    pub verify_cert: Option<bool>,
28    /// The certificate to be pinned when connecting auth proxy.
29    #[serde(rename = "server_certificate", skip_serializing_if = "Option::is_none")]
30    pub server_certificate: Option<String>,
31}
32
33impl AuthproxySetting {
34    pub fn new() -> AuthproxySetting {
35        AuthproxySetting {
36            endpoint: None,
37            tokenreivew_endpoint: None,
38            skip_search: None,
39            verify_cert: None,
40            server_certificate: None,
41        }
42    }
43}
44