-
Notifications
You must be signed in to change notification settings - Fork 156
/
a_w_s_cloud_spec.go
186 lines (146 loc) · 5.26 KB
/
a_w_s_cloud_spec.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
// Code generated by go-swagger; DO NOT EDIT.
package models
// This file was generated by the swagger tool.
// Editing this file might prove futile when you re-run the swagger generate command
import (
"context"
"github.com/go-openapi/errors"
"github.com/go-openapi/strfmt"
"github.com/go-openapi/swag"
)
// AWSCloudSpec AWSCloudSpec specifies access data to Amazon Web Services.
//
// swagger:model AWSCloudSpec
type AWSCloudSpec struct {
// access key ID
AccessKeyID string `json:"accessKeyID,omitempty"`
// assume role a r n
AssumeRoleARN string `json:"assumeRoleARN,omitempty"`
// assume role external ID
AssumeRoleExternalID string `json:"assumeRoleExternalID,omitempty"`
// The IAM role, the control plane will use. The control plane will perform an assume-role
ControlPlaneRoleARN string `json:"roleARN,omitempty"`
// DisableIAMReconciling is used to disable reconciliation for IAM related configuration. This is useful in air-gapped
// setups where access to IAM service is not possible.
DisableIAMReconciling bool `json:"disableIAMReconciling,omitempty"`
// instance profile name
InstanceProfileName string `json:"instanceProfileName,omitempty"`
// A CIDR range that will be used to allow access to the node port range in the security group to. Only applies if
// the security group is generated by KKP and not preexisting.
// If NodePortsAllowedIPRange nor NodePortsAllowedIPRanges is set, the node port range can be accessed from anywhere.
NodePortsAllowedIPRange string `json:"nodePortsAllowedIPRange,omitempty"`
// route table ID
RouteTableID string `json:"routeTableID,omitempty"`
// secret access key
SecretAccessKey string `json:"secretAccessKey,omitempty"`
// security group ID
SecurityGroupID string `json:"securityGroupID,omitempty"`
// v p c ID
VPCID string `json:"vpcID,omitempty"`
// credentials reference
CredentialsReference *GlobalSecretKeySelector `json:"credentialsReference,omitempty"`
// node ports allowed IP ranges
NodePortsAllowedIPRanges *NetworkRanges `json:"nodePortsAllowedIPRanges,omitempty"`
}
// Validate validates this a w s cloud spec
func (m *AWSCloudSpec) Validate(formats strfmt.Registry) error {
var res []error
if err := m.validateCredentialsReference(formats); err != nil {
res = append(res, err)
}
if err := m.validateNodePortsAllowedIPRanges(formats); err != nil {
res = append(res, err)
}
if len(res) > 0 {
return errors.CompositeValidationError(res...)
}
return nil
}
func (m *AWSCloudSpec) validateCredentialsReference(formats strfmt.Registry) error {
if swag.IsZero(m.CredentialsReference) { // not required
return nil
}
if m.CredentialsReference != nil {
if err := m.CredentialsReference.Validate(formats); err != nil {
if ve, ok := err.(*errors.Validation); ok {
return ve.ValidateName("credentialsReference")
} else if ce, ok := err.(*errors.CompositeError); ok {
return ce.ValidateName("credentialsReference")
}
return err
}
}
return nil
}
func (m *AWSCloudSpec) validateNodePortsAllowedIPRanges(formats strfmt.Registry) error {
if swag.IsZero(m.NodePortsAllowedIPRanges) { // not required
return nil
}
if m.NodePortsAllowedIPRanges != nil {
if err := m.NodePortsAllowedIPRanges.Validate(formats); err != nil {
if ve, ok := err.(*errors.Validation); ok {
return ve.ValidateName("nodePortsAllowedIPRanges")
} else if ce, ok := err.(*errors.CompositeError); ok {
return ce.ValidateName("nodePortsAllowedIPRanges")
}
return err
}
}
return nil
}
// ContextValidate validate this a w s cloud spec based on the context it is used
func (m *AWSCloudSpec) ContextValidate(ctx context.Context, formats strfmt.Registry) error {
var res []error
if err := m.contextValidateCredentialsReference(ctx, formats); err != nil {
res = append(res, err)
}
if err := m.contextValidateNodePortsAllowedIPRanges(ctx, formats); err != nil {
res = append(res, err)
}
if len(res) > 0 {
return errors.CompositeValidationError(res...)
}
return nil
}
func (m *AWSCloudSpec) contextValidateCredentialsReference(ctx context.Context, formats strfmt.Registry) error {
if m.CredentialsReference != nil {
if err := m.CredentialsReference.ContextValidate(ctx, formats); err != nil {
if ve, ok := err.(*errors.Validation); ok {
return ve.ValidateName("credentialsReference")
} else if ce, ok := err.(*errors.CompositeError); ok {
return ce.ValidateName("credentialsReference")
}
return err
}
}
return nil
}
func (m *AWSCloudSpec) contextValidateNodePortsAllowedIPRanges(ctx context.Context, formats strfmt.Registry) error {
if m.NodePortsAllowedIPRanges != nil {
if err := m.NodePortsAllowedIPRanges.ContextValidate(ctx, formats); err != nil {
if ve, ok := err.(*errors.Validation); ok {
return ve.ValidateName("nodePortsAllowedIPRanges")
} else if ce, ok := err.(*errors.CompositeError); ok {
return ce.ValidateName("nodePortsAllowedIPRanges")
}
return err
}
}
return nil
}
// MarshalBinary interface implementation
func (m *AWSCloudSpec) MarshalBinary() ([]byte, error) {
if m == nil {
return nil, nil
}
return swag.WriteJSON(m)
}
// UnmarshalBinary interface implementation
func (m *AWSCloudSpec) UnmarshalBinary(b []byte) error {
var res AWSCloudSpec
if err := swag.ReadJSON(b, &res); err != nil {
return err
}
*m = res
return nil
}