-
Notifications
You must be signed in to change notification settings - Fork 64
/
zz_cryptokeyversion_types.go
executable file
·207 lines (158 loc) · 8.95 KB
/
zz_cryptokeyversion_types.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
// SPDX-FileCopyrightText: 2024 The Crossplane Authors <https://crossplane.io>
//
// SPDX-License-Identifier: Apache-2.0
// Code generated by upjet. DO NOT EDIT.
package v1beta2
import (
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime/schema"
v1 "github.com/crossplane/crossplane-runtime/apis/common/v1"
)
type AttestationInitParameters struct {
}
type AttestationObservation struct {
// The certificate chains needed to validate the attestation
// Structure is documented below.
CertChains *CertChainsObservation `json:"certChains,omitempty" tf:"cert_chains,omitempty"`
// (Output)
// The attestation data provided by the HSM when the key operation was performed.
Content *string `json:"content,omitempty" tf:"content,omitempty"`
// ExternalProtectionLevelOptions stores a group of additional fields for configuring a CryptoKeyVersion that are specific to the EXTERNAL protection level and EXTERNAL_VPC protection levels.
// Structure is documented below.
ExternalProtectionLevelOptions *ExternalProtectionLevelOptionsObservation `json:"externalProtectionLevelOptions,omitempty" tf:"external_protection_level_options,omitempty"`
// (Output)
// The format of the attestation data.
Format *string `json:"format,omitempty" tf:"format,omitempty"`
}
type AttestationParameters struct {
}
type CertChainsInitParameters struct {
}
type CertChainsObservation struct {
// Cavium certificate chain corresponding to the attestation.
CaviumCerts *string `json:"caviumCerts,omitempty" tf:"cavium_certs,omitempty"`
// Google card certificate chain corresponding to the attestation.
GoogleCardCerts *string `json:"googleCardCerts,omitempty" tf:"google_card_certs,omitempty"`
// Google partition certificate chain corresponding to the attestation.
GooglePartitionCerts *string `json:"googlePartitionCerts,omitempty" tf:"google_partition_certs,omitempty"`
}
type CertChainsParameters struct {
}
type CryptoKeyVersionInitParameters struct {
// The name of the cryptoKey associated with the CryptoKeyVersions.
// Format: 'projects/{{project}}/locations/{{location}}/keyRings/{{keyring}}/cryptoKeys/{{cryptoKey}}'
// +crossplane:generate:reference:type=github.com/upbound/provider-gcp/apis/kms/v1beta2.CryptoKey
// +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractResourceID()
CryptoKey *string `json:"cryptoKey,omitempty" tf:"crypto_key,omitempty"`
// Reference to a CryptoKey in kms to populate cryptoKey.
// +kubebuilder:validation:Optional
CryptoKeyRef *v1.Reference `json:"cryptoKeyRef,omitempty" tf:"-"`
// Selector for a CryptoKey in kms to populate cryptoKey.
// +kubebuilder:validation:Optional
CryptoKeySelector *v1.Selector `json:"cryptoKeySelector,omitempty" tf:"-"`
// The current state of the CryptoKeyVersion.
// Possible values are: PENDING_GENERATION, ENABLED, DISABLED, DESTROYED, DESTROY_SCHEDULED, PENDING_IMPORT, IMPORT_FAILED.
State *string `json:"state,omitempty" tf:"state,omitempty"`
}
type CryptoKeyVersionObservation struct {
// The CryptoKeyVersionAlgorithm that this CryptoKeyVersion supports.
Algorithm *string `json:"algorithm,omitempty" tf:"algorithm,omitempty"`
// Statement that was generated and signed by the HSM at key creation time. Use this statement to verify attributes of the key as stored on the HSM, independently of Google.
// Only provided for key versions with protectionLevel HSM.
// Structure is documented below.
Attestation []AttestationObservation `json:"attestation,omitempty" tf:"attestation,omitempty"`
// The name of the cryptoKey associated with the CryptoKeyVersions.
// Format: 'projects/{{project}}/locations/{{location}}/keyRings/{{keyring}}/cryptoKeys/{{cryptoKey}}'
CryptoKey *string `json:"cryptoKey,omitempty" tf:"crypto_key,omitempty"`
// The time this CryptoKeyVersion key material was generated
GenerateTime *string `json:"generateTime,omitempty" tf:"generate_time,omitempty"`
// an identifier for the resource with format {{name}}
ID *string `json:"id,omitempty" tf:"id,omitempty"`
// The resource name for this CryptoKeyVersion.
Name *string `json:"name,omitempty" tf:"name,omitempty"`
// The ProtectionLevel describing how crypto operations are performed with this CryptoKeyVersion.
ProtectionLevel *string `json:"protectionLevel,omitempty" tf:"protection_level,omitempty"`
// The current state of the CryptoKeyVersion.
