/
zz_policyv2_types.go
executable file
·233 lines (192 loc) · 9.99 KB
/
zz_policyv2_types.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
// SPDX-FileCopyrightText: 2023 The Crossplane Authors <https://crossplane.io>
//
// SPDX-License-Identifier: Apache-2.0
/*
Copyright 2022 Upbound Inc.
Copyright 2023 Jakob Schlagenhaufer, Jan Dittrich
*/
// Code generated by upjet. DO NOT EDIT.
package v1alpha1
import (
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime/schema"
v1 "github.com/crossplane/crossplane-runtime/apis/common/v1"
)
type PolicyV2InitParameters struct {
// Audit status of the firewall policy
// (must be "true" or "false" if provided - defaults to "false").
// This status is set to "false" whenever the firewall policy or any of its
// rules are changed. Changing this updates the audited status of an existing
// firewall policy.
Audited *bool `json:"audited,omitempty" tf:"audited,omitempty"`
// A description for the firewall policy. Changing
// this updates the description of an existing firewall policy.
Description *string `json:"description,omitempty" tf:"description,omitempty"`
// A name for the firewall policy. Changing this
// updates the name of an existing firewall policy.
Name *string `json:"name,omitempty" tf:"name,omitempty"`
// - This argument conflicts and is interchangeable
// with tenant_id. The owner of the firewall policy. Required if admin wants
// to create a firewall policy for another project. Changing this creates a new
// firewall policy.
ProjectID *string `json:"projectId,omitempty" tf:"project_id,omitempty"`
// The region in which to obtain the v2 networking client.
// A networking client is needed to create a firewall policy. If omitted, the
// region argument of the provider is used. Changing this creates a new
// firewall policy.
Region *string `json:"region,omitempty" tf:"region,omitempty"`
// An array of one or more firewall rules that comprise
// the policy. Changing this results in adding/removing rules from the
// existing firewall policy.
Rules []*string `json:"rules,omitempty" tf:"rules,omitempty"`
// Sharing status of the firewall policy (must be "true"
// or "false" if provided). If this is "true" the policy is visible to, and
// can be used in, firewalls in other tenants. Changing this updates the
// shared status of an existing firewall policy. Only administrative users
// can specify if the policy should be shared.
Shared *bool `json:"shared,omitempty" tf:"shared,omitempty"`
// - This argument conflicts and is interchangeable
// with project_id. The owner of the firewall policy. Required if admin wants
// to create a firewall policy for another tenant. Changing this creates a new
// firewall policy.
TenantID *string `json:"tenantId,omitempty" tf:"tenant_id,omitempty"`
}
type PolicyV2Observation struct {
// Audit status of the firewall policy
// (must be "true" or "false" if provided - defaults to "false").
// This status is set to "false" whenever the firewall policy or any of its
// rules are changed. Changing this updates the audited status of an existing
// firewall policy.
Audited *bool `json:"audited,omitempty" tf:"audited,omitempty"`
// A description for the firewall policy. Changing
// this updates the description of an existing firewall policy.
Description *string `json:"description,omitempty" tf:"description,omitempty"`
ID *string `json:"id,omitempty" tf:"id,omitempty"`
// A name for the firewall policy. Changing this
// updates the name of an existing firewall policy.
Name *string `json:"name,omitempty" tf:"name,omitempty"`
// - This argument conflicts and is interchangeable
// with tenant_id. The owner of the firewall policy. Required if admin wants
// to create a firewall policy for another project. Changing this creates a new
// firewall policy.
ProjectID *string `json:"projectId,omitempty" tf:"project_id,omitempty"`
// The region in which to obtain the v2 networking client.
// A networking client is needed to create a firewall policy. If omitted, the
// region argument of the provider is used. Changing this creates a new
// firewall policy.
Region *string `json:"region,omitempty" tf:"region,omitempty"`
// An array of one or more firewall rules that comprise
// the policy. Changing this results in adding/removing rules from the
// existing firewall policy.
Rules []*string `json:"rules,omitempty" tf:"rules,omitempty"`
// Sharing status of the firewall policy (must be "true"
// or "false" if provided). If this is "true" the policy is visible to, and
// can be used in, firewalls in other tenants. Changing this updates the
// shared status of an existing firewall policy. Only administrative users
// can specify if the policy should be shared.
Shared *bool `json:"shared,omitempty" tf:"shared,omitempty"`
// - This argument conflicts and is interchangeable
// with project_id. The owner of the firewall policy. Required if admin wants
// to create a firewall policy for another tenant. Changing this creates a new
// firewall policy.
