generated from crossplane/upjet-provider-template
/
zz_oidcrole_types.go
executable file
·191 lines (157 loc) · 8.16 KB
/
zz_oidcrole_types.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
/*
Copyright 2022 Upbound Inc.
*/
// Code generated by upjet. DO NOT EDIT.
package v1alpha1
import (
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime/schema"
v1 "github.com/crossplane/crossplane-runtime/apis/common/v1"
)
type OidcRoleInitParameters struct {
// The value that will be included in the aud field of all the OIDC identity
// tokens issued by this role
// The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role
ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"`
// A configured named key, the key must already exist
// before tokens can be issued.
// A configured named key, the key must already exist.
Key *string `json:"key,omitempty" tf:"key,omitempty"`
// Name of the OIDC Role to create.
// Name of the role.
Name *string `json:"name,omitempty" tf:"name,omitempty"`
// The namespace to provision the resource in.
// The value should not contain leading or trailing forward slashes.
// The namespace is always relative to the provider's configured namespace.
// Available only for Vault Enterprise.
// Target namespace. (requires Enterprise)
Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`
// TTL of the tokens generated against the role in number of seconds.
// TTL of the tokens generated against the role in number of seconds.
TTL *float64 `json:"ttl,omitempty" tf:"ttl,omitempty"`
// The template string to use for generating tokens. This may be in
// string-ified JSON or base64 format. See the
// documentation
// for the template format.
// The template string to use for generating tokens. This may be in string-ified JSON or base64 format.
Template *string `json:"template,omitempty" tf:"template,omitempty"`
}
type OidcRoleObservation struct {
// The value that will be included in the aud field of all the OIDC identity
// tokens issued by this role
// The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role
ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"`
// The name of the created role.
ID *string `json:"id,omitempty" tf:"id,omitempty"`
// A configured named key, the key must already exist
// before tokens can be issued.
// A configured named key, the key must already exist.
Key *string `json:"key,omitempty" tf:"key,omitempty"`
// Name of the OIDC Role to create.
// Name of the role.
Name *string `json:"name,omitempty" tf:"name,omitempty"`
// The namespace to provision the resource in.
// The value should not contain leading or trailing forward slashes.
// The namespace is always relative to the provider's configured namespace.
// Available only for Vault Enterprise.
// Target namespace. (requires Enterprise)
Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`
// TTL of the tokens generated against the role in number of seconds.
// TTL of the tokens generated against the role in number of seconds.
TTL *float64 `json:"ttl,omitempty" tf:"ttl,omitempty"`
// The template string to use for generating tokens. This may be in
// string-ified JSON or base64 format. See the
// documentation
// for the template format.
// The template string to use for generating tokens. This may be in string-ified JSON or base64 format.
Template *string `json:"template,omitempty" tf:"template,omitempty"`
}
type OidcRoleParameters struct {
// The value that will be included in the aud field of all the OIDC identity
// tokens issued by this role
// The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role
// +kubebuilder:validation:Optional
ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"`
// A configured named key, the key must already exist
// before tokens can be issued.
// A configured named key, the key must already exist.
// +kubebuilder:validation:Optional
Key *string `json:"key,omitempty" tf:"key,omitempty"`
// Name of the OIDC Role to create.
// Name of the role.
// +kubebuilder:validation:Optional
Name *string `json:"name,omitempty" tf:"name,omitempty"`
// The namespace to provision the resource in.
// The value should not contain leading or trailing forward slashes.
// The namespace is always relative to the provider's configured namespace.
// Available only for Vault Enterprise.
// Target namespace. (requires Enterprise)
// +kubebuilder:validation:Optional
Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`
// TTL of the tokens generated against the role in number of seconds.
// TTL of the tokens generated against the role in number of seconds.
// +kubebuilder:validation:Optional
TTL *float64 `json:"ttl,omitempty" tf:"ttl,omitempty"`
// The template string to use for generating tokens. This may be in
// string-ified JSON or base64 format. See the
// documentation
// for the template format.
// The template string to use for generating tokens. This may be in string-ified JSON or base64 format.
// +kubebuilder:validation:Optional
Template *string `json:"template,omitempty" tf:"template,omitempty"`
}
// OidcRoleSpec defines the desired state of OidcRole
type OidcRoleSpec struct {
v1.ResourceSpec `json:",inline"`
ForProvider OidcRoleParameters `json:"forProvider"`
// THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored
// unless the relevant Crossplane feature flag is enabled, and may be
// changed or removed without notice.
// InitProvider holds the same fields as ForProvider, with the exception
// of Identifier and other resource reference fields. The fields that are
// in InitProvider are merged into ForProvider when the resource is created.
// The same fields are also added to the terraform ignore_changes hook, to
// avoid updating them after creation. This is useful for fields that are
// required on creation, but we do not desire to update them after creation,
// for example because of an external controller is managing them, like an
// autoscaler.
InitProvider OidcRoleInitParameters `json:"initProvider,omitempty"`
}
// OidcRoleStatus defines the observed state of OidcRole.
type OidcRoleStatus struct {
v1.ResourceStatus `json:",inline"`
AtProvider OidcRoleObservation `json:"atProvider,omitempty"`
}
// +kubebuilder:object:root=true
// OidcRole is the Schema for the OidcRoles API. Creates an Identity OIDC Role for Vault
// +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status"
// +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status"
// +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name"
// +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp"
// +kubebuilder:subresource:status
// +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}
type OidcRole struct {
metav1.TypeMeta `json:",inline"`
metav1.ObjectMeta `json:"metadata,omitempty"`
// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.key) || has(self.initProvider.key)",message="key is a required parameter"
// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.name) || has(self.initProvider.name)",message="name is a required parameter"
Spec OidcRoleSpec `json:"spec"`
Status OidcRoleStatus `json:"status,omitempty"`
}
// +kubebuilder:object:root=true
// OidcRoleList contains a list of OidcRoles
type OidcRoleList struct {
metav1.TypeMeta `json:",inline"`
metav1.ListMeta `json:"metadata,omitempty"`
Items []OidcRole `json:"items"`
}
// Repository type metadata.
var (
OidcRole_Kind = "OidcRole"
OidcRole_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: OidcRole_Kind}.String()
OidcRole_KindAPIVersion = OidcRole_Kind + "." + CRDGroupVersion.String()
OidcRole_GroupVersionKind = CRDGroupVersion.WithKind(OidcRole_Kind)
)
func init() {
SchemeBuilder.Register(&OidcRole{}, &OidcRoleList{})
}