-
Notifications
You must be signed in to change notification settings - Fork 113
/
zz_sqlinjectionmatchset_types.go
executable file
·195 lines (154 loc) · 8.94 KB
/
zz_sqlinjectionmatchset_types.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
// SPDX-FileCopyrightText: 2024 The Crossplane Authors <https://crossplane.io>
//
// SPDX-License-Identifier: Apache-2.0
// Code generated by upjet. DO NOT EDIT.
package v1beta1
import (
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime/schema"
v1 "github.com/crossplane/crossplane-runtime/apis/common/v1"
)
type SQLInjectionMatchSetInitParameters struct {
// The name or description of the SQL Injection Match Set.
Name *string `json:"name,omitempty" tf:"name,omitempty"`
// The parts of web requests that you want AWS WAF to inspect for malicious SQL code and, if you want AWS WAF to inspect a header, the name of the header.
SQLInjectionMatchTuples []SQLInjectionMatchTuplesInitParameters `json:"sqlInjectionMatchTuples,omitempty" tf:"sql_injection_match_tuples,omitempty"`
}
type SQLInjectionMatchSetObservation struct {
// The ID of the WAF SQL Injection Match Set.
ID *string `json:"id,omitempty" tf:"id,omitempty"`
// The name or description of the SQL Injection Match Set.
Name *string `json:"name,omitempty" tf:"name,omitempty"`
// The parts of web requests that you want AWS WAF to inspect for malicious SQL code and, if you want AWS WAF to inspect a header, the name of the header.
SQLInjectionMatchTuples []SQLInjectionMatchTuplesObservation `json:"sqlInjectionMatchTuples,omitempty" tf:"sql_injection_match_tuples,omitempty"`
}
type SQLInjectionMatchSetParameters struct {
// The name or description of the SQL Injection Match Set.
// +kubebuilder:validation:Optional
Name *string `json:"name,omitempty" tf:"name,omitempty"`
// Region is the region you'd like your resource to be created in.
// +upjet:crd:field:TFTag=-
// +kubebuilder:validation:Required
Region *string `json:"region" tf:"-"`
// The parts of web requests that you want AWS WAF to inspect for malicious SQL code and, if you want AWS WAF to inspect a header, the name of the header.
// +kubebuilder:validation:Optional
SQLInjectionMatchTuples []SQLInjectionMatchTuplesParameters `json:"sqlInjectionMatchTuples,omitempty" tf:"sql_injection_match_tuples,omitempty"`
}
type SQLInjectionMatchTuplesFieldToMatchInitParameters struct {
// When type is HEADER, enter the name of the header that you want to search, e.g., User-Agent or Referer.
// If type is any other value, omit this field.
Data *string `json:"data,omitempty" tf:"data,omitempty"`
// The part of the web request that you want AWS WAF to search for a specified string.
// e.g., HEADER, METHOD or BODY.
// See docs
// for all supported values.
Type *string `json:"type,omitempty" tf:"type,omitempty"`
}
type SQLInjectionMatchTuplesFieldToMatchObservation struct {
// When type is HEADER, enter the name of the header that you want to search, e.g., User-Agent or Referer.
// If type is any other value, omit this field.
Data *string `json:"data,omitempty" tf:"data,omitempty"`
// The part of the web request that you want AWS WAF to search for a specified string.
// e.g., HEADER, METHOD or BODY.
// See docs
// for all supported values.
Type *string `json:"type,omitempty" tf:"type,omitempty"`
}
type SQLInjectionMatchTuplesFieldToMatchParameters struct {
// When type is HEADER, enter the name of the header that you want to search, e.g., User-Agent or Referer.
// If type is any other value, omit this field.
// +kubebuilder:validation:Optional
Data *string `json:"data,omitempty" tf:"data,omitempty"`
// The part of the web request that you want AWS WAF to search for a specified string.
// e.g., HEADER, METHOD or BODY.
// See docs
// for all supported values.
// +kubebuilder:validation:Optional
Type *string `json:"type" tf:"type,omitempty"`
}
type SQLInjectionMatchTuplesInitParameters struct {
// Specifies where in a web request to look for snippets of malicious SQL code.
FieldToMatch []SQLInjectionMatchTuplesFieldToMatchInitParameters `json:"fieldToMatch,omitempty" tf:"field_to_match,omitempty"`
// Text transformations used to eliminate unusual formatting that attackers use in web requests in an effort to bypass AWS WAF.
// If you specify a transformation, AWS WAF performs the transformation on field_to_match before inspecting a request for a match.
