-
Notifications
You must be signed in to change notification settings - Fork 69
/
zz_mssqlservermicrosoftsupportauditingpolicy_types.go
executable file
·168 lines (131 loc) · 9.27 KB
/
zz_mssqlservermicrosoftsupportauditingpolicy_types.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
// SPDX-FileCopyrightText: 2024 The Crossplane Authors <https://crossplane.io>
//
// SPDX-License-Identifier: Apache-2.0
// Code generated by upjet. DO NOT EDIT.
package v1beta1
import (
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime/schema"
v1 "github.com/crossplane/crossplane-runtime/apis/common/v1"
)
type MSSQLServerMicrosoftSupportAuditingPolicyInitParameters struct {
// The blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all Microsoft support auditing logs.
// +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta2.Account
// +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractParamPath("primary_blob_endpoint",true)
BlobStorageEndpoint *string `json:"blobStorageEndpoint,omitempty" tf:"blob_storage_endpoint,omitempty"`
// Reference to a Account in storage to populate blobStorageEndpoint.
// +kubebuilder:validation:Optional
BlobStorageEndpointRef *v1.Reference `json:"blobStorageEndpointRef,omitempty" tf:"-"`
// Selector for a Account in storage to populate blobStorageEndpoint.
// +kubebuilder:validation:Optional
BlobStorageEndpointSelector *v1.Selector `json:"blobStorageEndpointSelector,omitempty" tf:"-"`
// Whether to enable the extended auditing policy. Possible values are true and false. Defaults to true.
Enabled *bool `json:"enabled,omitempty" tf:"enabled,omitempty"`
// Enable audit events to Azure Monitor? To enable server audit events to Azure Monitor, please enable its main database audit events to Azure Monitor. Defaults to true.
LogMonitoringEnabled *bool `json:"logMonitoringEnabled,omitempty" tf:"log_monitoring_enabled,omitempty"`
// The access key to use for the auditing storage account.
StorageAccountAccessKeySecretRef *v1.SecretKeySelector `json:"storageAccountAccessKeySecretRef,omitempty" tf:"-"`
// The ID of the Subscription containing the Storage Account.
StorageAccountSubscriptionIDSecretRef *v1.SecretKeySelector `json:"storageAccountSubscriptionIdSecretRef,omitempty" tf:"-"`
}
type MSSQLServerMicrosoftSupportAuditingPolicyObservation struct {
// The blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all Microsoft support auditing logs.
BlobStorageEndpoint *string `json:"blobStorageEndpoint,omitempty" tf:"blob_storage_endpoint,omitempty"`
// Whether to enable the extended auditing policy. Possible values are true and false. Defaults to true.
Enabled *bool `json:"enabled,omitempty" tf:"enabled,omitempty"`
// The ID of the MS SQL Server Microsoft Support Auditing Policy.
ID *string `json:"id,omitempty" tf:"id,omitempty"`
// Enable audit events to Azure Monitor? To enable server audit events to Azure Monitor, please enable its main database audit events to Azure Monitor. Defaults to true.
LogMonitoringEnabled *bool `json:"logMonitoringEnabled,omitempty" tf:"log_monitoring_enabled,omitempty"`
// The ID of the SQL Server to set the extended auditing policy. Changing this forces a new resource to be created.
ServerID *string `json:"serverId,omitempty" tf:"server_id,omitempty"`
}
type MSSQLServerMicrosoftSupportAuditingPolicyParameters struct {
// The blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all Microsoft support auditing logs.
// +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta2.Account
// +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractParamPath("primary_blob_endpoint",true)
// +kubebuilder:validation:Optional
BlobStorageEndpoint *string `json:"blobStorageEndpoint,omitempty" tf:"blob_storage_endpoint,omitempty"`
// Reference to a Account in storage to populate blobStorageEndpoint.
// +kubebuilder:validation:Optional
BlobStorageEndpointRef *v1.Reference `json:"blobStorageEndpointRef,omitempty" tf:"-"`
// Selector for a Account in storage to populate blobStorageEndpoint.
// +kubebuilder:validation:Optional
BlobStorageEndpointSelector *v1.Selector `json:"blobStorageEndpointSelector,omitempty" tf:"-"`
// Whether to enable the extended auditing policy. Possible values are true and false. Defaults to true.
// +kubebuilder:validation:Optional
Enabled *bool `json:"enabled,omitempty" tf:"enabled,omitempty"`
// Enable audit events to Azure Monitor? To enable server audit events to Azure Monitor, please enable its main database audit events to Azure Monitor. Defaults to true.
// +kubebuilder:validation:Optional
LogMonitoringEnabled *bool `json:"logMonitoringEnabled,omitempty" tf:"log_monitoring_enabled,omitempty"`
// The ID of the SQL Server to set the extended auditing policy. Changing this forces a new resource to be created.
