Struct k8s_gateway_api::TlsRouteSpec
source · pub struct TlsRouteSpec {
pub inner: CommonRouteSpec,
pub hostnames: Option<Vec<Hostname>>,
pub rules: Vec<TlsRouteRule>,
}Expand description
The TLSRoute resource is similar to TCPRoute, but can be configured to match against TLS-specific metadata. This allows more flexibility in matching streams for a given TLS listener.
If you need to forward traffic to a single target for a TLS listener, you could choose to use a TCPRoute with a TLS listener.
Fields§
§inner: CommonRouteSpecCommon route information.
hostnames: Option<Vec<Hostname>>Hostnames defines a set of SNI names that should match against the SNI attribute of TLS ClientHello message in TLS handshake. This matches the RFC 1123 definition of a hostname with 2 notable exceptions:
- IPs are not allowed in SNI names per RFC 6066.
- A hostname may be prefixed with a wildcard label (
*.). The wildcard label must appear by itself as the first label.
If a hostname is specified by both the Listener and TLSRoute, there must be at least one intersecting hostname for the TLSRoute to be attached to the Listener. For example:
- A Listener with
test.example.comas the hostname matches TLSRoutes that have either not specified any hostnames, or have specified at least one oftest.example.comor*.example.com. - A Listener with
*.example.comas the hostname matches TLSRoutes that have either not specified any hostnames or have specified at least one hostname that matches the Listener hostname. For example,test.example.comand*.example.comwould both match. On the other hand,example.comandtest.example.netwould not match.
If both the Listener and TLSRoute have specified hostnames, any TLSRoute
hostnames that do not match the Listener hostname MUST be ignored. For
example, if a Listener specified *.example.com, and the TLSRoute
specified test.example.com and test.example.net, test.example.net
must not be considered for a match.
If both the Listener and TLSRoute have specified hostnames, and none
match with the criteria above, then the TLSRoute is not accepted. The
implementation must raise an ‘Accepted’ Condition with a status of
False in the corresponding RouteParentStatus.
Support: Core
rules: Vec<TlsRouteRule>Rules are a list of TLS matchers and actions.
Trait Implementations§
source§impl Clone for TlsRouteSpec
impl Clone for TlsRouteSpec
source§fn clone(&self) -> TlsRouteSpec
fn clone(&self) -> TlsRouteSpec
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source. Read moresource§impl Debug for TlsRouteSpec
impl Debug for TlsRouteSpec
source§impl<'de> Deserialize<'de> for TlsRouteSpec
impl<'de> Deserialize<'de> for TlsRouteSpec
source§fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where __D: Deserializer<'de>,
source§impl JsonSchema for TlsRouteSpec
impl JsonSchema for TlsRouteSpec
source§fn schema_name() -> String
fn schema_name() -> String
source§fn json_schema(gen: &mut SchemaGenerator) -> Schema
fn json_schema(gen: &mut SchemaGenerator) -> Schema
source§fn is_referenceable() -> bool
fn is_referenceable() -> bool
$ref keyword. Read more