// e.g., CMD_LINE, HTML_ENTITY_DECODE or NONE.
// See docs
// for all supported values.
TextTransformation *string `json:"textTransformation,omitempty" tf:"text_transformation,omitempty"`
}
type SQLInjectionMatchTuplesObservation struct {
// Specifies where in a web request to look for snippets of malicious SQL code.
FieldToMatch []SQLInjectionMatchTuplesFieldToMatchObservation `json:"fieldToMatch,omitempty" tf:"field_to_match,omitempty"`
// Text transformations used to eliminate unusual formatting that attackers use in web requests in an effort to bypass AWS WAF.
// If you specify a transformation, AWS WAF performs the transformation on field_to_match before inspecting a request for a match.
// e.g., CMD_LINE, HTML_ENTITY_DECODE or NONE.
// See docs
// for all supported values.
TextTransformation *string `json:"textTransformation,omitempty" tf:"text_transformation,omitempty"`
}
type SQLInjectionMatchTuplesParameters struct {
// Specifies where in a web request to look for snippets of malicious SQL code.
// +kubebuilder:validation:Optional
FieldToMatch []SQLInjectionMatchTuplesFieldToMatchParameters `json:"fieldToMatch" tf:"field_to_match,omitempty"`
// Text transformations used to eliminate unusual formatting that attackers use in web requests in an effort to bypass AWS WAF.
// If you specify a transformation, AWS WAF performs the transformation on field_to_match before inspecting a request for a match.
// e.g., CMD_LINE, HTML_ENTITY_DECODE or NONE.
// See docs
// for all supported values.
// +kubebuilder:validation:Optional
TextTransformation *string `json:"textTransformation" tf:"text_transformation,omitempty"`
}
// SQLInjectionMatchSetSpec defines the desired state of SQLInjectionMatchSet
type SQLInjectionMatchSetSpec struct {
v1.ResourceSpec `json:",inline"`
ForProvider SQLInjectionMatchSetParameters `json:"forProvider"`
// THIS IS A BETA FIELD. It will be honored
// unless the Management Policies feature flag is disabled.
// InitProvider holds the same fields as ForProvider, with the exception
// of Identifier and other resource reference fields. The fields that are
// in InitProvider are merged into ForProvider when the resource is created.
// The same fields are also added to the terraform ignore_changes hook, to
// avoid updating them after creation. This is useful for fields that are
// required on creation, but we do not desire to update them after creation,
// for example because of an external controller is managing them, like an
// autoscaler.
InitProvider SQLInjectionMatchSetInitParameters `json:"initProvider,omitempty"`
}
// SQLInjectionMatchSetStatus defines the observed state of SQLInjectionMatchSet.
type SQLInjectionMatchSetStatus struct {
v1.ResourceStatus `json:",inline"`
AtProvider SQLInjectionMatchSetObservation `json:"atProvider,omitempty"`
}
// +kubebuilder:object:root=true
// +kubebuilder:subresource:status
// +kubebuilder:storageversion
// SQLInjectionMatchSet is the Schema for the SQLInjectionMatchSets API. Provides a AWS WAF SQL Injection Match Set resource.
// +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status"
// +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status"
// +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name"
// +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp"
// +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,aws}
type SQLInjectionMatchSet struct {
metav1.TypeMeta `json:",inline"`
metav1.ObjectMeta `json:"metadata,omitempty"`
// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.name) || (has(self.initProvider) && has(self.initProvider.name))",message="spec.forProvider.name is a required parameter"
Spec SQLInjectionMatchSetSpec `json:"spec"`
Status SQLInjectionMatchSetStatus `json:"status,omitempty"`
}
// +kubebuilder:object:root=true
// SQLInjectionMatchSetList contains a list of SQLInjectionMatchSets
type SQLInjectionMatchSetList struct {
metav1.TypeMeta `json:",inline"`
metav1.ListMeta `json:"metadata,omitempty"`
Items []SQLInjectionMatchSet `json:"items"`
}
// Repository type metadata.
var (
SQLInjectionMatchSet_Kind = "SQLInjectionMatchSet"
SQLInjectionMatchSet_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: SQLInjectionMatchSet_Kind}.String()
SQLInjectionMatchSet_KindAPIVersion = SQLInjectionMatchSet_Kind + "." + CRDGroupVersion.String()
SQLInjectionMatchSet_GroupVersionKind = CRDGroupVersion.WithKind(SQLInjectionMatchSet_Kind)
)
func init() {
SchemeBuilder.Register(&SQLInjectionMatchSet{}, &SQLInjectionMatchSetList{})
}