-
Notifications
You must be signed in to change notification settings - Fork 113
/
zz_vaultlock_types.go
executable file
·152 lines (119 loc) · 7.54 KB
/
zz_vaultlock_types.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
// SPDX-FileCopyrightText: 2024 The Crossplane Authors <https://crossplane.io>
//
// SPDX-License-Identifier: Apache-2.0
// Code generated by upjet. DO NOT EDIT.
package v1beta1
import (
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime/schema"
v1 "github.com/crossplane/crossplane-runtime/apis/common/v1"
)
type VaultLockInitParameters struct {
// Boolean whether to permanently apply this Glacier Lock Policy. Once completed, this cannot be undone. If set to false, the Glacier Lock Policy remains in a testing mode for 24 hours. Changing this from false to true will show as resource recreation, which is expected. Changing this from true to false is not possible unless the Glacier Vault is recreated at the same time.
CompleteLock *bool `json:"completeLock,omitempty" tf:"complete_lock,omitempty"`
// This should only be used in conjunction with complete_lock being set to true.
IgnoreDeletionError *bool `json:"ignoreDeletionError,omitempty" tf:"ignore_deletion_error,omitempty"`
// JSON string containing the IAM policy to apply as the Glacier Vault Lock policy.
Policy *string `json:"policy,omitempty" tf:"policy,omitempty"`
// The name of the Glacier Vault.
// +crossplane:generate:reference:type=github.com/upbound/provider-aws/apis/glacier/v1beta1.Vault
VaultName *string `json:"vaultName,omitempty" tf:"vault_name,omitempty"`
// Reference to a Vault in glacier to populate vaultName.
// +kubebuilder:validation:Optional
VaultNameRef *v1.Reference `json:"vaultNameRef,omitempty" tf:"-"`
// Selector for a Vault in glacier to populate vaultName.
// +kubebuilder:validation:Optional
VaultNameSelector *v1.Selector `json:"vaultNameSelector,omitempty" tf:"-"`
}
type VaultLockObservation struct {
// Boolean whether to permanently apply this Glacier Lock Policy. Once completed, this cannot be undone. If set to false, the Glacier Lock Policy remains in a testing mode for 24 hours. Changing this from false to true will show as resource recreation, which is expected. Changing this from true to false is not possible unless the Glacier Vault is recreated at the same time.
CompleteLock *bool `json:"completeLock,omitempty" tf:"complete_lock,omitempty"`
// Glacier Vault name.
ID *string `json:"id,omitempty" tf:"id,omitempty"`
// This should only be used in conjunction with complete_lock being set to true.
IgnoreDeletionError *bool `json:"ignoreDeletionError,omitempty" tf:"ignore_deletion_error,omitempty"`
// JSON string containing the IAM policy to apply as the Glacier Vault Lock policy.
Policy *string `json:"policy,omitempty" tf:"policy,omitempty"`
// The name of the Glacier Vault.
VaultName *string `json:"vaultName,omitempty" tf:"vault_name,omitempty"`
}
type VaultLockParameters struct {
// Boolean whether to permanently apply this Glacier Lock Policy. Once completed, this cannot be undone. If set to false, the Glacier Lock Policy remains in a testing mode for 24 hours. Changing this from false to true will show as resource recreation, which is expected. Changing this from true to false is not possible unless the Glacier Vault is recreated at the same time.
// +kubebuilder:validation:Optional
CompleteLock *bool `json:"completeLock,omitempty" tf:"complete_lock,omitempty"`
// This should only be used in conjunction with complete_lock being set to true.
// +kubebuilder:validation:Optional
IgnoreDeletionError *bool `json:"ignoreDeletionError,omitempty" tf:"ignore_deletion_error,omitempty"`
// JSON string containing the IAM policy to apply as the Glacier Vault Lock policy.
// +kubebuilder:validation:Optional
Policy *string `json:"policy,omitempty" tf:"policy,omitempty"`
// Region is the region you'd like your resource to be created in.
// +upjet:crd:field:TFTag=-
// +kubebuilder:validation:Required
Region *string `json:"region" tf:"-"`
// The name of the Glacier Vault.
// +crossplane:generate:reference:type=github.com/upbound/provider-aws/apis/glacier/v1beta1.Vault
// +kubebuilder:validation:Optional
VaultName *string `json:"vaultName,omitempty" tf:"vault_name,omitempty"`
// Reference to a Vault in glacier to populate vaultName.
// +kubebuilder:validation:Optional
VaultNameRef *v1.Reference `json:"vaultNameRef,omitempty" tf:"-"`
// Selector for a Vault in glacier to populate vaultName.
// +kubebuilder:validation:Optional
VaultNameSelector *v1.Selector `json:"vaultNameSelector,omitempty" tf:"-"`
}
// VaultLockSpec defines the desired state of VaultLock
type VaultLockSpec struct {
v1.ResourceSpec `json:",inline"`
ForProvider VaultLockParameters `json:"forProvider"`
// THIS IS A BETA FIELD. It will be honored
// unless the Management Policies feature flag is disabled.
// InitProvider holds the same fields as ForProvider, with the exception
// of Identifier and other resource reference fields. The fields that are
// in InitProvider are merged into ForProvider when the resource is created.
// The same fields are also added to the terraform ignore_changes hook, to
// avoid updating them after creation. This is useful for fields that are
// required on creation, but we do not desire to update them after creation,
// for example because of an external controller is managing them, like an
// autoscaler.
InitProvider VaultLockInitParameters `json:"initProvider,omitempty"`
}
// VaultLockStatus defines the observed state of VaultLock.
type VaultLockStatus struct {
v1.ResourceStatus `json:",inline"`
AtProvider VaultLockObservation `json:"atProvider,omitempty"`
}
// +kubebuilder:object:root=true
// +kubebuilder:subresource:status
// +kubebuilder:storageversion
// VaultLock is the Schema for the VaultLocks API. Manages a Glacier Vault Lock.
// +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status"
// +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status"
// +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name"
// +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp"
// +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,aws}
type VaultLock struct {
metav1.TypeMeta `json:",inline"`
metav1.ObjectMeta `json:"metadata,omitempty"`
// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.completeLock) || (has(self.initProvider) && has(self.initProvider.completeLock))",message="spec.forProvider.completeLock is a required parameter"
// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.policy) || (has(self.initProvider) && has(self.initProvider.policy))",message="spec.forProvider.policy is a required parameter"
Spec VaultLockSpec `json:"spec"`
Status VaultLockStatus `json:"status,omitempty"`
}
// +kubebuilder:object:root=true
// VaultLockList contains a list of VaultLocks
type VaultLockList struct {
metav1.TypeMeta `json:",inline"`
metav1.ListMeta `json:"metadata,omitempty"`
Items []VaultLock `json:"items"`
}
// Repository type metadata.
var (
VaultLock_Kind = "VaultLock"
VaultLock_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: VaultLock_Kind}.String()
VaultLock_KindAPIVersion = VaultLock_Kind + "." + CRDGroupVersion.String()
VaultLock_GroupVersionKind = CRDGroupVersion.WithKind(VaultLock_Kind)
)
func init() {
SchemeBuilder.Register(&VaultLock{}, &VaultLockList{})
}