Struct mz_cloud_resources::crd::gen::cert_manager::certificates::CertificateSpec
source · pub struct CertificateSpec {Show 22 fields
pub additional_output_formats: Option<Vec<CertificateAdditionalOutputFormats>>,
pub common_name: Option<String>,
pub dns_names: Option<Vec<String>>,
pub duration: Option<String>,
pub email_addresses: Option<Vec<String>>,
pub encode_usages_in_request: Option<bool>,
pub ip_addresses: Option<Vec<String>>,
pub is_ca: Option<bool>,
pub issuer_ref: CertificateIssuerRef,
pub keystores: Option<CertificateKeystores>,
pub literal_subject: Option<String>,
pub name_constraints: Option<CertificateNameConstraints>,
pub other_names: Option<Vec<CertificateOtherNames>>,
pub private_key: Option<CertificatePrivateKey>,
pub renew_before: Option<String>,
pub renew_before_percentage: Option<i32>,
pub revision_history_limit: Option<i32>,
pub secret_name: String,
pub secret_template: Option<CertificateSecretTemplate>,
pub subject: Option<CertificateSubject>,
pub uris: Option<Vec<String>>,
pub usages: Option<Vec<String>>,
}
Expand description
Specification of the desired state of the Certificate resource. https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status
Fields§
§additional_output_formats: Option<Vec<CertificateAdditionalOutputFormats>>
Defines extra output formats of the private key and signed certificate chain to be written to this Certificate’s target Secret.
This is a Beta Feature enabled by default. It can be disabled with the
--feature-gates=AdditionalCertificateOutputFormats=false
option set on both
the controller and webhook components.
common_name: Option<String>
Requested common name X509 certificate subject attribute. More info: https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.6 NOTE: TLS clients will ignore this value when any subject alternative name is set (see https://tools.ietf.org/html/rfc6125#section-6.4.4).
Should have a length of 64 characters or fewer to avoid generating invalid CSRs.
Cannot be set if the literalSubject
field is set.
dns_names: Option<Vec<String>>
Requested DNS subject alternative names.
duration: Option<String>
Requested ‘duration’ (i.e. lifetime) of the Certificate. Note that the issuer may choose to ignore the requested duration, just like any other requested attribute.
If unset, this defaults to 90 days. Minimum accepted duration is 1 hour. Value must be in units accepted by Go time.ParseDuration https://golang.org/pkg/time/#ParseDuration.
email_addresses: Option<Vec<String>>
Requested email subject alternative names.
encode_usages_in_request: Option<bool>
Whether the KeyUsage and ExtKeyUsage extensions should be set in the encoded CSR.
This option defaults to true, and should only be disabled if the target issuer does not support CSRs with these X509 KeyUsage/ ExtKeyUsage extensions.
ip_addresses: Option<Vec<String>>
Requested IP address subject alternative names.
is_ca: Option<bool>
Requested basic constraints isCA value.
The isCA value is used to set the isCA
field on the created CertificateRequest
resources. Note that the issuer may choose to ignore the requested isCA value, just
like any other requested attribute.
If true, this will automatically add the cert sign
usage to the list
of requested usages
.
issuer_ref: CertificateIssuerRef
Reference to the issuer responsible for issuing the certificate. If the issuer is namespace-scoped, it must be in the same namespace as the Certificate. If the issuer is cluster-scoped, it can be used from any namespace.
The name
field of the reference must always be specified.
keystores: Option<CertificateKeystores>
Additional keystore output formats to be stored in the Certificate’s Secret.
literal_subject: Option<String>
Requested X.509 certificate subject, represented using the LDAP “String
Representation of a Distinguished Name” [1].
Important: the LDAP string format also specifies the order of the attributes
in the subject, this is important when issuing certs for LDAP authentication.
