Documentation ¶
Overview ¶
Code generated by azure-service-operator-codegen. DO NOT EDIT. Copyright (c) Microsoft Corporation. Licensed under the MIT license.
Code generated by azure-service-operator-codegen. DO NOT EDIT. Copyright (c) Microsoft Corporation. Licensed under the MIT license.
Index ¶
- Constants
- type AccessPolicyEntry
- type AccessPolicyEntry_STATUS
- type IPRule
- type IPRule_STATUS
- type IdentityType_STATUS
- type NetworkRuleSet
- type NetworkRuleSet_Bypass
- type NetworkRuleSet_Bypass_STATUS
- type NetworkRuleSet_DefaultAction
- type NetworkRuleSet_DefaultAction_STATUS
- type NetworkRuleSet_STATUS
- type Permissions
- type Permissions_Certificates
- type Permissions_Certificates_STATUS
- type Permissions_Keys
- type Permissions_Keys_STATUS
- type Permissions_STATUS
- type Permissions_Secrets
- type Permissions_Secrets_STATUS
- type Permissions_Storage
- type Permissions_Storage_STATUS
- type PrivateEndpointConnectionItem_STATUS
- type PrivateEndpointConnectionProperties_STATUS
- type PrivateEndpointConnectionProvisioningState_STATUS
- type PrivateEndpointServiceConnectionStatus_STATUS
- type PrivateEndpoint_STATUS
- type PrivateLinkServiceConnectionState_ActionsRequired_STATUS
- type PrivateLinkServiceConnectionState_STATUS
- type Sku
- type Sku_Family
- type Sku_Family_STATUS
- type Sku_Name
- type Sku_Name_STATUS
- type Sku_STATUS
- type SystemData_STATUS
- type VaultProperties
- type VaultProperties_CreateMode
- type VaultProperties_CreateMode_STATUS
- type VaultProperties_ProvisioningState
- type VaultProperties_ProvisioningState_STATUS
- type VaultProperties_STATUS
- type Vault_STATUS
- type Vault_Spec
- type VirtualNetworkRule
- type VirtualNetworkRule_STATUS
Constants ¶
const ( VaultProperties_CreateMode_CreateOrRecover = VaultProperties_CreateMode("createOrRecover") VaultProperties_CreateMode_Default = VaultProperties_CreateMode("default") VaultProperties_CreateMode_PurgeThenCreate = VaultProperties_CreateMode("purgeThenCreate") VaultProperties_CreateMode_Recover = VaultProperties_CreateMode("recover") )
const ( VaultProperties_ProvisioningState_RegisteringDns = VaultProperties_ProvisioningState("RegisteringDns") VaultProperties_ProvisioningState_Succeeded = VaultProperties_ProvisioningState("Succeeded") )
const ( NetworkRuleSet_Bypass_AzureServices = NetworkRuleSet_Bypass("AzureServices") NetworkRuleSet_Bypass_None = NetworkRuleSet_Bypass("None") )
const ( NetworkRuleSet_DefaultAction_Allow = NetworkRuleSet_DefaultAction("Allow") NetworkRuleSet_DefaultAction_Deny = NetworkRuleSet_DefaultAction("Deny") )
const ( Sku_Name_Premium = Sku_Name("premium") Sku_Name_Standard = Sku_Name("standard") )
const ( Permissions_Certificates_Backup = Permissions_Certificates("backup") Permissions_Certificates_Create = Permissions_Certificates("create") Permissions_Certificates_Delete = Permissions_Certificates("delete") Permissions_Certificates_Deleteissuers = Permissions_Certificates("deleteissuers") Permissions_Certificates_Get = Permissions_Certificates("get") Permissions_Certificates_Getissuers = Permissions_Certificates("getissuers") Permissions_Certificates_Import = Permissions_Certificates("import") Permissions_Certificates_List = Permissions_Certificates("list") Permissions_Certificates_Listissuers = Permissions_Certificates("listissuers") Permissions_Certificates_Managecontacts = Permissions_Certificates("managecontacts") Permissions_Certificates_Manageissuers = Permissions_Certificates("manageissuers") Permissions_Certificates_Purge = Permissions_Certificates("purge") Permissions_Certificates_Recover = Permissions_Certificates("recover") Permissions_Certificates_Restore = Permissions_Certificates("restore") Permissions_Certificates_Setissuers = Permissions_Certificates("setissuers") Permissions_Certificates_Update = Permissions_Certificates("update") )
