-
Notifications
You must be signed in to change notification settings - Fork 60
/
zz_tenantinboundsamlconfig_types.go
executable file
·315 lines (240 loc) · 14.6 KB
/
zz_tenantinboundsamlconfig_types.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
// SPDX-FileCopyrightText: 2024 The Crossplane Authors <https://crossplane.io>
//
// SPDX-License-Identifier: Apache-2.0
// Code generated by upjet. DO NOT EDIT.
package v1beta2
import (
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime/schema"
v1 "github.com/crossplane/crossplane-runtime/apis/common/v1"
)
type IdPConfigIdPCertificatesInitParameters struct {
// (Output)
// The x509 certificate
X509CertificateSecretRef *v1.SecretKeySelector `json:"x509CertificateSecretRef,omitempty" tf:"-"`
}
type IdPConfigIdPCertificatesObservation struct {
}
type IdPConfigIdPCertificatesParameters struct {
// (Output)
// The x509 certificate
// +kubebuilder:validation:Optional
X509CertificateSecretRef *v1.SecretKeySelector `json:"x509CertificateSecretRef,omitempty" tf:"-"`
}
type SpConfigSpCertificatesInitParameters struct {
}
type SpConfigSpCertificatesObservation struct {
// (Output)
// The x509 certificate
X509Certificate *string `json:"x509Certificate,omitempty" tf:"x509_certificate,omitempty"`
}
type SpConfigSpCertificatesParameters struct {
}
type TenantInboundSAMLConfigIdPConfigInitParameters struct {
// The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP.
// Structure is documented below.
IdPCertificates []IdPConfigIdPCertificatesInitParameters `json:"idpCertificates,omitempty" tf:"idp_certificates,omitempty"`
// Unique identifier for all SAML entities
IdPEntityID *string `json:"idpEntityId,omitempty" tf:"idp_entity_id,omitempty"`
// Indicates if outbounding SAMLRequest should be signed.
SignRequest *bool `json:"signRequest,omitempty" tf:"sign_request,omitempty"`
// URL to send Authentication request to.
SsoURL *string `json:"ssoUrl,omitempty" tf:"sso_url,omitempty"`
}
type TenantInboundSAMLConfigIdPConfigObservation struct {
// The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP.
// Structure is documented below.
IdPCertificates []IdPConfigIdPCertificatesParameters `json:"idpCertificates,omitempty" tf:"idp_certificates,omitempty"`
// Unique identifier for all SAML entities
IdPEntityID *string `json:"idpEntityId,omitempty" tf:"idp_entity_id,omitempty"`
// Indicates if outbounding SAMLRequest should be signed.
SignRequest *bool `json:"signRequest,omitempty" tf:"sign_request,omitempty"`
// URL to send Authentication request to.
SsoURL *string `json:"ssoUrl,omitempty" tf:"sso_url,omitempty"`
}
type TenantInboundSAMLConfigIdPConfigParameters struct {
// The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP.
// Structure is documented below.
// +kubebuilder:validation:Optional
IdPCertificates []IdPConfigIdPCertificatesParameters `json:"idpCertificates" tf:"idp_certificates,omitempty"`
// Unique identifier for all SAML entities
// +kubebuilder:validation:Optional
IdPEntityID *string `json:"idpEntityId" tf:"idp_entity_id,omitempty"`
// Indicates if outbounding SAMLRequest should be signed.
// +kubebuilder:validation:Optional
SignRequest *bool `json:"signRequest,omitempty" tf:"sign_request,omitempty"`
// URL to send Authentication request to.
// +kubebuilder:validation:Optional
SsoURL *string `json:"ssoUrl" tf:"sso_url,omitempty"`
}
type TenantInboundSAMLConfigInitParameters struct {
// Human friendly display name.
DisplayName *string `json:"displayName,omitempty" tf:"display_name,omitempty"`
// If this config allows users to sign in with the provider.
Enabled *bool `json:"enabled,omitempty" tf:"enabled,omitempty"`
// SAML IdP configuration when the project acts as the relying party
// Structure is documented below.
IdPConfig *TenantInboundSAMLConfigIdPConfigInitParameters `json:"idpConfig,omitempty" tf:"idp_config,omitempty"`
// The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters,
// hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an
// alphanumeric character, and have at least 2 characters.
Name *string `json:"name,omitempty" tf:"name,omitempty"`
// The ID of the project in which the resource belongs.
// If it is not provided, the provider project is used.
Project *string `json:"project,omitempty" tf:"project,omitempty"`
// SAML SP (Service Provider) configuration when the project acts as the relying party to receive
// and accept an authentication assertion issued by a SAML identity provider.
