Documentation ¶
Index ¶
- func NewEmptyTLSConfig() *tls.Config
- func NewTLSConfigForServer(serverName string, enableHostVerification bool) *tls.Config
- func NewTLSConfigWithCertsAndCAs(certificates []tls.Certificate, rootCAs *x509.CertPool, serverName string, ...) *tls.Config
- func NewTLSConfigWithClientAuthAndCAs(clientAuth tls.ClientAuthType, certificates []tls.Certificate, ...) *tls.Config
- type TLS
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func NewEmptyTLSConfig ¶ added in v1.1.0
func NewTLSConfigForServer ¶ added in v1.1.0
func NewTLSConfigWithCertsAndCAs ¶ added in v1.1.0
func NewTLSConfigWithClientAuthAndCAs ¶ added in v1.1.0
func NewTLSConfigWithClientAuthAndCAs( clientAuth tls.ClientAuthType, certificates []tls.Certificate, clientCAs *x509.CertPool, ) *tls.Config
Types ¶
type TLS ¶
type TLS struct { Enabled bool `yaml:"enabled"` // CertPath and KeyPath are optional depending on server // config, but both fields must be omitted to avoid using a // client certificate CertFile string `yaml:"certFile"` KeyFile string `yaml:"keyFile"` CaFile string `yaml:"caFile"` //optional depending on server config // If you want to verify the hostname and server cert (like a wildcard for cass cluster) then you should turn this on // This option is basically the inverse of InSecureSkipVerify // See InSecureSkipVerify in http://golang.org/pkg/crypto/tls/ for more info EnableHostVerification bool `yaml:"enableHostVerification"` ServerName string `yaml:"serverName"` // Base64 equivalents of the above artifacts. // You cannot specify both a Data and a File for the same artifact (e.g. setting CertFile and CertData) CertData string `yaml:"certData"` KeyData string `yaml:"keyData"` CaData string `yaml:"caData"` // optional depending on server config }
TLS describe TLS configuration (for Kafka, Cassandra, SQL)
Click to show internal directories.
Click to hide internal directories.