generated from crossplane/upjet-provider-template
-
Notifications
You must be signed in to change notification settings - Fork 1
/
zz_secretciphertext_types.go
executable file
·129 lines (102 loc) · 5.67 KB
/
zz_secretciphertext_types.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
// Code generated by upjet. DO NOT EDIT.
package v1alpha1
import (
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime/schema"
v1 "github.com/crossplane/crossplane-runtime/apis/common/v1"
)
type SecretCiphertextInitParameters struct {
// Additional authenticated data (AAD context), optional. If specified, this data will be required for decryption with the SymmetricDecryptRequest
AadContext *string `json:"aadContext,omitempty" tf:"aad_context,omitempty"`
// ID of the symmetric KMS key to use for encryption.
// +crossplane:generate:reference:type=SymmetricKey
KeyID *string `json:"keyId,omitempty" tf:"key_id,omitempty"`
// Reference to a SymmetricKey to populate keyId.
// +kubebuilder:validation:Optional
KeyIDRef *v1.Reference `json:"keyIdRef,omitempty" tf:"-"`
// Selector for a SymmetricKey to populate keyId.
// +kubebuilder:validation:Optional
KeyIDSelector *v1.Selector `json:"keyIdSelector,omitempty" tf:"-"`
}
type SecretCiphertextObservation struct {
// Additional authenticated data (AAD context), optional. If specified, this data will be required for decryption with the SymmetricDecryptRequest
AadContext *string `json:"aadContext,omitempty" tf:"aad_context,omitempty"`
// Resulting ciphertext, encoded with "standard" base64 alphabet as defined in RFC 4648 section 4
Ciphertext *string `json:"ciphertext,omitempty" tf:"ciphertext,omitempty"`
// an identifier for the resource with format {{key_id}}/{{ciphertext}}
ID *string `json:"id,omitempty" tf:"id,omitempty"`
// ID of the symmetric KMS key to use for encryption.
KeyID *string `json:"keyId,omitempty" tf:"key_id,omitempty"`
}
type SecretCiphertextParameters struct {
// Additional authenticated data (AAD context), optional. If specified, this data will be required for decryption with the SymmetricDecryptRequest
// +kubebuilder:validation:Optional
AadContext *string `json:"aadContext,omitempty" tf:"aad_context,omitempty"`
// ID of the symmetric KMS key to use for encryption.
// +crossplane:generate:reference:type=SymmetricKey
// +kubebuilder:validation:Optional
KeyID *string `json:"keyId,omitempty" tf:"key_id,omitempty"`
// Reference to a SymmetricKey to populate keyId.
// +kubebuilder:validation:Optional
KeyIDRef *v1.Reference `json:"keyIdRef,omitempty" tf:"-"`
// Selector for a SymmetricKey to populate keyId.
// +kubebuilder:validation:Optional
KeyIDSelector *v1.Selector `json:"keyIdSelector,omitempty" tf:"-"`
// Plaintext to be encrypted.
// +kubebuilder:validation:Optional
PlaintextSecretRef v1.SecretKeySelector `json:"plaintextSecretRef" tf:"-"`
}
// SecretCiphertextSpec defines the desired state of SecretCiphertext
type SecretCiphertextSpec struct {
v1.ResourceSpec `json:",inline"`
ForProvider SecretCiphertextParameters `json:"forProvider"`
// THIS IS A BETA FIELD. It will be honored
// unless the Management Policies feature flag is disabled.
// InitProvider holds the same fields as ForProvider, with the exception
// of Identifier and other resource reference fields. The fields that are
// in InitProvider are merged into ForProvider when the resource is created.
// The same fields are also added to the terraform ignore_changes hook, to
// avoid updating them after creation. This is useful for fields that are
// required on creation, but we do not desire to update them after creation,
// for example because of an external controller is managing them, like an
// autoscaler.
InitProvider SecretCiphertextInitParameters `json:"initProvider,omitempty"`
}
// SecretCiphertextStatus defines the observed state of SecretCiphertext.
type SecretCiphertextStatus struct {
v1.ResourceStatus `json:",inline"`
AtProvider SecretCiphertextObservation `json:"atProvider,omitempty"`
}
// +kubebuilder:object:root=true
// +kubebuilder:subresource:status
// +kubebuilder:storageversion
// SecretCiphertext is the Schema for the SecretCiphertexts API. Encrypts given plaintext with the specified Yandex KMS key and provides access to the ciphertext.
// +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status"
// +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status"
// +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name"
// +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp"
// +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,yandex-cloud}
type SecretCiphertext struct {
metav1.TypeMeta `json:",inline"`
metav1.ObjectMeta `json:"metadata,omitempty"`
// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.plaintextSecretRef)",message="spec.forProvider.plaintextSecretRef is a required parameter"
Spec SecretCiphertextSpec `json:"spec"`
Status SecretCiphertextStatus `json:"status,omitempty"`
}
// +kubebuilder:object:root=true
// SecretCiphertextList contains a list of SecretCiphertexts
type SecretCiphertextList struct {
metav1.TypeMeta `json:",inline"`
metav1.ListMeta `json:"metadata,omitempty"`
Items []SecretCiphertext `json:"items"`
}
// Repository type metadata.
var (
SecretCiphertext_Kind = "SecretCiphertext"
SecretCiphertext_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: SecretCiphertext_Kind}.String()
SecretCiphertext_KindAPIVersion = SecretCiphertext_Kind + "." + CRDGroupVersion.String()
SecretCiphertext_GroupVersionKind = CRDGroupVersion.WithKind(SecretCiphertext_Kind)
)
func init() {
SchemeBuilder.Register(&SecretCiphertext{}, &SecretCiphertextList{})
}