-
Notifications
You must be signed in to change notification settings - Fork 64
/
zz_policy_types.go
executable file
·288 lines (229 loc) · 13.5 KB
/
zz_policy_types.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
// SPDX-FileCopyrightText: 2024 The Crossplane Authors <https://crossplane.io>
//
// SPDX-License-Identifier: Apache-2.0
// Code generated by upjet. DO NOT EDIT.
package v1beta2
import (
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime/schema"
v1 "github.com/crossplane/crossplane-runtime/apis/common/v1"
)
type AlternativeNameServerConfigInitParameters struct {
// Sets an alternative name server for the associated networks. When specified,
// all DNS queries are forwarded to a name server that you choose. Names such as .internal
// are not available when an alternative name server is specified.
// Structure is documented below.
TargetNameServers []AlternativeNameServerConfigTargetNameServersInitParameters `json:"targetNameServers,omitempty" tf:"target_name_servers,omitempty"`
}
type AlternativeNameServerConfigObservation struct {
// Sets an alternative name server for the associated networks. When specified,
// all DNS queries are forwarded to a name server that you choose. Names such as .internal
// are not available when an alternative name server is specified.
// Structure is documented below.
TargetNameServers []AlternativeNameServerConfigTargetNameServersObservation `json:"targetNameServers,omitempty" tf:"target_name_servers,omitempty"`
}
type AlternativeNameServerConfigParameters struct {
// Sets an alternative name server for the associated networks. When specified,
// all DNS queries are forwarded to a name server that you choose. Names such as .internal
// are not available when an alternative name server is specified.
// Structure is documented below.
// +kubebuilder:validation:Optional
TargetNameServers []AlternativeNameServerConfigTargetNameServersParameters `json:"targetNameServers" tf:"target_name_servers,omitempty"`
}
type AlternativeNameServerConfigTargetNameServersInitParameters struct {
// Forwarding path for this TargetNameServer. If unset or default Cloud DNS will make forwarding
// decision based on address ranges, i.e. RFC1918 addresses go to the VPC, Non-RFC1918 addresses go
// to the Internet. When set to private, Cloud DNS will always send queries through VPC for this target
// Possible values are: default, private.
ForwardingPath *string `json:"forwardingPath,omitempty" tf:"forwarding_path,omitempty"`
// IPv4 address to forward to.
IPv4Address *string `json:"ipv4Address,omitempty" tf:"ipv4_address,omitempty"`
}
type AlternativeNameServerConfigTargetNameServersObservation struct {
// Forwarding path for this TargetNameServer. If unset or default Cloud DNS will make forwarding
// decision based on address ranges, i.e. RFC1918 addresses go to the VPC, Non-RFC1918 addresses go
// to the Internet. When set to private, Cloud DNS will always send queries through VPC for this target
// Possible values are: default, private.
ForwardingPath *string `json:"forwardingPath,omitempty" tf:"forwarding_path,omitempty"`
// IPv4 address to forward to.
IPv4Address *string `json:"ipv4Address,omitempty" tf:"ipv4_address,omitempty"`
}
type AlternativeNameServerConfigTargetNameServersParameters struct {
// Forwarding path for this TargetNameServer. If unset or default Cloud DNS will make forwarding
// decision based on address ranges, i.e. RFC1918 addresses go to the VPC, Non-RFC1918 addresses go
// to the Internet. When set to private, Cloud DNS will always send queries through VPC for this target
// Possible values are: default, private.
// +kubebuilder:validation:Optional
ForwardingPath *string `json:"forwardingPath,omitempty" tf:"forwarding_path,omitempty"`
// IPv4 address to forward to.
// +kubebuilder:validation:Optional
IPv4Address *string `json:"ipv4Address" tf:"ipv4_address,omitempty"`
}
type PolicyInitParameters struct {
// Sets an alternative name server for the associated networks.
// When specified, all DNS queries are forwarded to a name server that you choose.
// Names such as .internal are not available when an alternative name server is specified.
// Structure is documented below.
AlternativeNameServerConfig *AlternativeNameServerConfigInitParameters `json:"alternativeNameServerConfig,omitempty" tf:"alternative_name_server_config,omitempty"`
// A textual description field.
