-
Notifications
You must be signed in to change notification settings - Fork 117
/
zz_securitygroupingressrule_types.go
executable file
·259 lines (197 loc) · 12.2 KB
/
zz_securitygroupingressrule_types.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
// SPDX-FileCopyrightText: 2024 The Crossplane Authors <https://crossplane.io>
//
// SPDX-License-Identifier: Apache-2.0
// Code generated by upjet. DO NOT EDIT.
package v1beta1
import (
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime/schema"
v1 "github.com/crossplane/crossplane-runtime/apis/common/v1"
)
type SecurityGroupIngressRuleInitParameters struct {
// The source IPv4 CIDR range.
CidrIPv4 *string `json:"cidrIpv4,omitempty" tf:"cidr_ipv4,omitempty"`
// The source IPv6 CIDR range.
CidrIPv6 *string `json:"cidrIpv6,omitempty" tf:"cidr_ipv6,omitempty"`
// The security group rule description.
Description *string `json:"description,omitempty" tf:"description,omitempty"`
// The start of port range for the TCP and UDP protocols, or an ICMP/ICMPv6 type.
FromPort *float64 `json:"fromPort,omitempty" tf:"from_port,omitempty"`
// The IP protocol name or number. Use -1 to specify all protocols. Note that if ip_protocol is set to -1, it translates to all protocols, all port ranges, and from_port and to_port values should not be defined.
IPProtocol *string `json:"ipProtocol,omitempty" tf:"ip_protocol,omitempty"`
// The ID of the source prefix list.
// +crossplane:generate:reference:type=github.com/upbound/provider-aws/apis/ec2/v1beta1.ManagedPrefixList
PrefixListID *string `json:"prefixListId,omitempty" tf:"prefix_list_id,omitempty"`
// Reference to a ManagedPrefixList in ec2 to populate prefixListId.
// +kubebuilder:validation:Optional
PrefixListIDRef *v1.Reference `json:"prefixListIdRef,omitempty" tf:"-"`
// Selector for a ManagedPrefixList in ec2 to populate prefixListId.
// +kubebuilder:validation:Optional
PrefixListIDSelector *v1.Selector `json:"prefixListIdSelector,omitempty" tf:"-"`
// The source security group that is referenced in the rule.
// +crossplane:generate:reference:type=github.com/upbound/provider-aws/apis/ec2/v1beta1.SecurityGroup
ReferencedSecurityGroupID *string `json:"referencedSecurityGroupId,omitempty" tf:"referenced_security_group_id,omitempty"`
// Reference to a SecurityGroup in ec2 to populate referencedSecurityGroupId.
// +kubebuilder:validation:Optional
ReferencedSecurityGroupIDRef *v1.Reference `json:"referencedSecurityGroupIdRef,omitempty" tf:"-"`
// Selector for a SecurityGroup in ec2 to populate referencedSecurityGroupId.
// +kubebuilder:validation:Optional
ReferencedSecurityGroupIDSelector *v1.Selector `json:"referencedSecurityGroupIdSelector,omitempty" tf:"-"`
// The ID of the security group.
// +crossplane:generate:reference:type=github.com/upbound/provider-aws/apis/ec2/v1beta1.SecurityGroup
SecurityGroupID *string `json:"securityGroupId,omitempty" tf:"security_group_id,omitempty"`
// Reference to a SecurityGroup in ec2 to populate securityGroupId.
// +kubebuilder:validation:Optional
SecurityGroupIDRef *v1.Reference `json:"securityGroupIdRef,omitempty" tf:"-"`
// Selector for a SecurityGroup in ec2 to populate securityGroupId.
// +kubebuilder:validation:Optional
SecurityGroupIDSelector *v1.Selector `json:"securityGroupIdSelector,omitempty" tf:"-"`
// Key-value map of resource tags.
// +mapType=granular
Tags map[string]*string `json:"tags,omitempty" tf:"tags,omitempty"`
// The end of port range for the TCP and UDP protocols, or an ICMP/ICMPv6 code.
ToPort *float64 `json:"toPort,omitempty" tf:"to_port,omitempty"`
}
type SecurityGroupIngressRuleObservation struct {
// The Amazon Resource Name (ARN) of the security group rule.
Arn *string `json:"arn,omitempty" tf:"arn,omitempty"`
// The source IPv4 CIDR range.
CidrIPv4 *string `json:"cidrIpv4,omitempty" tf:"cidr_ipv4,omitempty"`
// The source IPv6 CIDR range.
