generated from crossplane/upjet-provider-template
-
Notifications
You must be signed in to change notification settings - Fork 1
/
zz_securitygrouprule_types.go
executable file
·225 lines (170 loc) · 9.66 KB
/
zz_securitygrouprule_types.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
// Code generated by upjet. DO NOT EDIT.
package v1alpha1
import (
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime/schema"
v1 "github.com/crossplane/crossplane-runtime/apis/common/v1"
)
type SecurityGroupRuleInitParameters struct {
// Description of the rule.
Description *string `json:"description,omitempty" tf:"description,omitempty"`
// direction of the rule. Can be ingress (inbound) or egress (outbound).
Direction *string `json:"direction,omitempty" tf:"direction,omitempty"`
// Minimum port number.
FromPort *float64 `json:"fromPort,omitempty" tf:"from_port,omitempty"`
// Labels to assign to this rule.
// +mapType=granular
Labels map[string]*string `json:"labels,omitempty" tf:"labels,omitempty"`
// Port number (if applied to a single port).
Port *float64 `json:"port,omitempty" tf:"port,omitempty"`
// Special-purpose targets such as "self_security_group". See docs for possible options.
PredefinedTarget *string `json:"predefinedTarget,omitempty" tf:"predefined_target,omitempty"`
// One of ANY, TCP, UDP, ICMP, IPV6_ICMP.
Protocol *string `json:"protocol,omitempty" tf:"protocol,omitempty"`
// ID of the security group this rule belongs to.
// +crossplane:generate:reference:type=SecurityGroup
SecurityGroupBinding *string `json:"securityGroupBinding,omitempty" tf:"security_group_binding,omitempty"`
// Reference to a SecurityGroup to populate securityGroupBinding.
// +kubebuilder:validation:Optional
SecurityGroupBindingRef *v1.Reference `json:"securityGroupBindingRef,omitempty" tf:"-"`
// Selector for a SecurityGroup to populate securityGroupBinding.
// +kubebuilder:validation:Optional
SecurityGroupBindingSelector *v1.Selector `json:"securityGroupBindingSelector,omitempty" tf:"-"`
// Target security group ID for this rule.
SecurityGroupID *string `json:"securityGroupId,omitempty" tf:"security_group_id,omitempty"`
// Maximum port number.
ToPort *float64 `json:"toPort,omitempty" tf:"to_port,omitempty"`
// The blocks of IPv4 addresses for this rule.
V4CidrBlocks []*string `json:"v4CidrBlocks,omitempty" tf:"v4_cidr_blocks,omitempty"`
// The blocks of IPv6 addresses for this rule. v6_cidr_blocks argument is currently not supported. It will be available in the future.
V6CidrBlocks []*string `json:"v6CidrBlocks,omitempty" tf:"v6_cidr_blocks,omitempty"`
}
type SecurityGroupRuleObservation struct {
// Description of the rule.
Description *string `json:"description,omitempty" tf:"description,omitempty"`
// direction of the rule. Can be ingress (inbound) or egress (outbound).
Direction *string `json:"direction,omitempty" tf:"direction,omitempty"`
// Minimum port number.
FromPort *float64 `json:"fromPort,omitempty" tf:"from_port,omitempty"`
// Id of the rule.
ID *string `json:"id,omitempty" tf:"id,omitempty"`
// Labels to assign to this rule.
// +mapType=granular
Labels map[string]*string `json:"labels,omitempty" tf:"labels,omitempty"`
// Port number (if applied to a single port).
Port *float64 `json:"port,omitempty" tf:"port,omitempty"`
// Special-purpose targets such as "self_security_group". See docs for possible options.
PredefinedTarget *string `json:"predefinedTarget,omitempty" tf:"predefined_target,omitempty"`
// One of ANY, TCP, UDP, ICMP, IPV6_ICMP.
Protocol *string `json:"protocol,omitempty" tf:"protocol,omitempty"`
// ID of the security group this rule belongs to.
SecurityGroupBinding *string `json:"securityGroupBinding,omitempty" tf:"security_group_binding,omitempty"`
// Target security group ID for this rule.
SecurityGroupID *string `json:"securityGroupId,omitempty" tf:"security_group_id,omitempty"`
// Maximum port number.
ToPort *float64 `json:"toPort,omitempty" tf:"to_port,omitempty"`
// The blocks of IPv4 addresses for this rule.
V4CidrBlocks []*string `json:"v4CidrBlocks,omitempty" tf:"v4_cidr_blocks,omitempty"`
// The blocks of IPv6 addresses for this rule. v6_cidr_blocks argument is currently not supported. It will be available in the future.
V6CidrBlocks []*string `json:"v6CidrBlocks,omitempty" tf:"v6_cidr_blocks,omitempty"`
}
type SecurityGroupRuleParameters struct {
// Description of the rule.
// +kubebuilder:validation:Optional
Description *string `json:"description,omitempty" tf:"description,omitempty"`
// direction of the rule. Can be ingress (inbound) or egress (outbound).
// +kubebuilder:validation:Optional
Direction *string `json:"direction,omitempty" tf:"direction,omitempty"`
// Minimum port number.