Example: CN=foo,DC=corp,DC=example,DC=com
More info [1]: https://datatracker.ietf.org/doc/html/rfc4514
More info: https://github.com/cert-manager/cert-manager/issues/3203
More info: https://github.com/cert-manager/cert-manager/issues/4424
Cannot be set if the subject
or commonName
field is set.
name_constraints: Option<CertificateNameConstraints>
x.509 certificate NameConstraint extension which MUST NOT be used in a non-CA certificate. More Info: https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.10
This is an Alpha Feature and is only enabled with the
--feature-gates=NameConstraints=true
option set on both
the controller and webhook components.
other_names: Option<Vec<CertificateOtherNames>>
otherNames
is an escape hatch for SAN that allows any type. We currently restrict the support to string like otherNames, cf RFC 5280 p 37
Any UTF8 String valued otherName can be passed with by setting the keys oid: x.x.x.x and UTF8Value: somevalue for otherName
.
Most commonly this would be UPN set with oid: 1.3.6.1.4.1.311.20.2.3
You should ensure that any OID passed is valid for the UTF8String type as we do not explicitly validate this.
private_key: Option<CertificatePrivateKey>
Private key options. These include the key algorithm and size, the used encoding and the rotation policy.
renew_before: Option<String>
How long before the currently issued certificate’s expiry cert-manager should
renew the certificate. For example, if a certificate is valid for 60 minutes,
and renewBefore=10m
, cert-manager will begin to attempt to renew the certificate
50 minutes after it was issued (i.e. when there are 10 minutes remaining until
the certificate is no longer valid).
NOTE: The actual lifetime of the issued certificate is used to determine the renewal time. If an issuer returns a certificate with a different lifetime than the one requested, cert-manager will use the lifetime of the issued certificate.
If unset, this defaults to 1/3 of the issued certificate’s lifetime.
Minimum accepted value is 5 minutes.
Value must be in units accepted by Go time.ParseDuration https://golang.org/pkg/time/#ParseDuration.
Cannot be set if the renewBeforePercentage
field is set.
renew_before_percentage: Option<i32>
renewBeforePercentage
is like renewBefore
, except it is a relative percentage
rather than an absolute duration. For example, if a certificate is valid for 60
minutes, and renewBeforePercentage=25
, cert-manager will begin to attempt to
renew the certificate 45 minutes after it was issued (i.e. when there are 15
minutes (25%) remaining until the certificate is no longer valid).
NOTE: The actual lifetime of the issued certificate is used to determine the renewal time. If an issuer returns a certificate with a different lifetime than the one requested, cert-manager will use the lifetime of the issued certificate.
Value must be an integer in the range (0,100). The minimum effective
renewBefore
derived from the renewBeforePercentage
and duration
fields is 5
minutes.
Cannot be set if the renewBefore
field is set.
revision_history_limit: Option<i32>
The maximum number of CertificateRequest revisions that are maintained in
the Certificate’s history. Each revision represents a single CertificateRequest
created by this Certificate, either when it was created, renewed, or Spec
was changed. Revisions will be removed by oldest first if the number of
revisions exceeds this number.
If set, revisionHistoryLimit must be a value of 1
or greater.
If unset (nil
), revisions will not be garbage collected.
Default value is nil
.
secret_name: String
Name of the Secret resource that will be automatically created and managed by this Certificate resource. It will be populated with a private key and certificate, signed by the denoted issuer. The Secret resource lives in the same namespace as the Certificate resource.
secret_template: Option<CertificateSecretTemplate>
Defines annotations and labels to be copied to the Certificate’s Secret. Labels and annotations on the Secret will be changed as they appear on the SecretTemplate when added or removed. SecretTemplate annotations are added in conjunction with, and cannot overwrite, the base set of annotations cert-manager sets on the Certificate’s Secret.
subject: Option<CertificateSubject>
Requested set of X509 certificate subject attributes. More info: https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.6
The common name attribute is specified separately in the commonName
field.
