-
Notifications
You must be signed in to change notification settings - Fork 69
/
zz_key_types.go
executable file
·311 lines (230 loc) · 16 KB
/
zz_key_types.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
// SPDX-FileCopyrightText: 2024 The Crossplane Authors <https://crossplane.io>
//
// SPDX-License-Identifier: Apache-2.0
// Code generated by upjet. DO NOT EDIT.
package v1beta1
import (
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime/schema"
v1 "github.com/crossplane/crossplane-runtime/apis/common/v1"
)
type AutomaticInitParameters struct {
// Rotate automatically at a duration after create as an ISO 8601 duration.
TimeAfterCreation *string `json:"timeAfterCreation,omitempty" tf:"time_after_creation,omitempty"`
// Rotate automatically at a duration before expiry as an ISO 8601 duration.
TimeBeforeExpiry *string `json:"timeBeforeExpiry,omitempty" tf:"time_before_expiry,omitempty"`
}
type AutomaticObservation struct {
// Rotate automatically at a duration after create as an ISO 8601 duration.
TimeAfterCreation *string `json:"timeAfterCreation,omitempty" tf:"time_after_creation,omitempty"`
// Rotate automatically at a duration before expiry as an ISO 8601 duration.
TimeBeforeExpiry *string `json:"timeBeforeExpiry,omitempty" tf:"time_before_expiry,omitempty"`
}
type AutomaticParameters struct {
// Rotate automatically at a duration after create as an ISO 8601 duration.
// +kubebuilder:validation:Optional
TimeAfterCreation *string `json:"timeAfterCreation,omitempty" tf:"time_after_creation,omitempty"`
// Rotate automatically at a duration before expiry as an ISO 8601 duration.
// +kubebuilder:validation:Optional
TimeBeforeExpiry *string `json:"timeBeforeExpiry,omitempty" tf:"time_before_expiry,omitempty"`
}
type KeyInitParameters struct {
// Specifies the curve to use when creating an EC key. Possible values are P-256, P-256K, P-384, and P-521. This field will be required in a future release if key_type is EC or EC-HSM. The API will default to P-256 if nothing is specified. Changing this forces a new resource to be created.
Curve *string `json:"curve,omitempty" tf:"curve,omitempty"`
// Expiration UTC datetime (Y-m-d'T'H:M:S'Z'). When this parameter gets changed on reruns, if newer date is ahead of current date, an update is performed. If the newer date is before the current date, resource will be force created.
ExpirationDate *string `json:"expirationDate,omitempty" tf:"expiration_date,omitempty"`
// A list of JSON web key operations. Possible values include: decrypt, encrypt, sign, unwrapKey, verify and wrapKey. Please note these values are case sensitive.
KeyOpts []*string `json:"keyOpts,omitempty" tf:"key_opts,omitempty"`
// Specifies the Size of the RSA key to create in bytes. For example, 1024 or 2048. Note: This field is required if key_type is RSA or RSA-HSM. Changing this forces a new resource to be created.
KeySize *float64 `json:"keySize,omitempty" tf:"key_size,omitempty"`
// Specifies the Key Type to use for this Key Vault Key. Possible values are EC (Elliptic Curve), EC-HSM, RSA and RSA-HSM. Changing this forces a new resource to be created.
KeyType *string `json:"keyType,omitempty" tf:"key_type,omitempty"`
// The ID of the Key Vault where the Key should be created. Changing this forces a new resource to be created.
// +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/keyvault/v1beta1.Vault
// +crossplane:generate:reference:extractor=github.com/upbound/provider-azure/apis/rconfig.ExtractResourceID()
KeyVaultID *string `json:"keyVaultId,omitempty" tf:"key_vault_id,omitempty"`
// Reference to a Vault in keyvault to populate keyVaultId.
// +kubebuilder:validation:Optional
KeyVaultIDRef *v1.Reference `json:"keyVaultIdRef,omitempty" tf:"-"`
// Selector for a Vault in keyvault to populate keyVaultId.
// +kubebuilder:validation:Optional
KeyVaultIDSelector *v1.Selector `json:"keyVaultIdSelector,omitempty" tf:"-"`
// Specifies the name of the Key Vault Key. Changing this forces a new resource to be created.
