-
Notifications
You must be signed in to change notification settings - Fork 69
/
zz_roleassignment_types.go
executable file
·159 lines (124 loc) · 9.27 KB
/
zz_roleassignment_types.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
// SPDX-FileCopyrightText: 2024 The Crossplane Authors <https://crossplane.io>
//
// SPDX-License-Identifier: Apache-2.0
// Code generated by upjet. DO NOT EDIT.
package v1beta1
import (
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime/schema"
v1 "github.com/crossplane/crossplane-runtime/apis/common/v1"
)
type RoleAssignmentInitParameters struct {
// The ID of the Principal (User, Group or Service Principal) to assign the Synapse Role Definition to. Changing this forces a new resource to be created.
PrincipalID *string `json:"principalId,omitempty" tf:"principal_id,omitempty"`
// The Type of the Principal. One of User, Group or ServicePrincipal. Changing this forces a new resource to be created.
PrincipalType *string `json:"principalType,omitempty" tf:"principal_type,omitempty"`
// The Role Name of the Synapse Built-In Role. Possible values are Apache Spark Administrator, Synapse Administrator, Synapse Artifact Publisher, Synapse Artifact User, Synapse Compute Operator, Synapse Contributor, Synapse Credential User, Synapse Linked Data Manager, Synapse Monitoring Operator, Synapse SQL Administrator and Synapse User. Changing this forces a new resource to be created.
RoleName *string `json:"roleName,omitempty" tf:"role_name,omitempty"`
// The Synapse Spark Pool which the Synapse Role Assignment applies to. Changing this forces a new resource to be created.
SynapseSparkPoolID *string `json:"synapseSparkPoolId,omitempty" tf:"synapse_spark_pool_id,omitempty"`
// The Synapse Workspace which the Synapse Role Assignment applies to. Changing this forces a new resource to be created.
// +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/synapse/v1beta2.Workspace
// +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractResourceID()
SynapseWorkspaceID *string `json:"synapseWorkspaceId,omitempty" tf:"synapse_workspace_id,omitempty"`
// Reference to a Workspace in synapse to populate synapseWorkspaceId.
// +kubebuilder:validation:Optional
SynapseWorkspaceIDRef *v1.Reference `json:"synapseWorkspaceIdRef,omitempty" tf:"-"`
// Selector for a Workspace in synapse to populate synapseWorkspaceId.
// +kubebuilder:validation:Optional
SynapseWorkspaceIDSelector *v1.Selector `json:"synapseWorkspaceIdSelector,omitempty" tf:"-"`
}
type RoleAssignmentObservation struct {
// The Synapse Role Assignment ID.
ID *string `json:"id,omitempty" tf:"id,omitempty"`
// The ID of the Principal (User, Group or Service Principal) to assign the Synapse Role Definition to. Changing this forces a new resource to be created.
PrincipalID *string `json:"principalId,omitempty" tf:"principal_id,omitempty"`
// The Type of the Principal. One of User, Group or ServicePrincipal. Changing this forces a new resource to be created.
PrincipalType *string `json:"principalType,omitempty" tf:"principal_type,omitempty"`
// The Role Name of the Synapse Built-In Role. Possible values are Apache Spark Administrator, Synapse Administrator, Synapse Artifact Publisher, Synapse Artifact User, Synapse Compute Operator, Synapse Contributor, Synapse Credential User, Synapse Linked Data Manager, Synapse Monitoring Operator, Synapse SQL Administrator and Synapse User. Changing this forces a new resource to be created.
RoleName *string `json:"roleName,omitempty" tf:"role_name,omitempty"`
// The Synapse Spark Pool which the Synapse Role Assignment applies to. Changing this forces a new resource to be created.
SynapseSparkPoolID *string `json:"synapseSparkPoolId,omitempty" tf:"synapse_spark_pool_id,omitempty"`
// The Synapse Workspace which the Synapse Role Assignment applies to. Changing this forces a new resource to be created.
SynapseWorkspaceID *string `json:"synapseWorkspaceId,omitempty" tf:"synapse_workspace_id,omitempty"`
}
type RoleAssignmentParameters struct {
// The ID of the Principal (User, Group or Service Principal) to assign the Synapse Role Definition to. Changing this forces a new resource to be created.
// +kubebuilder:validation:Optional
PrincipalID *string `json:"principalId,omitempty" tf:"principal_id,omitempty"`
// The Type of the Principal. One of User, Group or ServicePrincipal. Changing this forces a new resource to be created.