// +kubebuilder:validation:Optional
FromPort *float64 `json:"fromPort,omitempty" tf:"from_port,omitempty"`
// Labels to assign to this rule.
// +kubebuilder:validation:Optional
// +mapType=granular
Labels map[string]*string `json:"labels,omitempty" tf:"labels,omitempty"`
// Port number (if applied to a single port).
// +kubebuilder:validation:Optional
Port *float64 `json:"port,omitempty" tf:"port,omitempty"`
// Special-purpose targets such as "self_security_group". See docs for possible options.
// +kubebuilder:validation:Optional
PredefinedTarget *string `json:"predefinedTarget,omitempty" tf:"predefined_target,omitempty"`
// One of ANY, TCP, UDP, ICMP, IPV6_ICMP.
// +kubebuilder:validation:Optional
Protocol *string `json:"protocol,omitempty" tf:"protocol,omitempty"`
// ID of the security group this rule belongs to.
// +crossplane:generate:reference:type=SecurityGroup
// +kubebuilder:validation:Optional
SecurityGroupBinding *string `json:"securityGroupBinding,omitempty" tf:"security_group_binding,omitempty"`
// Reference to a SecurityGroup to populate securityGroupBinding.
// +kubebuilder:validation:Optional
SecurityGroupBindingRef *v1.Reference `json:"securityGroupBindingRef,omitempty" tf:"-"`
// Selector for a SecurityGroup to populate securityGroupBinding.
// +kubebuilder:validation:Optional
SecurityGroupBindingSelector *v1.Selector `json:"securityGroupBindingSelector,omitempty" tf:"-"`
// Target security group ID for this rule.
// +kubebuilder:validation:Optional
SecurityGroupID *string `json:"securityGroupId,omitempty" tf:"security_group_id,omitempty"`
// Maximum port number.
// +kubebuilder:validation:Optional
ToPort *float64 `json:"toPort,omitempty" tf:"to_port,omitempty"`
// The blocks of IPv4 addresses for this rule.
// +kubebuilder:validation:Optional
V4CidrBlocks []*string `json:"v4CidrBlocks,omitempty" tf:"v4_cidr_blocks,omitempty"`
// The blocks of IPv6 addresses for this rule. v6_cidr_blocks argument is currently not supported. It will be available in the future.
// +kubebuilder:validation:Optional
V6CidrBlocks []*string `json:"v6CidrBlocks,omitempty" tf:"v6_cidr_blocks,omitempty"`
}
// SecurityGroupRuleSpec defines the desired state of SecurityGroupRule
type SecurityGroupRuleSpec struct {
v1.ResourceSpec `json:",inline"`
ForProvider SecurityGroupRuleParameters `json:"forProvider"`
// THIS IS A BETA FIELD. It will be honored
// unless the Management Policies feature flag is disabled.
// InitProvider holds the same fields as ForProvider, with the exception
// of Identifier and other resource reference fields. The fields that are
// in InitProvider are merged into ForProvider when the resource is created.
// The same fields are also added to the terraform ignore_changes hook, to
// avoid updating them after creation. This is useful for fields that are
// required on creation, but we do not desire to update them after creation,
// for example because of an external controller is managing them, like an
// autoscaler.
InitProvider SecurityGroupRuleInitParameters `json:"initProvider,omitempty"`
}
// SecurityGroupRuleStatus defines the observed state of SecurityGroupRule.
type SecurityGroupRuleStatus struct {
v1.ResourceStatus `json:",inline"`
AtProvider SecurityGroupRuleObservation `json:"atProvider,omitempty"`
}
// +kubebuilder:object:root=true
// +kubebuilder:subresource:status
// +kubebuilder:storageversion
// SecurityGroupRule is the Schema for the SecurityGroupRules API. Yandex VPC Security Group Rule.
// +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status"
// +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status"
// +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name"
// +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp"
// +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,yandex-cloud}
type SecurityGroupRule struct {
metav1.TypeMeta `json:",inline"`
metav1.ObjectMeta `json:"metadata,omitempty"`
// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.direction) || (has(self.initProvider) && has(self.initProvider.direction))",message="spec.forProvider.direction is a required parameter"
Spec SecurityGroupRuleSpec `json:"spec"`
Status SecurityGroupRuleStatus `json:"status,omitempty"`
}
// +kubebuilder:object:root=true
// SecurityGroupRuleList contains a list of SecurityGroupRules
type SecurityGroupRuleList struct {
metav1.TypeMeta `json:",inline"`
metav1.ListMeta `json:"metadata,omitempty"`
Items []SecurityGroupRule `json:"items"`
}
// Repository type metadata.
var (
SecurityGroupRule_Kind = "SecurityGroupRule"
SecurityGroupRule_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: SecurityGroupRule_Kind}.String()
SecurityGroupRule_KindAPIVersion = SecurityGroupRule_Kind + "." + CRDGroupVersion.String()
SecurityGroupRule_GroupVersionKind = CRDGroupVersion.WithKind(SecurityGroupRule_Kind)
)
func init() {
SchemeBuilder.Register(&SecurityGroupRule{}, &SecurityGroupRuleList{})
}