// Structure is documented below.
SpConfig *TenantInboundSAMLConfigSpConfigInitParameters `json:"spConfig,omitempty" tf:"sp_config,omitempty"`
// The name of the tenant where this inbound SAML config resource exists
// +crossplane:generate:reference:type=github.com/upbound/provider-gcp/apis/identityplatform/v1beta1.Tenant
// +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractParamPath("name",true)
Tenant *string `json:"tenant,omitempty" tf:"tenant,omitempty"`
// Reference to a Tenant in identityplatform to populate tenant.
// +kubebuilder:validation:Optional
TenantRef *v1.Reference `json:"tenantRef,omitempty" tf:"-"`
// Selector for a Tenant in identityplatform to populate tenant.
// +kubebuilder:validation:Optional
TenantSelector *v1.Selector `json:"tenantSelector,omitempty" tf:"-"`
}
type TenantInboundSAMLConfigObservation struct {
// Human friendly display name.
DisplayName *string `json:"displayName,omitempty" tf:"display_name,omitempty"`
// If this config allows users to sign in with the provider.
Enabled *bool `json:"enabled,omitempty" tf:"enabled,omitempty"`
// an identifier for the resource with format projects/{{project}}/tenants/{{tenant}}/inboundSamlConfigs/{{name}}
ID *string `json:"id,omitempty" tf:"id,omitempty"`
// SAML IdP configuration when the project acts as the relying party
// Structure is documented below.
IdPConfig *TenantInboundSAMLConfigIdPConfigObservation `json:"idpConfig,omitempty" tf:"idp_config,omitempty"`
// The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters,
// hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an
// alphanumeric character, and have at least 2 characters.
Name *string `json:"name,omitempty" tf:"name,omitempty"`
// The ID of the project in which the resource belongs.
// If it is not provided, the provider project is used.
Project *string `json:"project,omitempty" tf:"project,omitempty"`
// SAML SP (Service Provider) configuration when the project acts as the relying party to receive
// and accept an authentication assertion issued by a SAML identity provider.
// Structure is documented below.
SpConfig *TenantInboundSAMLConfigSpConfigObservation `json:"spConfig,omitempty" tf:"sp_config,omitempty"`
// The name of the tenant where this inbound SAML config resource exists
Tenant *string `json:"tenant,omitempty" tf:"tenant,omitempty"`
}
type TenantInboundSAMLConfigParameters struct {
// Human friendly display name.
// +kubebuilder:validation:Optional
DisplayName *string `json:"displayName,omitempty" tf:"display_name,omitempty"`
// If this config allows users to sign in with the provider.
// +kubebuilder:validation:Optional
Enabled *bool `json:"enabled,omitempty" tf:"enabled,omitempty"`
// SAML IdP configuration when the project acts as the relying party
// Structure is documented below.
// +kubebuilder:validation:Optional
IdPConfig *TenantInboundSAMLConfigIdPConfigParameters `json:"idpConfig,omitempty" tf:"idp_config,omitempty"`
// The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters,
// hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an
// alphanumeric character, and have at least 2 characters.
// +kubebuilder:validation:Optional
Name *string `json:"name,omitempty" tf:"name,omitempty"`
// The ID of the project in which the resource belongs.
// If it is not provided, the provider project is used.
// +kubebuilder:validation:Optional
Project *string `json:"project,omitempty" tf:"project,omitempty"`
// SAML SP (Service Provider) configuration when the project acts as the relying party to receive
// and accept an authentication assertion issued by a SAML identity provider.
// Structure is documented below.
// +kubebuilder:validation:Optional
SpConfig *TenantInboundSAMLConfigSpConfigParameters `json:"spConfig,omitempty" tf:"sp_config,omitempty"`
// The name of the tenant where this inbound SAML config resource exists
// +crossplane:generate:reference:type=github.com/upbound/provider-gcp/apis/identityplatform/v1beta1.Tenant
// +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractParamPath("name",true)
// +kubebuilder:validation:Optional
Tenant *string `json:"tenant,omitempty" tf:"tenant,omitempty"`
// Reference to a Tenant in identityplatform to populate tenant.
// +kubebuilder:validation:Optional
TenantRef *v1.Reference `json:"tenantRef,omitempty" tf:"-"`
// Selector for a Tenant in identityplatform to populate tenant.
// +kubebuilder:validation:Optional
TenantSelector *v1.Selector `json:"tenantSelector,omitempty" tf:"-"`
}
type TenantInboundSAMLConfigSpConfigInitParameters struct {
// Callback URI where responses from IDP are handled. Must start with https://.