CidrIPv6 *string `json:"cidrIpv6,omitempty" tf:"cidr_ipv6,omitempty"`
// The security group rule description.
Description *string `json:"description,omitempty" tf:"description,omitempty"`
// The start of port range for the TCP and UDP protocols, or an ICMP/ICMPv6 type.
FromPort *float64 `json:"fromPort,omitempty" tf:"from_port,omitempty"`
ID *string `json:"id,omitempty" tf:"id,omitempty"`
// The IP protocol name or number. Use -1 to specify all protocols. Note that if ip_protocol is set to -1, it translates to all protocols, all port ranges, and from_port and to_port values should not be defined.
IPProtocol *string `json:"ipProtocol,omitempty" tf:"ip_protocol,omitempty"`
// The ID of the source prefix list.
PrefixListID *string `json:"prefixListId,omitempty" tf:"prefix_list_id,omitempty"`
// The source security group that is referenced in the rule.
ReferencedSecurityGroupID *string `json:"referencedSecurityGroupId,omitempty" tf:"referenced_security_group_id,omitempty"`
// The ID of the security group.
SecurityGroupID *string `json:"securityGroupId,omitempty" tf:"security_group_id,omitempty"`
// The ID of the security group rule.
SecurityGroupRuleID *string `json:"securityGroupRuleId,omitempty" tf:"security_group_rule_id,omitempty"`
// Key-value map of resource tags.
// +mapType=granular
Tags map[string]*string `json:"tags,omitempty" tf:"tags,omitempty"`
// A map of tags assigned to the resource, including those inherited from the provider default_tags configuration block.
// +mapType=granular
TagsAll map[string]*string `json:"tagsAll,omitempty" tf:"tags_all,omitempty"`
// The end of port range for the TCP and UDP protocols, or an ICMP/ICMPv6 code.
ToPort *float64 `json:"toPort,omitempty" tf:"to_port,omitempty"`
}
type SecurityGroupIngressRuleParameters struct {
// The source IPv4 CIDR range.
// +kubebuilder:validation:Optional
CidrIPv4 *string `json:"cidrIpv4,omitempty" tf:"cidr_ipv4,omitempty"`
// The source IPv6 CIDR range.
// +kubebuilder:validation:Optional
CidrIPv6 *string `json:"cidrIpv6,omitempty" tf:"cidr_ipv6,omitempty"`
// The security group rule description.
// +kubebuilder:validation:Optional
Description *string `json:"description,omitempty" tf:"description,omitempty"`
// The start of port range for the TCP and UDP protocols, or an ICMP/ICMPv6 type.
// +kubebuilder:validation:Optional
FromPort *float64 `json:"fromPort,omitempty" tf:"from_port,omitempty"`
// The IP protocol name or number. Use -1 to specify all protocols. Note that if ip_protocol is set to -1, it translates to all protocols, all port ranges, and from_port and to_port values should not be defined.
// +kubebuilder:validation:Optional
IPProtocol *string `json:"ipProtocol,omitempty" tf:"ip_protocol,omitempty"`
// The ID of the source prefix list.
// +crossplane:generate:reference:type=github.com/upbound/provider-aws/apis/ec2/v1beta1.ManagedPrefixList
// +kubebuilder:validation:Optional
PrefixListID *string `json:"prefixListId,omitempty" tf:"prefix_list_id,omitempty"`
// Reference to a ManagedPrefixList in ec2 to populate prefixListId.
// +kubebuilder:validation:Optional
PrefixListIDRef *v1.Reference `json:"prefixListIdRef,omitempty" tf:"-"`
// Selector for a ManagedPrefixList in ec2 to populate prefixListId.
// +kubebuilder:validation:Optional
PrefixListIDSelector *v1.Selector `json:"prefixListIdSelector,omitempty" tf:"-"`
// The source security group that is referenced in the rule.
// +crossplane:generate:reference:type=github.com/upbound/provider-aws/apis/ec2/v1beta1.SecurityGroup
// +kubebuilder:validation:Optional
ReferencedSecurityGroupID *string `json:"referencedSecurityGroupId,omitempty" tf:"referenced_security_group_id,omitempty"`
// Reference to a SecurityGroup in ec2 to populate referencedSecurityGroupId.
// +kubebuilder:validation:Optional
ReferencedSecurityGroupIDRef *v1.Reference `json:"referencedSecurityGroupIdRef,omitempty" tf:"-"`
// Selector for a SecurityGroup in ec2 to populate referencedSecurityGroupId.
