vaultrs/api/auth/kubernetes/
responses.rs

1use serde::{Deserialize, Serialize};
2
3/// Response from executing
4/// [ReadKubernetesAuthConfigRequest][crate::api::auth::kubernetes::requests::ReadKubernetesAuthConfigRequest]
5#[derive(Deserialize, Debug, Serialize)]
6pub struct ReadKubernetesAuthConfigResponse {
7    pub kubernetes_host: String,
8    pub kubernetes_ca_cert: Option<String>,
9    pub pem_keys: Option<Vec<String>>,
10    pub issuer: Option<String>,
11    pub disable_iss_validation: bool,
12    pub disable_local_ca_jwt: bool,
13}
14
15/// Response from executing
16/// [ListRolesRequest][crate::api::auth::kubernetes::requests::ListRolesRequest]
17#[derive(Deserialize, Debug, Serialize)]
18pub struct ListRolesResponse {
19    pub keys: Vec<String>,
20}
21
22/// Response from executing
23/// [ReadKubernetesRoleRequest][crate::api::auth::kubernetes::requests::ReadKubernetesRoleRequest]
24#[derive(Deserialize, Debug, Serialize)]
25pub struct ReadKubernetesRoleResponse {
26    pub bound_service_account_names: Vec<String>,
27    pub bound_service_account_namespaces: Vec<String>,
28    pub token_ttl: u64,
29    pub token_max_ttl: u64,
30    pub token_policies: Vec<String>,
31    pub token_bound_cidrs: Vec<String>,
32    pub token_explicit_max_ttl: u64,
33    pub token_no_default_policy: bool,
34    pub token_num_uses: u64,
35    pub token_period: u64,
36    pub token_type: String,
37}