Name *string `json:"name,omitempty" tf:"name,omitempty"`
// Key not usable before the provided UTC datetime (Y-m-d'T'H:M:S'Z').
NotBeforeDate *string `json:"notBeforeDate,omitempty" tf:"not_before_date,omitempty"`
// A rotation_policy block as defined below.
RotationPolicy []RotationPolicyInitParameters `json:"rotationPolicy,omitempty" tf:"rotation_policy,omitempty"`
// A mapping of tags to assign to the resource.
// +mapType=granular
Tags map[string]*string `json:"tags,omitempty" tf:"tags,omitempty"`
}
type KeyObservation struct {
// Specifies the curve to use when creating an EC key. Possible values are P-256, P-256K, P-384, and P-521. This field will be required in a future release if key_type is EC or EC-HSM. The API will default to P-256 if nothing is specified. Changing this forces a new resource to be created.
Curve *string `json:"curve,omitempty" tf:"curve,omitempty"`
// The RSA public exponent of this Key Vault Key.
E *string `json:"e,omitempty" tf:"e,omitempty"`
// Expiration UTC datetime (Y-m-d'T'H:M:S'Z'). When this parameter gets changed on reruns, if newer date is ahead of current date, an update is performed. If the newer date is before the current date, resource will be force created.
ExpirationDate *string `json:"expirationDate,omitempty" tf:"expiration_date,omitempty"`
// The Key Vault Key ID.
ID *string `json:"id,omitempty" tf:"id,omitempty"`
// A list of JSON web key operations. Possible values include: decrypt, encrypt, sign, unwrapKey, verify and wrapKey. Please note these values are case sensitive.
KeyOpts []*string `json:"keyOpts,omitempty" tf:"key_opts,omitempty"`
// Specifies the Size of the RSA key to create in bytes. For example, 1024 or 2048. Note: This field is required if key_type is RSA or RSA-HSM. Changing this forces a new resource to be created.
KeySize *float64 `json:"keySize,omitempty" tf:"key_size,omitempty"`
// Specifies the Key Type to use for this Key Vault Key. Possible values are EC (Elliptic Curve), EC-HSM, RSA and RSA-HSM. Changing this forces a new resource to be created.
KeyType *string `json:"keyType,omitempty" tf:"key_type,omitempty"`
// The ID of the Key Vault where the Key should be created. Changing this forces a new resource to be created.
KeyVaultID *string `json:"keyVaultId,omitempty" tf:"key_vault_id,omitempty"`
// The RSA modulus of this Key Vault Key.
N *string `json:"n,omitempty" tf:"n,omitempty"`
// Specifies the name of the Key Vault Key. Changing this forces a new resource to be created.
Name *string `json:"name,omitempty" tf:"name,omitempty"`
// Key not usable before the provided UTC datetime (Y-m-d'T'H:M:S'Z').
NotBeforeDate *string `json:"notBeforeDate,omitempty" tf:"not_before_date,omitempty"`
// The OpenSSH encoded public key of this Key Vault Key.
PublicKeyOpenssh *string `json:"publicKeyOpenssh,omitempty" tf:"public_key_openssh,omitempty"`
// The PEM encoded public key of this Key Vault Key.
PublicKeyPem *string `json:"publicKeyPem,omitempty" tf:"public_key_pem,omitempty"`
// The (Versioned) ID for this Key Vault Key. This property points to a specific version of a Key Vault Key, as such using this won't auto-rotate values if used in other Azure Services.
ResourceID *string `json:"resourceId,omitempty" tf:"resource_id,omitempty"`
// The Versionless ID of the Key Vault Key. This property allows other Azure Services (that support it) to auto-rotate their value when the Key Vault Key is updated.
ResourceVersionlessID *string `json:"resourceVersionlessId,omitempty" tf:"resource_versionless_id,omitempty"`
// A rotation_policy block as defined below.
RotationPolicy []RotationPolicyObservation `json:"rotationPolicy,omitempty" tf:"rotation_policy,omitempty"`
// A mapping of tags to assign to the resource.
