@@ -149,20 +149,14 @@ pub enum AdditionalTrustRoot {
149
149
/// The extensions of the keys denote its contents: A key suffixed with `.crt` contains a stack
150
150
/// of base64 encoded DER certificates, a key suffixed with `.der` contains a binary DER
151
151
/// certificate.
152
- ConfigMap {
153
- #[ serde( flatten) ]
154
- config_map : ConfigMapReference ,
155
- } ,
152
+ ConfigMap ( ConfigMapReference ) ,
156
153
157
154
/// Reference (name and namespace) to a Kubernetes Secret object where additional certificates
158
155
/// are stored.
159
156
/// The extensions of the keys denote its contents: A key suffixed with `.crt` contains a stack
160
157
/// of base64 encoded DER certificates, a key suffixed with `.der` contains a binary DER
161
158
/// certificate.
162
- Secret {
163
- #[ serde( flatten) ]
164
- secret : SecretReference ,
165
- } ,
159
+ Secret ( SecretReference ) ,
166
160
}
167
161
168
162
#[ derive( Serialize , Deserialize , Clone , Debug , PartialEq , JsonSchema ) ]
@@ -491,18 +485,14 @@ mod test {
491
485
key_generation: CertificateKeyGeneration :: default ( )
492
486
} ,
493
487
additional_trust_roots: vec![
494
- AdditionalTrustRoot :: ConfigMap {
495
- config_map: ConfigMapReference {
496
- name: "tls-root-ca-config-map" . to_string( ) ,
497
- namespace: "default" . to_string( ) ,
498
- }
499
- } ,
500
- AdditionalTrustRoot :: Secret {
501
- secret: SecretReference {
502
- name: "tls-root-ca-secret" . to_string( ) ,
503
- namespace: "default" . to_string( ) ,
504
- }
505
- }
488
+ AdditionalTrustRoot :: ConfigMap ( ConfigMapReference {
489
+ name: "tls-root-ca-config-map" . to_string( ) ,
490
+ namespace: "default" . to_string( ) ,
491
+ } ) ,
492
+ AdditionalTrustRoot :: Secret ( SecretReference {
493
+ name: "tls-root-ca-secret" . to_string( ) ,
494
+ namespace: "default" . to_string( ) ,
495
+ } )
506
496
] ,
507
497
max_certificate_lifetime: Duration :: from_days_unchecked( 31 ) ,
508
498
} )
0 commit comments