// +kubebuilder:validation:Optional
PrincipalType *string `json:"principalType,omitempty" tf:"principal_type,omitempty"`
// The Role Name of the Synapse Built-In Role. Possible values are Apache Spark Administrator, Synapse Administrator, Synapse Artifact Publisher, Synapse Artifact User, Synapse Compute Operator, Synapse Contributor, Synapse Credential User, Synapse Linked Data Manager, Synapse Monitoring Operator, Synapse SQL Administrator and Synapse User. Changing this forces a new resource to be created.
// +kubebuilder:validation:Optional
RoleName *string `json:"roleName,omitempty" tf:"role_name,omitempty"`
// The Synapse Spark Pool which the Synapse Role Assignment applies to. Changing this forces a new resource to be created.
// +kubebuilder:validation:Optional
SynapseSparkPoolID *string `json:"synapseSparkPoolId,omitempty" tf:"synapse_spark_pool_id,omitempty"`
// The Synapse Workspace which the Synapse Role Assignment applies to. Changing this forces a new resource to be created.
// +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/synapse/v1beta2.Workspace
// +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractResourceID()
// +kubebuilder:validation:Optional
SynapseWorkspaceID *string `json:"synapseWorkspaceId,omitempty" tf:"synapse_workspace_id,omitempty"`
// Reference to a Workspace in synapse to populate synapseWorkspaceId.
// +kubebuilder:validation:Optional
SynapseWorkspaceIDRef *v1.Reference `json:"synapseWorkspaceIdRef,omitempty" tf:"-"`
// Selector for a Workspace in synapse to populate synapseWorkspaceId.
// +kubebuilder:validation:Optional
SynapseWorkspaceIDSelector *v1.Selector `json:"synapseWorkspaceIdSelector,omitempty" tf:"-"`
}
// RoleAssignmentSpec defines the desired state of RoleAssignment
type RoleAssignmentSpec struct {
v1.ResourceSpec `json:",inline"`
ForProvider RoleAssignmentParameters `json:"forProvider"`
// THIS IS A BETA FIELD. It will be honored
// unless the Management Policies feature flag is disabled.
// InitProvider holds the same fields as ForProvider, with the exception
// of Identifier and other resource reference fields. The fields that are
// in InitProvider are merged into ForProvider when the resource is created.
// The same fields are also added to the terraform ignore_changes hook, to
// avoid updating them after creation. This is useful for fields that are
// required on creation, but we do not desire to update them after creation,
// for example because of an external controller is managing them, like an
// autoscaler.
InitProvider RoleAssignmentInitParameters `json:"initProvider,omitempty"`
}
// RoleAssignmentStatus defines the observed state of RoleAssignment.
type RoleAssignmentStatus struct {
v1.ResourceStatus `json:",inline"`
AtProvider RoleAssignmentObservation `json:"atProvider,omitempty"`
}
// +kubebuilder:object:root=true
// +kubebuilder:subresource:status
// +kubebuilder:storageversion
// RoleAssignment is the Schema for the RoleAssignments API. Manages a Synapse Role Assignment.
// +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status"
// +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status"
// +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name"
// +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp"
// +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,azure}
type RoleAssignment struct {
metav1.TypeMeta `json:",inline"`
metav1.ObjectMeta `json:"metadata,omitempty"`
// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.principalId) || (has(self.initProvider) && has(self.initProvider.principalId))",message="spec.forProvider.principalId is a required parameter"
// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.roleName) || (has(self.initProvider) && has(self.initProvider.roleName))",message="spec.forProvider.roleName is a required parameter"
Spec RoleAssignmentSpec `json:"spec"`
Status RoleAssignmentStatus `json:"status,omitempty"`
}
// +kubebuilder:object:root=true
// RoleAssignmentList contains a list of RoleAssignments
type RoleAssignmentList struct {
metav1.TypeMeta `json:",inline"`
metav1.ListMeta `json:"metadata,omitempty"`
Items []RoleAssignment `json:"items"`
}
// Repository type metadata.
var (
RoleAssignment_Kind = "RoleAssignment"
RoleAssignment_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: RoleAssignment_Kind}.String()
RoleAssignment_KindAPIVersion = RoleAssignment_Kind + "." + CRDGroupVersion.String()
RoleAssignment_GroupVersionKind = CRDGroupVersion.WithKind(RoleAssignment_Kind)
)
func init() {
SchemeBuilder.Register(&RoleAssignment{}, &RoleAssignmentList{})
}