Description *string `json:"description,omitempty" tf:"description,omitempty"`
// Allows networks bound to this policy to receive DNS queries sent
// by VMs or applications over VPN connections. When enabled, a
// virtual IP address will be allocated from each of the sub-networks
// that are bound to this policy.
EnableInboundForwarding *bool `json:"enableInboundForwarding,omitempty" tf:"enable_inbound_forwarding,omitempty"`
// Controls whether logging is enabled for the networks bound to this policy.
// Defaults to no logging if not set.
EnableLogging *bool `json:"enableLogging,omitempty" tf:"enable_logging,omitempty"`
// List of network names specifying networks to which this policy is applied.
// Structure is documented below.
Networks []PolicyNetworksInitParameters `json:"networks,omitempty" tf:"networks,omitempty"`
// The ID of the project in which the resource belongs.
// If it is not provided, the provider project is used.
Project *string `json:"project,omitempty" tf:"project,omitempty"`
}
type PolicyNetworksInitParameters struct {
// Reference to a Network in compute to populate networkUrl.
// +kubebuilder:validation:Optional
NetworkRef *v1.Reference `json:"networkRef,omitempty" tf:"-"`
// Selector for a Network in compute to populate networkUrl.
// +kubebuilder:validation:Optional
NetworkSelector *v1.Selector `json:"networkSelector,omitempty" tf:"-"`
// The id or fully qualified URL of the VPC network to forward queries to.
// This should be formatted like projects/{project}/global/networks/{network} or
// https://www.googleapis.com/compute/v1/projects/{project}/global/networks/{network}
// +crossplane:generate:reference:type=github.com/upbound/provider-gcp/apis/compute/v1beta1.Network
// +crossplane:generate:reference:extractor=github.com/upbound/provider-gcp/config/common.ExtractResourceID()
// +crossplane:generate:reference:refFieldName=NetworkRef
// +crossplane:generate:reference:selectorFieldName=NetworkSelector
NetworkURL *string `json:"networkUrl,omitempty" tf:"network_url,omitempty"`
}
type PolicyNetworksObservation struct {
// The id or fully qualified URL of the VPC network to forward queries to.
// This should be formatted like projects/{project}/global/networks/{network} or
// https://www.googleapis.com/compute/v1/projects/{project}/global/networks/{network}
NetworkURL *string `json:"networkUrl,omitempty" tf:"network_url,omitempty"`
}
type PolicyNetworksParameters struct {
// Reference to a Network in compute to populate networkUrl.
// +kubebuilder:validation:Optional
NetworkRef *v1.Reference `json:"networkRef,omitempty" tf:"-"`
// Selector for a Network in compute to populate networkUrl.
// +kubebuilder:validation:Optional
NetworkSelector *v1.Selector `json:"networkSelector,omitempty" tf:"-"`
// The id or fully qualified URL of the VPC network to forward queries to.
// This should be formatted like projects/{project}/global/networks/{network} or
// https://www.googleapis.com/compute/v1/projects/{project}/global/networks/{network}
// +crossplane:generate:reference:type=github.com/upbound/provider-gcp/apis/compute/v1beta1.Network
// +crossplane:generate:reference:extractor=github.com/upbound/provider-gcp/config/common.ExtractResourceID()
// +crossplane:generate:reference:refFieldName=NetworkRef
// +crossplane:generate:reference:selectorFieldName=NetworkSelector
// +kubebuilder:validation:Optional
NetworkURL *string `json:"networkUrl,omitempty" tf:"network_url,omitempty"`
}
type PolicyObservation struct {
// Sets an alternative name server for the associated networks.
// When specified, all DNS queries are forwarded to a name server that you choose.
// Names such as .internal are not available when an alternative name server is specified.
// Structure is documented below.
AlternativeNameServerConfig *AlternativeNameServerConfigObservation `json:"alternativeNameServerConfig,omitempty" tf:"alternative_name_server_config,omitempty"`
// A textual description field.
Description *string `json:"description,omitempty" tf:"description,omitempty"`
// Allows networks bound to this policy to receive DNS queries sent
// by VMs or applications over VPN connections. When enabled, a
// virtual IP address will be allocated from each of the sub-networks
// that are bound to this policy.
EnableInboundForwarding *bool `json:"enableInboundForwarding,omitempty" tf:"enable_inbound_forwarding,omitempty"`
// Controls whether logging is enabled for the networks bound to this policy.
// Defaults to no logging if not set.