// +kubebuilder:validation:Optional
ReferencedSecurityGroupIDSelector *v1.Selector `json:"referencedSecurityGroupIdSelector,omitempty" tf:"-"`
// Region is the region you'd like your resource to be created in.
// +upjet:crd:field:TFTag=-
// +kubebuilder:validation:Required
Region *string `json:"region" tf:"-"`
// The ID of the security group.
// +crossplane:generate:reference:type=github.com/upbound/provider-aws/apis/ec2/v1beta1.SecurityGroup
// +kubebuilder:validation:Optional
SecurityGroupID *string `json:"securityGroupId,omitempty" tf:"security_group_id,omitempty"`
// Reference to a SecurityGroup in ec2 to populate securityGroupId.
// +kubebuilder:validation:Optional
SecurityGroupIDRef *v1.Reference `json:"securityGroupIdRef,omitempty" tf:"-"`
// Selector for a SecurityGroup in ec2 to populate securityGroupId.
// +kubebuilder:validation:Optional
SecurityGroupIDSelector *v1.Selector `json:"securityGroupIdSelector,omitempty" tf:"-"`
// Key-value map of resource tags.
// +kubebuilder:validation:Optional
// +mapType=granular
Tags map[string]*string `json:"tags,omitempty" tf:"tags,omitempty"`
// The end of port range for the TCP and UDP protocols, or an ICMP/ICMPv6 code.
// +kubebuilder:validation:Optional
ToPort *float64 `json:"toPort,omitempty" tf:"to_port,omitempty"`
}
// SecurityGroupIngressRuleSpec defines the desired state of SecurityGroupIngressRule
type SecurityGroupIngressRuleSpec struct {
v1.ResourceSpec `json:",inline"`
ForProvider SecurityGroupIngressRuleParameters `json:"forProvider"`
// THIS IS A BETA FIELD. It will be honored
// unless the Management Policies feature flag is disabled.
// InitProvider holds the same fields as ForProvider, with the exception
// of Identifier and other resource reference fields. The fields that are
// in InitProvider are merged into ForProvider when the resource is created.
// The same fields are also added to the terraform ignore_changes hook, to
// avoid updating them after creation. This is useful for fields that are
// required on creation, but we do not desire to update them after creation,
// for example because of an external controller is managing them, like an
// autoscaler.
InitProvider SecurityGroupIngressRuleInitParameters `json:"initProvider,omitempty"`
}
// SecurityGroupIngressRuleStatus defines the observed state of SecurityGroupIngressRule.
type SecurityGroupIngressRuleStatus struct {
v1.ResourceStatus `json:",inline"`
AtProvider SecurityGroupIngressRuleObservation `json:"atProvider,omitempty"`
}
// +kubebuilder:object:root=true
// +kubebuilder:subresource:status
// +kubebuilder:storageversion
// SecurityGroupIngressRule is the Schema for the SecurityGroupIngressRules API. Provides a VPC security group ingress rule resource.
// +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status"
// +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status"
// +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name"
// +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp"
// +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,aws}
type SecurityGroupIngressRule struct {
metav1.TypeMeta `json:",inline"`
metav1.ObjectMeta `json:"metadata,omitempty"`
// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.ipProtocol) || (has(self.initProvider) && has(self.initProvider.ipProtocol))",message="spec.forProvider.ipProtocol is a required parameter"
Spec SecurityGroupIngressRuleSpec `json:"spec"`
Status SecurityGroupIngressRuleStatus `json:"status,omitempty"`
}
// +kubebuilder:object:root=true
// SecurityGroupIngressRuleList contains a list of SecurityGroupIngressRules
type SecurityGroupIngressRuleList struct {
metav1.TypeMeta `json:",inline"`
metav1.ListMeta `json:"metadata,omitempty"`
Items []SecurityGroupIngressRule `json:"items"`
}
// Repository type metadata.
var (
SecurityGroupIngressRule_Kind = "SecurityGroupIngressRule"
SecurityGroupIngressRule_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: SecurityGroupIngressRule_Kind}.String()
SecurityGroupIngressRule_KindAPIVersion = SecurityGroupIngressRule_Kind + "." + CRDGroupVersion.String()
SecurityGroupIngressRule_GroupVersionKind = CRDGroupVersion.WithKind(SecurityGroupIngressRule_Kind)
)
func init() {
SchemeBuilder.Register(&SecurityGroupIngressRule{}, &SecurityGroupIngressRuleList{})
}