1// Generated from definition io.k8s.api.networking.v1.IngressTLS
23/// IngressTLS describes the transport layer security associated with an ingress.
4#[derive(Clone, Debug, Default, PartialEq)]
5pub struct IngressTLS {
6/// hosts is a list of hosts included in the TLS certificate. The values in this list must match the name/s used in the tlsSecret. Defaults to the wildcard host setting for the loadbalancer controller fulfilling this Ingress, if left unspecified.
7pub hosts: Option<std::vec::Vec<std::string::String>>,
89/// secretName is the name of the secret used to terminate TLS traffic on port 443. Field is left optional to allow TLS routing based on SNI hostname alone. If the SNI host in a listener conflicts with the "Host" header field used by an IngressRule, the SNI host is used for termination and value of the "Host" header is used for routing.
10pub secret_name: Option<std::string::String>,
11}
1213impl crate::DeepMerge for IngressTLS {
14fn merge_from(&mut self, other: Self) {
15crate::merge_strategies::list::atomic(&mut self.hosts, other.hosts);
16crate::DeepMerge::merge_from(&mut self.secret_name, other.secret_name);
17 }
18}
1920impl<'de> crate::serde::Deserialize<'de> for IngressTLS {
21fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: crate::serde::Deserializer<'de> {
22#[allow(non_camel_case_types)]
23enum Field {
24 Key_hosts,
25 Key_secret_name,
26 Other,
27 }
2829impl<'de> crate::serde::Deserialize<'de> for Field {
30fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: crate::serde::Deserializer<'de> {
31struct Visitor;
3233impl crate::serde::de::Visitor<'_> for Visitor {
34type Value = Field;
3536fn expecting(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
37 f.write_str("field identifier")
38 }
3940fn visit_str<E>(self, v: &str) -> Result<Self::Value, E> where E: crate::serde::de::Error {
41Ok(match v {
42"hosts" => Field::Key_hosts,
43"secretName" => Field::Key_secret_name,
44_ => Field::Other,
45 })
46 }
47 }
4849 deserializer.deserialize_identifier(Visitor)
50 }
51 }
5253struct Visitor;
5455impl<'de> crate::serde::de::Visitor<'de> for Visitor {
56type Value = IngressTLS;
5758fn expecting(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
59 f.write_str("IngressTLS")
60 }
6162fn visit_map<A>(self, mut map: A) -> Result<Self::Value, A::Error> where A: crate::serde::de::MapAccess<'de> {
63let mut value_hosts: Option<std::vec::Vec<std::string::String>> = None;
64let mut value_secret_name: Option<std::string::String> = None;
6566while let Some(key) = crate::serde::de::MapAccess::next_key::<Field>(&mut map)? {
67match key {
68 Field::Key_hosts => value_hosts = crate::serde::de::MapAccess::next_value(&mut map)?,
69 Field::Key_secret_name => value_secret_name = crate::serde::de::MapAccess::next_value(&mut map)?,
70 Field::Other => { let _: crate::serde::de::IgnoredAny = crate::serde::de::MapAccess::next_value(&mut map)?; },
71 }
72 }
7374Ok(IngressTLS {
75 hosts: value_hosts,
76 secret_name: value_secret_name,
77 })
78 }
79 }
8081 deserializer.deserialize_struct(
82"IngressTLS",
83&[
84"hosts",
85"secretName",
86 ],
87 Visitor,
88 )
89 }
90}
9192impl crate::serde::Serialize for IngressTLS {
93fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error> where S: crate::serde::Serializer {
94let mut state = serializer.serialize_struct(
95"IngressTLS",
96self.hosts.as_ref().map_or(0, |_| 1) +
97self.secret_name.as_ref().map_or(0, |_| 1),
98 )?;
99if let Some(value) = &self.hosts {
100crate::serde::ser::SerializeStruct::serialize_field(&mut state, "hosts", value)?;
101 }
102if let Some(value) = &self.secret_name {
103crate::serde::ser::SerializeStruct::serialize_field(&mut state, "secretName", value)?;
104 }
105crate::serde::ser::SerializeStruct::end(state)
106 }
107}
108109#[cfg(feature = "schemars")]
110impl crate::schemars::JsonSchema for IngressTLS {
111fn schema_name() -> std::string::String {
112"io.k8s.api.networking.v1.IngressTLS".into()
113 }
114115fn json_schema(__gen: &mut crate::schemars::gen::SchemaGenerator) -> crate::schemars::schema::Schema {
116crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
117 metadata: Some(std::boxed::Box::new(crate::schemars::schema::Metadata {
118 description: Some("IngressTLS describes the transport layer security associated with an ingress.".into()),
119 ..Default::default()
120 })),
121 instance_type: Some(crate::schemars::schema::SingleOrVec::Single(std::boxed::Box::new(crate::schemars::schema::InstanceType::Object))),
122 object: Some(std::boxed::Box::new(crate::schemars::schema::ObjectValidation {
123 properties: [
124 (
125"hosts".into(),
126crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
127 metadata: Some(std::boxed::Box::new(crate::schemars::schema::Metadata {
128 description: Some("hosts is a list of hosts included in the TLS certificate. The values in this list must match the name/s used in the tlsSecret. Defaults to the wildcard host setting for the loadbalancer controller fulfilling this Ingress, if left unspecified.".into()),
129 ..Default::default()
130 })),
131 instance_type: Some(crate::schemars::schema::SingleOrVec::Single(std::boxed::Box::new(crate::schemars::schema::InstanceType::Array))),
132 array: Some(std::boxed::Box::new(crate::schemars::schema::ArrayValidation {
133 items: Some(crate::schemars::schema::SingleOrVec::Single(std::boxed::Box::new(
134crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
135 instance_type: Some(crate::schemars::schema::SingleOrVec::Single(std::boxed::Box::new(crate::schemars::schema::InstanceType::String))),
136 ..Default::default()
137 })
138 ))),
139 ..Default::default()
140 })),
141 ..Default::default()
142 }),
143 ),
144 (
145"secretName".into(),
146crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
147 metadata: Some(std::boxed::Box::new(crate::schemars::schema::Metadata {
148 description: Some("secretName is the name of the secret used to terminate TLS traffic on port 443. Field is left optional to allow TLS routing based on SNI hostname alone. If the SNI host in a listener conflicts with the \"Host\" header field used by an IngressRule, the SNI host is used for termination and value of the \"Host\" header is used for routing.".into()),
149 ..Default::default()
150 })),
151 instance_type: Some(crate::schemars::schema::SingleOrVec::Single(std::boxed::Box::new(crate::schemars::schema::InstanceType::String))),
152 ..Default::default()
153 }),
154 ),
155 ].into(),
156 ..Default::default()
157 })),
158 ..Default::default()
159 })
160 }
161}