EnableLogging *bool `json:"enableLogging,omitempty" tf:"enable_logging,omitempty"`
// an identifier for the resource with format projects/{{project}}/policies/{{name}}
ID *string `json:"id,omitempty" tf:"id,omitempty"`
// List of network names specifying networks to which this policy is applied.
// Structure is documented below.
Networks []PolicyNetworksObservation `json:"networks,omitempty" tf:"networks,omitempty"`
// The ID of the project in which the resource belongs.
// If it is not provided, the provider project is used.
Project *string `json:"project,omitempty" tf:"project,omitempty"`
}
type PolicyParameters struct {
// Sets an alternative name server for the associated networks.
// When specified, all DNS queries are forwarded to a name server that you choose.
// Names such as .internal are not available when an alternative name server is specified.
// Structure is documented below.
// +kubebuilder:validation:Optional
AlternativeNameServerConfig *AlternativeNameServerConfigParameters `json:"alternativeNameServerConfig,omitempty" tf:"alternative_name_server_config,omitempty"`
// A textual description field.
// +kubebuilder:validation:Optional
Description *string `json:"description,omitempty" tf:"description,omitempty"`
// Allows networks bound to this policy to receive DNS queries sent
// by VMs or applications over VPN connections. When enabled, a
// virtual IP address will be allocated from each of the sub-networks
// that are bound to this policy.
// +kubebuilder:validation:Optional
EnableInboundForwarding *bool `json:"enableInboundForwarding,omitempty" tf:"enable_inbound_forwarding,omitempty"`
// Controls whether logging is enabled for the networks bound to this policy.
// Defaults to no logging if not set.
// +kubebuilder:validation:Optional
EnableLogging *bool `json:"enableLogging,omitempty" tf:"enable_logging,omitempty"`
// List of network names specifying networks to which this policy is applied.
// Structure is documented below.
// +kubebuilder:validation:Optional
Networks []PolicyNetworksParameters `json:"networks,omitempty" tf:"networks,omitempty"`
// The ID of the project in which the resource belongs.
// If it is not provided, the provider project is used.
// +kubebuilder:validation:Optional
Project *string `json:"project,omitempty" tf:"project,omitempty"`
}
// PolicySpec defines the desired state of Policy
type PolicySpec struct {
v1.ResourceSpec `json:",inline"`
ForProvider PolicyParameters `json:"forProvider"`
// THIS IS A BETA FIELD. It will be honored
// unless the Management Policies feature flag is disabled.
// InitProvider holds the same fields as ForProvider, with the exception
// of Identifier and other resource reference fields. The fields that are
// in InitProvider are merged into ForProvider when the resource is created.
// The same fields are also added to the terraform ignore_changes hook, to
// avoid updating them after creation. This is useful for fields that are
// required on creation, but we do not desire to update them after creation,
// for example because of an external controller is managing them, like an
// autoscaler.
InitProvider PolicyInitParameters `json:"initProvider,omitempty"`
}
// PolicyStatus defines the observed state of Policy.
type PolicyStatus struct {
v1.ResourceStatus `json:",inline"`
AtProvider PolicyObservation `json:"atProvider,omitempty"`
}
// +kubebuilder:object:root=true
// +kubebuilder:subresource:status
// Policy is the Schema for the Policys API. A policy is a collection of DNS rules applied to one or more Virtual Private Cloud resources.
// +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status"
// +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status"
// +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name"
// +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp"
// +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,gcp}
type Policy struct {
metav1.TypeMeta `json:",inline"`
metav1.ObjectMeta `json:"metadata,omitempty"`
Spec PolicySpec `json:"spec"`
Status PolicyStatus `json:"status,omitempty"`
}
// +kubebuilder:object:root=true
// PolicyList contains a list of Policys
type PolicyList struct {
metav1.TypeMeta `json:",inline"`
metav1.ListMeta `json:"metadata,omitempty"`
Items []Policy `json:"items"`
}
// Repository type metadata.
var (
Policy_Kind = "Policy"
Policy_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: Policy_Kind}.String()
Policy_KindAPIVersion = Policy_Kind + "." + CRDGroupVersion.String()
Policy_GroupVersionKind = CRDGroupVersion.WithKind(Policy_Kind)
)
func init() {
SchemeBuilder.Register(&Policy{}, &PolicyList{})
}