// +mapType=granular
Tags map[string]*string `json:"tags,omitempty" tf:"tags,omitempty"`
// The current version of the Key Vault Key.
Version *string `json:"version,omitempty" tf:"version,omitempty"`
// The Base ID of the Key Vault Key.
VersionlessID *string `json:"versionlessId,omitempty" tf:"versionless_id,omitempty"`
// The EC X component of this Key Vault Key.
X *string `json:"x,omitempty" tf:"x,omitempty"`
// The EC Y component of this Key Vault Key.
Y *string `json:"y,omitempty" tf:"y,omitempty"`
}
type KeyParameters struct {
// Specifies the curve to use when creating an EC key. Possible values are P-256, P-256K, P-384, and P-521. This field will be required in a future release if key_type is EC or EC-HSM. The API will default to P-256 if nothing is specified. Changing this forces a new resource to be created.
// +kubebuilder:validation:Optional
Curve *string `json:"curve,omitempty" tf:"curve,omitempty"`
// Expiration UTC datetime (Y-m-d'T'H:M:S'Z'). When this parameter gets changed on reruns, if newer date is ahead of current date, an update is performed. If the newer date is before the current date, resource will be force created.
// +kubebuilder:validation:Optional
ExpirationDate *string `json:"expirationDate,omitempty" tf:"expiration_date,omitempty"`
// A list of JSON web key operations. Possible values include: decrypt, encrypt, sign, unwrapKey, verify and wrapKey. Please note these values are case sensitive.
// +kubebuilder:validation:Optional
KeyOpts []*string `json:"keyOpts,omitempty" tf:"key_opts,omitempty"`
// Specifies the Size of the RSA key to create in bytes. For example, 1024 or 2048. Note: This field is required if key_type is RSA or RSA-HSM. Changing this forces a new resource to be created.
// +kubebuilder:validation:Optional
KeySize *float64 `json:"keySize,omitempty" tf:"key_size,omitempty"`
// Specifies the Key Type to use for this Key Vault Key. Possible values are EC (Elliptic Curve), EC-HSM, RSA and RSA-HSM. Changing this forces a new resource to be created.
// +kubebuilder:validation:Optional
KeyType *string `json:"keyType,omitempty" tf:"key_type,omitempty"`
// The ID of the Key Vault where the Key should be created. Changing this forces a new resource to be created.
// +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/keyvault/v1beta1.Vault
// +crossplane:generate:reference:extractor=github.com/upbound/provider-azure/apis/rconfig.ExtractResourceID()
// +kubebuilder:validation:Optional
KeyVaultID *string `json:"keyVaultId,omitempty" tf:"key_vault_id,omitempty"`
// Reference to a Vault in keyvault to populate keyVaultId.
// +kubebuilder:validation:Optional
KeyVaultIDRef *v1.Reference `json:"keyVaultIdRef,omitempty" tf:"-"`
// Selector for a Vault in keyvault to populate keyVaultId.
// +kubebuilder:validation:Optional
KeyVaultIDSelector *v1.Selector `json:"keyVaultIdSelector,omitempty" tf:"-"`
// Specifies the name of the Key Vault Key. Changing this forces a new resource to be created.
// +kubebuilder:validation:Optional
Name *string `json:"name,omitempty" tf:"name,omitempty"`
// Key not usable before the provided UTC datetime (Y-m-d'T'H:M:S'Z').
// +kubebuilder:validation:Optional
NotBeforeDate *string `json:"notBeforeDate,omitempty" tf:"not_before_date,omitempty"`
// A rotation_policy block as defined below.
// +kubebuilder:validation:Optional
RotationPolicy []RotationPolicyParameters `json:"rotationPolicy,omitempty" tf:"rotation_policy,omitempty"`
// A mapping of tags to assign to the resource.
// +kubebuilder:validation:Optional
// +mapType=granular
Tags map[string]*string `json:"tags,omitempty" tf:"tags,omitempty"`
}
type RotationPolicyInitParameters struct {
// An automatic block as defined below.