Cannot be set if the literalSubject
field is set.
uris: Option<Vec<String>>
Requested URI subject alternative names.
usages: Option<Vec<String>>
Requested key usages and extended key usages.
These usages are used to set the usages
field on the created CertificateRequest
resources. If encodeUsagesInRequest
is unset or set to true
, the usages
will additionally be encoded in the request
field which contains the CSR blob.
If unset, defaults to digital signature
and key encipherment
.
Trait Implementations§
source§impl Clone for CertificateSpec
impl Clone for CertificateSpec
source§fn clone(&self) -> CertificateSpec
fn clone(&self) -> CertificateSpec
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moresource§impl Debug for CertificateSpec
impl Debug for CertificateSpec
source§impl Default for CertificateSpec
impl Default for CertificateSpec
source§fn default() -> CertificateSpec
fn default() -> CertificateSpec
source§impl<'de> Deserialize<'de> for CertificateSpec
impl<'de> Deserialize<'de> for CertificateSpec
source§fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
source§impl JsonSchema for CertificateSpec
impl JsonSchema for CertificateSpec
source§fn schema_name() -> String
fn schema_name() -> String
source§fn json_schema(gen: &mut SchemaGenerator) -> Schema
fn json_schema(gen: &mut SchemaGenerator) -> Schema
source§fn is_referenceable() -> bool
fn is_referenceable() -> bool
$ref
keyword. Read moresource§impl PartialEq for CertificateSpec
impl PartialEq for CertificateSpec
source§impl Serialize for CertificateSpec
impl Serialize for CertificateSpec
impl StructuralPartialEq for CertificateSpec
Auto Trait Implementations§
impl Freeze for CertificateSpec
impl RefUnwindSafe for CertificateSpec
impl Send for CertificateSpec
impl Sync for CertificateSpec
impl Unpin for CertificateSpec
impl UnwindSafe for CertificateSpec
Blanket Implementations§
source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
source§default unsafe fn clone_to_uninit(&self, dst: *mut T)
default unsafe fn clone_to_uninit(&self, dst: *mut T)
clone_to_uninit
)source§impl<T> FutureExt for T
impl<T> FutureExt for T
source§fn with_context(self, otel_cx: Context) -> WithContext<Self>
fn with_context(self, otel_cx: Context) -> WithContext<Self>
source§fn with_current_context(self) -> WithContext<Self>
fn with_current_context(self) -> WithContext<Self>
source§impl<T> Instrument for T
impl<T> Instrument for T
source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
source§impl<T> IntoRequest<T> for T
impl<T> IntoRequest<T> for T
source§fn into_request(self) -> Request<T>
fn into_request(self) -> Request<T>
T
in a tonic::Request
source§impl<T, U> OverrideFrom<Option<&T>> for Uwhere
U: OverrideFrom<T>,
impl<T, U> OverrideFrom<Option<&T>> for Uwhere
U: OverrideFrom<T>,
source§impl<T> Pointable for T
impl<T> Pointable for T
source§impl<T> ProgressEventTimestamp for T
impl<T> ProgressEventTimestamp for T
source§impl<P, R> ProtoType<R> for Pwhere
R: RustType<P>,
impl<P, R> ProtoType<R> for Pwhere
R: RustType<P>,
source§fn into_rust(self) -> Result<R, TryFromProtoError>
fn into_rust(self) -> Result<R, TryFromProtoError>
RustType::from_proto
.source§fn from_rust(rust: &R) -> P
fn from_rust(rust: &R) -> P
RustType::into_proto
.source§impl<'a, S, T> Semigroup<&'a S> for Twhere
T: Semigroup<S>,
impl<'a, S, T> Semigroup<&'a S> for Twhere
T: Semigroup<S>,
source§fn plus_equals(&mut self, rhs: &&'a S)
fn plus_equals(&mut self, rhs: &&'a S)
std::ops::AddAssign
, for types that do not implement AddAssign
.