generated from crossplane/upjet-provider-template
/
zz_authbackendstsrole_types.go
executable file
·155 lines (127 loc) · 6.97 KB
/
zz_authbackendstsrole_types.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
/*
Copyright 2022 Upbound Inc.
*/
// Code generated by upjet. DO NOT EDIT.
package v1alpha1
import (
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime/schema"
v1 "github.com/crossplane/crossplane-runtime/apis/common/v1"
)
type AuthBackendStsRoleInitParameters struct {
// The AWS account ID to configure the STS role for.
// AWS account ID to be associated with STS role.
AccountID *string `json:"accountId,omitempty" tf:"account_id,omitempty"`
// The path the AWS auth backend being configured was
// mounted at. Defaults to aws.
// Unique name of the auth backend to configure.
Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`
// The namespace to provision the resource in.
// The value should not contain leading or trailing forward slashes.
// The namespace is always relative to the provider's configured namespace.
// Available only for Vault Enterprise.
// Target namespace. (requires Enterprise)
Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`
// The STS role to assume when verifying requests made
// by EC2 instances in the account specified by account_id.
// AWS ARN for STS role to be assumed when interacting with the account specified.
StsRole *string `json:"stsRole,omitempty" tf:"sts_role,omitempty"`
}
type AuthBackendStsRoleObservation struct {
// The AWS account ID to configure the STS role for.
// AWS account ID to be associated with STS role.
AccountID *string `json:"accountId,omitempty" tf:"account_id,omitempty"`
// The path the AWS auth backend being configured was
// mounted at. Defaults to aws.
// Unique name of the auth backend to configure.
Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`
ID *string `json:"id,omitempty" tf:"id,omitempty"`
// The namespace to provision the resource in.
// The value should not contain leading or trailing forward slashes.
// The namespace is always relative to the provider's configured namespace.
// Available only for Vault Enterprise.
// Target namespace. (requires Enterprise)
Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`
// The STS role to assume when verifying requests made
// by EC2 instances in the account specified by account_id.
// AWS ARN for STS role to be assumed when interacting with the account specified.
StsRole *string `json:"stsRole,omitempty" tf:"sts_role,omitempty"`
}
type AuthBackendStsRoleParameters struct {
// The AWS account ID to configure the STS role for.
// AWS account ID to be associated with STS role.
// +kubebuilder:validation:Optional
AccountID *string `json:"accountId,omitempty" tf:"account_id,omitempty"`
// The path the AWS auth backend being configured was
// mounted at. Defaults to aws.
// Unique name of the auth backend to configure.
// +kubebuilder:validation:Optional
Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`
// The namespace to provision the resource in.
// The value should not contain leading or trailing forward slashes.
// The namespace is always relative to the provider's configured namespace.
// Available only for Vault Enterprise.
// Target namespace. (requires Enterprise)
// +kubebuilder:validation:Optional
Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`
// The STS role to assume when verifying requests made
// by EC2 instances in the account specified by account_id.
// AWS ARN for STS role to be assumed when interacting with the account specified.
// +kubebuilder:validation:Optional
StsRole *string `json:"stsRole,omitempty" tf:"sts_role,omitempty"`
}
// AuthBackendStsRoleSpec defines the desired state of AuthBackendStsRole
type AuthBackendStsRoleSpec struct {
v1.ResourceSpec `json:",inline"`
ForProvider AuthBackendStsRoleParameters `json:"forProvider"`
// THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored
// unless the relevant Crossplane feature flag is enabled, and may be
// changed or removed without notice.
// InitProvider holds the same fields as ForProvider, with the exception
// of Identifier and other resource reference fields. The fields that are
// in InitProvider are merged into ForProvider when the resource is created.
// The same fields are also added to the terraform ignore_changes hook, to
// avoid updating them after creation. This is useful for fields that are
// required on creation, but we do not desire to update them after creation,
// for example because of an external controller is managing them, like an
// autoscaler.
InitProvider AuthBackendStsRoleInitParameters `json:"initProvider,omitempty"`
}
// AuthBackendStsRoleStatus defines the observed state of AuthBackendStsRole.
type AuthBackendStsRoleStatus struct {
v1.ResourceStatus `json:",inline"`
AtProvider AuthBackendStsRoleObservation `json:"atProvider,omitempty"`
}
// +kubebuilder:object:root=true
// AuthBackendStsRole is the Schema for the AuthBackendStsRoles API. Configures an STS role in the Vault AWS Auth backend.
// +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status"
// +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status"
// +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name"
// +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp"
// +kubebuilder:subresource:status
// +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}
type AuthBackendStsRole struct {
metav1.TypeMeta `json:",inline"`
metav1.ObjectMeta `json:"metadata,omitempty"`
// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.accountId) || has(self.initProvider.accountId)",message="accountId is a required parameter"
// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.stsRole) || has(self.initProvider.stsRole)",message="stsRole is a required parameter"
Spec AuthBackendStsRoleSpec `json:"spec"`
Status AuthBackendStsRoleStatus `json:"status,omitempty"`
}
// +kubebuilder:object:root=true
// AuthBackendStsRoleList contains a list of AuthBackendStsRoles
type AuthBackendStsRoleList struct {
metav1.TypeMeta `json:",inline"`
metav1.ListMeta `json:"metadata,omitempty"`
Items []AuthBackendStsRole `json:"items"`
}
// Repository type metadata.
var (
AuthBackendStsRole_Kind = "AuthBackendStsRole"
AuthBackendStsRole_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: AuthBackendStsRole_Kind}.String()
AuthBackendStsRole_KindAPIVersion = AuthBackendStsRole_Kind + "." + CRDGroupVersion.String()
AuthBackendStsRole_GroupVersionKind = CRDGroupVersion.WithKind(AuthBackendStsRole_Kind)
)
func init() {
SchemeBuilder.Register(&AuthBackendStsRole{}, &AuthBackendStsRoleList{})
}