// +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/sql/v1beta2.MSSQLServer
// +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractResourceID()
// +kubebuilder:validation:Optional
ServerID *string `json:"serverId,omitempty" tf:"server_id,omitempty"`
// Reference to a MSSQLServer in sql to populate serverId.
// +kubebuilder:validation:Optional
ServerIDRef *v1.Reference `json:"serverIdRef,omitempty" tf:"-"`
// Selector for a MSSQLServer in sql to populate serverId.
// +kubebuilder:validation:Optional
ServerIDSelector *v1.Selector `json:"serverIdSelector,omitempty" tf:"-"`
// The access key to use for the auditing storage account.
// +kubebuilder:validation:Optional
StorageAccountAccessKeySecretRef *v1.SecretKeySelector `json:"storageAccountAccessKeySecretRef,omitempty" tf:"-"`
// The ID of the Subscription containing the Storage Account.
// +kubebuilder:validation:Optional
StorageAccountSubscriptionIDSecretRef *v1.SecretKeySelector `json:"storageAccountSubscriptionIdSecretRef,omitempty" tf:"-"`
}
// MSSQLServerMicrosoftSupportAuditingPolicySpec defines the desired state of MSSQLServerMicrosoftSupportAuditingPolicy
type MSSQLServerMicrosoftSupportAuditingPolicySpec struct {
v1.ResourceSpec `json:",inline"`
ForProvider MSSQLServerMicrosoftSupportAuditingPolicyParameters `json:"forProvider"`
// THIS IS A BETA FIELD. It will be honored
// unless the Management Policies feature flag is disabled.
// InitProvider holds the same fields as ForProvider, with the exception
// of Identifier and other resource reference fields. The fields that are
// in InitProvider are merged into ForProvider when the resource is created.
// The same fields are also added to the terraform ignore_changes hook, to
// avoid updating them after creation. This is useful for fields that are
// required on creation, but we do not desire to update them after creation,
// for example because of an external controller is managing them, like an
// autoscaler.
InitProvider MSSQLServerMicrosoftSupportAuditingPolicyInitParameters `json:"initProvider,omitempty"`
}
// MSSQLServerMicrosoftSupportAuditingPolicyStatus defines the observed state of MSSQLServerMicrosoftSupportAuditingPolicy.
type MSSQLServerMicrosoftSupportAuditingPolicyStatus struct {
v1.ResourceStatus `json:",inline"`
AtProvider MSSQLServerMicrosoftSupportAuditingPolicyObservation `json:"atProvider,omitempty"`
}
// +kubebuilder:object:root=true
// +kubebuilder:subresource:status
// +kubebuilder:storageversion
// MSSQLServerMicrosoftSupportAuditingPolicy is the Schema for the MSSQLServerMicrosoftSupportAuditingPolicys API. Manages a MS SQL Server Microsoft Support Auditing Policy.
// +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status"
// +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status"
// +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name"
// +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp"
// +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,azure}
type MSSQLServerMicrosoftSupportAuditingPolicy struct {
metav1.TypeMeta `json:",inline"`
metav1.ObjectMeta `json:"metadata,omitempty"`
Spec MSSQLServerMicrosoftSupportAuditingPolicySpec `json:"spec"`
Status MSSQLServerMicrosoftSupportAuditingPolicyStatus `json:"status,omitempty"`
}
// +kubebuilder:object:root=true
// MSSQLServerMicrosoftSupportAuditingPolicyList contains a list of MSSQLServerMicrosoftSupportAuditingPolicys
type MSSQLServerMicrosoftSupportAuditingPolicyList struct {
metav1.TypeMeta `json:",inline"`
metav1.ListMeta `json:"metadata,omitempty"`
Items []MSSQLServerMicrosoftSupportAuditingPolicy `json:"items"`
}
// Repository type metadata.
var (
MSSQLServerMicrosoftSupportAuditingPolicy_Kind = "MSSQLServerMicrosoftSupportAuditingPolicy"
MSSQLServerMicrosoftSupportAuditingPolicy_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: MSSQLServerMicrosoftSupportAuditingPolicy_Kind}.String()
MSSQLServerMicrosoftSupportAuditingPolicy_KindAPIVersion = MSSQLServerMicrosoftSupportAuditingPolicy_Kind + "." + CRDGroupVersion.String()
MSSQLServerMicrosoftSupportAuditingPolicy_GroupVersionKind = CRDGroupVersion.WithKind(MSSQLServerMicrosoftSupportAuditingPolicy_Kind)
)
func init() {
SchemeBuilder.Register(&MSSQLServerMicrosoftSupportAuditingPolicy{}, &MSSQLServerMicrosoftSupportAuditingPolicyList{})
}