CallbackURI *string `json:"callbackUri,omitempty" tf:"callback_uri,omitempty"`
// Unique identifier for all SAML entities.
SpEntityID *string `json:"spEntityId,omitempty" tf:"sp_entity_id,omitempty"`
}
type TenantInboundSAMLConfigSpConfigObservation struct {
// Callback URI where responses from IDP are handled. Must start with https://.
CallbackURI *string `json:"callbackUri,omitempty" tf:"callback_uri,omitempty"`
// (Output)
// The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP.
// Structure is documented below.
SpCertificates []SpConfigSpCertificatesObservation `json:"spCertificates,omitempty" tf:"sp_certificates,omitempty"`
// Unique identifier for all SAML entities.
SpEntityID *string `json:"spEntityId,omitempty" tf:"sp_entity_id,omitempty"`
}
type TenantInboundSAMLConfigSpConfigParameters struct {
// Callback URI where responses from IDP are handled. Must start with https://.
// +kubebuilder:validation:Optional
CallbackURI *string `json:"callbackUri" tf:"callback_uri,omitempty"`
// Unique identifier for all SAML entities.
// +kubebuilder:validation:Optional
SpEntityID *string `json:"spEntityId" tf:"sp_entity_id,omitempty"`
}
// TenantInboundSAMLConfigSpec defines the desired state of TenantInboundSAMLConfig
type TenantInboundSAMLConfigSpec struct {
v1.ResourceSpec `json:",inline"`
ForProvider TenantInboundSAMLConfigParameters `json:"forProvider"`
// THIS IS A BETA FIELD. It will be honored
// unless the Management Policies feature flag is disabled.
// InitProvider holds the same fields as ForProvider, with the exception
// of Identifier and other resource reference fields. The fields that are
// in InitProvider are merged into ForProvider when the resource is created.
// The same fields are also added to the terraform ignore_changes hook, to
// avoid updating them after creation. This is useful for fields that are
// required on creation, but we do not desire to update them after creation,
// for example because of an external controller is managing them, like an
// autoscaler.
InitProvider TenantInboundSAMLConfigInitParameters `json:"initProvider,omitempty"`
}
// TenantInboundSAMLConfigStatus defines the observed state of TenantInboundSAMLConfig.
type TenantInboundSAMLConfigStatus struct {
v1.ResourceStatus `json:",inline"`
AtProvider TenantInboundSAMLConfigObservation `json:"atProvider,omitempty"`
}
// +kubebuilder:object:root=true
// +kubebuilder:subresource:status
// TenantInboundSAMLConfig is the Schema for the TenantInboundSAMLConfigs API. Inbound SAML configuration for a Identity Toolkit tenant.
// +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status"
// +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status"
// +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name"
// +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp"
// +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,gcp}
type TenantInboundSAMLConfig struct {
metav1.TypeMeta `json:",inline"`
metav1.ObjectMeta `json:"metadata,omitempty"`
// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.displayName) || (has(self.initProvider) && has(self.initProvider.displayName))",message="spec.forProvider.displayName is a required parameter"
// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.idpConfig) || (has(self.initProvider) && has(self.initProvider.idpConfig))",message="spec.forProvider.idpConfig is a required parameter"
// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.name) || (has(self.initProvider) && has(self.initProvider.name))",message="spec.forProvider.name is a required parameter"
// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.spConfig) || (has(self.initProvider) && has(self.initProvider.spConfig))",message="spec.forProvider.spConfig is a required parameter"
Spec TenantInboundSAMLConfigSpec `json:"spec"`
Status TenantInboundSAMLConfigStatus `json:"status,omitempty"`
}
// +kubebuilder:object:root=true
// TenantInboundSAMLConfigList contains a list of TenantInboundSAMLConfigs
type TenantInboundSAMLConfigList struct {
metav1.TypeMeta `json:",inline"`
metav1.ListMeta `json:"metadata,omitempty"`
Items []TenantInboundSAMLConfig `json:"items"`
}
// Repository type metadata.
var (
TenantInboundSAMLConfig_Kind = "TenantInboundSAMLConfig"
TenantInboundSAMLConfig_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: TenantInboundSAMLConfig_Kind}.String()
TenantInboundSAMLConfig_KindAPIVersion = TenantInboundSAMLConfig_Kind + "." + CRDGroupVersion.String()
TenantInboundSAMLConfig_GroupVersionKind = CRDGroupVersion.WithKind(TenantInboundSAMLConfig_Kind)
)
func init() {
SchemeBuilder.Register(&TenantInboundSAMLConfig{}, &TenantInboundSAMLConfigList{})
}