// Possible values are: PENDING_GENERATION, ENABLED, DISABLED, DESTROYED, DESTROY_SCHEDULED, PENDING_IMPORT, IMPORT_FAILED.
State *string `json:"state,omitempty" tf:"state,omitempty"`
}
type CryptoKeyVersionParameters struct {
// The name of the cryptoKey associated with the CryptoKeyVersions.
// Format: 'projects/{{project}}/locations/{{location}}/keyRings/{{keyring}}/cryptoKeys/{{cryptoKey}}'
// +crossplane:generate:reference:type=github.com/upbound/provider-gcp/apis/kms/v1beta2.CryptoKey
// +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractResourceID()
// +kubebuilder:validation:Optional
CryptoKey *string `json:"cryptoKey,omitempty" tf:"crypto_key,omitempty"`
// Reference to a CryptoKey in kms to populate cryptoKey.
// +kubebuilder:validation:Optional
CryptoKeyRef *v1.Reference `json:"cryptoKeyRef,omitempty" tf:"-"`
// Selector for a CryptoKey in kms to populate cryptoKey.
// +kubebuilder:validation:Optional
CryptoKeySelector *v1.Selector `json:"cryptoKeySelector,omitempty" tf:"-"`
// The current state of the CryptoKeyVersion.
// Possible values are: PENDING_GENERATION, ENABLED, DISABLED, DESTROYED, DESTROY_SCHEDULED, PENDING_IMPORT, IMPORT_FAILED.
// +kubebuilder:validation:Optional
State *string `json:"state,omitempty" tf:"state,omitempty"`
}
type ExternalProtectionLevelOptionsInitParameters struct {
}
type ExternalProtectionLevelOptionsObservation struct {
// The path to the external key material on the EKM when using EkmConnection e.g., "v0/my/key". Set this field instead of externalKeyUri when using an EkmConnection.
EkmConnectionKeyPath *string `json:"ekmConnectionKeyPath,omitempty" tf:"ekm_connection_key_path,omitempty"`
// The URI for an external resource that this CryptoKeyVersion represents.
ExternalKeyURI *string `json:"externalKeyUri,omitempty" tf:"external_key_uri,omitempty"`
}
type ExternalProtectionLevelOptionsParameters struct {
}
// CryptoKeyVersionSpec defines the desired state of CryptoKeyVersion
type CryptoKeyVersionSpec struct {
v1.ResourceSpec `json:",inline"`
ForProvider CryptoKeyVersionParameters `json:"forProvider"`
// THIS IS A BETA FIELD. It will be honored
// unless the Management Policies feature flag is disabled.
// InitProvider holds the same fields as ForProvider, with the exception
// of Identifier and other resource reference fields. The fields that are
// in InitProvider are merged into ForProvider when the resource is created.
// The same fields are also added to the terraform ignore_changes hook, to
// avoid updating them after creation. This is useful for fields that are
// required on creation, but we do not desire to update them after creation,
// for example because of an external controller is managing them, like an
// autoscaler.
InitProvider CryptoKeyVersionInitParameters `json:"initProvider,omitempty"`
}
// CryptoKeyVersionStatus defines the observed state of CryptoKeyVersion.
type CryptoKeyVersionStatus struct {
v1.ResourceStatus `json:",inline"`
AtProvider CryptoKeyVersionObservation `json:"atProvider,omitempty"`
}
// +kubebuilder:object:root=true
// +kubebuilder:subresource:status
// CryptoKeyVersion is the Schema for the CryptoKeyVersions API. A
// +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status"
// +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status"
// +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name"
// +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp"
// +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,gcp}
type CryptoKeyVersion struct {
metav1.TypeMeta `json:",inline"`
metav1.ObjectMeta `json:"metadata,omitempty"`
Spec CryptoKeyVersionSpec `json:"spec"`
Status CryptoKeyVersionStatus `json:"status,omitempty"`
}
// +kubebuilder:object:root=true
// CryptoKeyVersionList contains a list of CryptoKeyVersions
type CryptoKeyVersionList struct {
metav1.TypeMeta `json:",inline"`
metav1.ListMeta `json:"metadata,omitempty"`
Items []CryptoKeyVersion `json:"items"`
}
// Repository type metadata.
var (
CryptoKeyVersion_Kind = "CryptoKeyVersion"
CryptoKeyVersion_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: CryptoKeyVersion_Kind}.String()
CryptoKeyVersion_KindAPIVersion = CryptoKeyVersion_Kind + "." + CRDGroupVersion.String()
CryptoKeyVersion_GroupVersionKind = CRDGroupVersion.WithKind(CryptoKeyVersion_Kind)
)
func init() {
SchemeBuilder.Register(&CryptoKeyVersion{}, &CryptoKeyVersionList{})
}