-
Notifications
You must be signed in to change notification settings - Fork 64
/
zz_sql_setup.go
executable file
·66 lines (61 loc) · 3.69 KB
/
zz_sql_setup.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
// SPDX-FileCopyrightText: 2024 The Crossplane Authors <https://crossplane.io>
//
// SPDX-License-Identifier: Apache-2.0
package controller
import (
ctrl "sigs.k8s.io/controller-runtime"
"github.com/crossplane/upjet/pkg/controller"
mssqldatabase "github.com/upbound/provider-azure/internal/controller/sql/mssqldatabase"
mssqldatabaseextendedauditingpolicy "github.com/upbound/provider-azure/internal/controller/sql/mssqldatabaseextendedauditingpolicy"
mssqldatabasevulnerabilityassessmentrulebaseline "github.com/upbound/provider-azure/internal/controller/sql/mssqldatabasevulnerabilityassessmentrulebaseline"
mssqlelasticpool "github.com/upbound/provider-azure/internal/controller/sql/mssqlelasticpool"
mssqlfailovergroup "github.com/upbound/provider-azure/internal/controller/sql/mssqlfailovergroup"
mssqlfirewallrule "github.com/upbound/provider-azure/internal/controller/sql/mssqlfirewallrule"
mssqljobagent "github.com/upbound/provider-azure/internal/controller/sql/mssqljobagent"
mssqljobcredential "github.com/upbound/provider-azure/internal/controller/sql/mssqljobcredential"
mssqlmanageddatabase "github.com/upbound/provider-azure/internal/controller/sql/mssqlmanageddatabase"
mssqlmanagedinstance "github.com/upbound/provider-azure/internal/controller/sql/mssqlmanagedinstance"
mssqlmanagedinstanceactivedirectoryadministrator "github.com/upbound/provider-azure/internal/controller/sql/mssqlmanagedinstanceactivedirectoryadministrator"
mssqlmanagedinstancefailovergroup "github.com/upbound/provider-azure/internal/controller/sql/mssqlmanagedinstancefailovergroup"
mssqlmanagedinstancevulnerabilityassessment "github.com/upbound/provider-azure/internal/controller/sql/mssqlmanagedinstancevulnerabilityassessment"
mssqloutboundfirewallrule "github.com/upbound/provider-azure/internal/controller/sql/mssqloutboundfirewallrule"
mssqlserver "github.com/upbound/provider-azure/internal/controller/sql/mssqlserver"
mssqlserverdnsalias "github.com/upbound/provider-azure/internal/controller/sql/mssqlserverdnsalias"
mssqlservermicrosoftsupportauditingpolicy "github.com/upbound/provider-azure/internal/controller/sql/mssqlservermicrosoftsupportauditingpolicy"
mssqlserversecurityalertpolicy "github.com/upbound/provider-azure/internal/controller/sql/mssqlserversecurityalertpolicy"
mssqlservertransparentdataencryption "github.com/upbound/provider-azure/internal/controller/sql/mssqlservertransparentdataencryption"
mssqlservervulnerabilityassessment "github.com/upbound/provider-azure/internal/controller/sql/mssqlservervulnerabilityassessment"
mssqlvirtualnetworkrule "github.com/upbound/provider-azure/internal/controller/sql/mssqlvirtualnetworkrule"
)
// Setup_sql creates all controllers with the supplied logger and adds them to
// the supplied manager.
func Setup_sql(mgr ctrl.Manager, o controller.Options) error {
for _, setup := range []func(ctrl.Manager, controller.Options) error{
mssqldatabase.Setup,
mssqldatabaseextendedauditingpolicy.Setup,
mssqldatabasevulnerabilityassessmentrulebaseline.Setup,
mssqlelasticpool.Setup,
mssqlfailovergroup.Setup,
mssqlfirewallrule.Setup,
mssqljobagent.Setup,
mssqljobcredential.Setup,
mssqlmanageddatabase.Setup,
mssqlmanagedinstance.Setup,
mssqlmanagedinstanceactivedirectoryadministrator.Setup,
mssqlmanagedinstancefailovergroup.Setup,
mssqlmanagedinstancevulnerabilityassessment.Setup,
mssqloutboundfirewallrule.Setup,
mssqlserver.Setup,
mssqlserverdnsalias.Setup,
mssqlservermicrosoftsupportauditingpolicy.Setup,
mssqlserversecurityalertpolicy.Setup,
mssqlservertransparentdataencryption.Setup,
mssqlservervulnerabilityassessment.Setup,
mssqlvirtualnetworkrule.Setup,
} {
if err := setup(mgr, o); err != nil {
return err
}
}
return nil
}