Automatic []AutomaticInitParameters `json:"automatic,omitempty" tf:"automatic,omitempty"`
// Expire a Key Vault Key after given duration as an ISO 8601 duration.
ExpireAfter *string `json:"expireAfter,omitempty" tf:"expire_after,omitempty"`
// Notify at a given duration before expiry as an ISO 8601 duration.
NotifyBeforeExpiry *string `json:"notifyBeforeExpiry,omitempty" tf:"notify_before_expiry,omitempty"`
}
type RotationPolicyObservation struct {
// An automatic block as defined below.
Automatic []AutomaticObservation `json:"automatic,omitempty" tf:"automatic,omitempty"`
// Expire a Key Vault Key after given duration as an ISO 8601 duration.
ExpireAfter *string `json:"expireAfter,omitempty" tf:"expire_after,omitempty"`
// Notify at a given duration before expiry as an ISO 8601 duration.
NotifyBeforeExpiry *string `json:"notifyBeforeExpiry,omitempty" tf:"notify_before_expiry,omitempty"`
}
type RotationPolicyParameters struct {
// An automatic block as defined below.
// +kubebuilder:validation:Optional
Automatic []AutomaticParameters `json:"automatic,omitempty" tf:"automatic,omitempty"`
// Expire a Key Vault Key after given duration as an ISO 8601 duration.
// +kubebuilder:validation:Optional
ExpireAfter *string `json:"expireAfter,omitempty" tf:"expire_after,omitempty"`
// Notify at a given duration before expiry as an ISO 8601 duration.
// +kubebuilder:validation:Optional
NotifyBeforeExpiry *string `json:"notifyBeforeExpiry,omitempty" tf:"notify_before_expiry,omitempty"`
}
// KeySpec defines the desired state of Key
type KeySpec struct {
v1.ResourceSpec `json:",inline"`
ForProvider KeyParameters `json:"forProvider"`
// THIS IS A BETA FIELD. It will be honored
// unless the Management Policies feature flag is disabled.
// InitProvider holds the same fields as ForProvider, with the exception
// of Identifier and other resource reference fields. The fields that are
// in InitProvider are merged into ForProvider when the resource is created.
// The same fields are also added to the terraform ignore_changes hook, to
// avoid updating them after creation. This is useful for fields that are
// required on creation, but we do not desire to update them after creation,
// for example because of an external controller is managing them, like an
// autoscaler.
InitProvider KeyInitParameters `json:"initProvider,omitempty"`
}
// KeyStatus defines the observed state of Key.
type KeyStatus struct {
v1.ResourceStatus `json:",inline"`
AtProvider KeyObservation `json:"atProvider,omitempty"`
}
// +kubebuilder:object:root=true
// +kubebuilder:subresource:status
// +kubebuilder:storageversion
// Key is the Schema for the Keys API. Manages a Key Vault Key.
// +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status"
// +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status"
// +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name"
// +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp"
// +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,azure}
type Key struct {
metav1.TypeMeta `json:",inline"`
metav1.ObjectMeta `json:"metadata,omitempty"`
// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.keyOpts) || (has(self.initProvider) && has(self.initProvider.keyOpts))",message="spec.forProvider.keyOpts is a required parameter"
// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.keyType) || (has(self.initProvider) && has(self.initProvider.keyType))",message="spec.forProvider.keyType is a required parameter"
// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.name) || (has(self.initProvider) && has(self.initProvider.name))",message="spec.forProvider.name is a required parameter"
Spec KeySpec `json:"spec"`
Status KeyStatus `json:"status,omitempty"`
}
// +kubebuilder:object:root=true
// KeyList contains a list of Keys
type KeyList struct {
metav1.TypeMeta `json:",inline"`
metav1.ListMeta `json:"metadata,omitempty"`
Items []Key `json:"items"`
}
// Repository type metadata.
var (
Key_Kind = "Key"
Key_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: Key_Kind}.String()
Key_KindAPIVersion = Key_Kind + "." + CRDGroupVersion.String()
Key_GroupVersionKind = CRDGroupVersion.WithKind(Key_Kind)
)
func init() {
SchemeBuilder.Register(&Key{}, &KeyList{})
}