# Functions
No description provided by the author
No description provided by the author
# Structs
No description provided by the author
No description provided by the author
Which strategy should be used for verifying TLS.
Verify the certificate based on the Kubernetes pod identity.
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
# Interfaces
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author