TenantID *string `json:"tenantId,omitempty" tf:"tenant_id,omitempty"`
}
type PolicyV2Parameters struct {
// Audit status of the firewall policy
// (must be "true" or "false" if provided - defaults to "false").
// This status is set to "false" whenever the firewall policy or any of its
// rules are changed. Changing this updates the audited status of an existing
// firewall policy.
// +kubebuilder:validation:Optional
Audited *bool `json:"audited,omitempty" tf:"audited,omitempty"`
// A description for the firewall policy. Changing
// this updates the description of an existing firewall policy.
// +kubebuilder:validation:Optional
Description *string `json:"description,omitempty" tf:"description,omitempty"`
// A name for the firewall policy. Changing this
// updates the name of an existing firewall policy.
// +kubebuilder:validation:Optional
Name *string `json:"name,omitempty" tf:"name,omitempty"`
// - This argument conflicts and is interchangeable
// with tenant_id. The owner of the firewall policy. Required if admin wants
// to create a firewall policy for another project. Changing this creates a new
// firewall policy.
// +kubebuilder:validation:Optional
ProjectID *string `json:"projectId,omitempty" tf:"project_id,omitempty"`
// The region in which to obtain the v2 networking client.
// A networking client is needed to create a firewall policy. If omitted, the
// region argument of the provider is used. Changing this creates a new
// firewall policy.
// +kubebuilder:validation:Optional
Region *string `json:"region,omitempty" tf:"region,omitempty"`
// An array of one or more firewall rules that comprise
// the policy. Changing this results in adding/removing rules from the
// existing firewall policy.
// +kubebuilder:validation:Optional
Rules []*string `json:"rules,omitempty" tf:"rules,omitempty"`
// Sharing status of the firewall policy (must be "true"
// or "false" if provided). If this is "true" the policy is visible to, and
// can be used in, firewalls in other tenants. Changing this updates the
// shared status of an existing firewall policy. Only administrative users
// can specify if the policy should be shared.
// +kubebuilder:validation:Optional
Shared *bool `json:"shared,omitempty" tf:"shared,omitempty"`
// - This argument conflicts and is interchangeable
// with project_id. The owner of the firewall policy. Required if admin wants
// to create a firewall policy for another tenant. Changing this creates a new
// firewall policy.
// +kubebuilder:validation:Optional
TenantID *string `json:"tenantId,omitempty" tf:"tenant_id,omitempty"`
}
// PolicyV2Spec defines the desired state of PolicyV2
type PolicyV2Spec struct {
v1.ResourceSpec `json:",inline"`
ForProvider PolicyV2Parameters `json:"forProvider"`
// THIS IS A BETA FIELD. It will be honored
// unless the Management Policies feature flag is disabled.
// InitProvider holds the same fields as ForProvider, with the exception
// of Identifier and other resource reference fields. The fields that are
// in InitProvider are merged into ForProvider when the resource is created.
// The same fields are also added to the terraform ignore_changes hook, to
// avoid updating them after creation. This is useful for fields that are
// required on creation, but we do not desire to update them after creation,
// for example because of an external controller is managing them, like an
// autoscaler.
InitProvider PolicyV2InitParameters `json:"initProvider,omitempty"`
}
// PolicyV2Status defines the observed state of PolicyV2.
type PolicyV2Status struct {
v1.ResourceStatus `json:",inline"`
AtProvider PolicyV2Observation `json:"atProvider,omitempty"`
}
// +kubebuilder:object:root=true
// PolicyV2 is the Schema for the PolicyV2s API. Manages a v2 firewall policy resource within OpenStack.
// +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status"
// +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status"
// +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name"
// +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp"
// +kubebuilder:subresource:status
// +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,openstack}
type PolicyV2 struct {
metav1.TypeMeta `json:",inline"`
metav1.ObjectMeta `json:"metadata,omitempty"`
Spec PolicyV2Spec `json:"spec"`
Status PolicyV2Status `json:"status,omitempty"`
}
// +kubebuilder:object:root=true
// PolicyV2List contains a list of PolicyV2s
type PolicyV2List struct {
metav1.TypeMeta `json:",inline"`
metav1.ListMeta `json:"metadata,omitempty"`
Items []PolicyV2 `json:"items"`
}
// Repository type metadata.
var (
PolicyV2_Kind = "PolicyV2"
PolicyV2_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: PolicyV2_Kind}.String()
PolicyV2_KindAPIVersion = PolicyV2_Kind + "." + CRDGroupVersion.String()
PolicyV2_GroupVersionKind = CRDGroupVersion.WithKind(PolicyV2_Kind)
)
func init() {
SchemeBuilder.Register(&PolicyV2{}, &PolicyV2List{})
}