const ( Permissions_Keys_Backup = Permissions_Keys("backup") Permissions_Keys_Create = Permissions_Keys("create") Permissions_Keys_Decrypt = Permissions_Keys("decrypt") Permissions_Keys_Delete = Permissions_Keys("delete") Permissions_Keys_Encrypt = Permissions_Keys("encrypt") Permissions_Keys_Get = Permissions_Keys("get") Permissions_Keys_Import = Permissions_Keys("import") Permissions_Keys_List = Permissions_Keys("list") Permissions_Keys_Purge = Permissions_Keys("purge") Permissions_Keys_Recover = Permissions_Keys("recover") Permissions_Keys_Release = Permissions_Keys("release") Permissions_Keys_Restore = Permissions_Keys("restore") Permissions_Keys_Sign = Permissions_Keys("sign") Permissions_Keys_UnwrapKey = Permissions_Keys("unwrapKey") Permissions_Keys_Update = Permissions_Keys("update") Permissions_Keys_Verify = Permissions_Keys("verify") Permissions_Keys_WrapKey = Permissions_Keys("wrapKey") )
const ( Permissions_Secrets_Backup = Permissions_Secrets("backup") Permissions_Secrets_Delete = Permissions_Secrets("delete") Permissions_Secrets_Get = Permissions_Secrets("get") Permissions_Secrets_List = Permissions_Secrets("list") Permissions_Secrets_Purge = Permissions_Secrets("purge") Permissions_Secrets_Recover = Permissions_Secrets("recover") Permissions_Secrets_Restore = Permissions_Secrets("restore") Permissions_Secrets_Set = Permissions_Secrets("set") )
const ( Permissions_Storage_Backup = Permissions_Storage("backup") Permissions_Storage_Delete = Permissions_Storage("delete") Permissions_Storage_Deletesas = Permissions_Storage("deletesas") Permissions_Storage_Get = Permissions_Storage("get") Permissions_Storage_Getsas = Permissions_Storage("getsas") Permissions_Storage_List = Permissions_Storage("list") Permissions_Storage_Listsas = Permissions_Storage("listsas") Permissions_Storage_Purge = Permissions_Storage("purge") Permissions_Storage_Recover = Permissions_Storage("recover") Permissions_Storage_Regeneratekey = Permissions_Storage("regeneratekey") Permissions_Storage_Restore = Permissions_Storage("restore") Permissions_Storage_Set = Permissions_Storage("set") Permissions_Storage_Setsas = Permissions_Storage("setsas") Permissions_Storage_Update = Permissions_Storage("update") )
const ( IdentityType_STATUS_Application = IdentityType_STATUS("Application") IdentityType_STATUS_Key = IdentityType_STATUS("Key") IdentityType_STATUS_ManagedIdentity = IdentityType_STATUS("ManagedIdentity") IdentityType_STATUS_User = IdentityType_STATUS("User") )
const ( VaultProperties_CreateMode_STATUS_CreateOrRecover = VaultProperties_CreateMode_STATUS("createOrRecover") VaultProperties_CreateMode_STATUS_Default = VaultProperties_CreateMode_STATUS("default") VaultProperties_CreateMode_STATUS_PurgeThenCreate = VaultProperties_CreateMode_STATUS("purgeThenCreate") VaultProperties_CreateMode_STATUS_Recover = VaultProperties_CreateMode_STATUS("recover") )
const ( VaultProperties_ProvisioningState_STATUS_RegisteringDns = VaultProperties_ProvisioningState_STATUS("RegisteringDns") VaultProperties_ProvisioningState_STATUS_Succeeded = VaultProperties_ProvisioningState_STATUS("Succeeded") )
const ( NetworkRuleSet_Bypass_STATUS_AzureServices = NetworkRuleSet_Bypass_STATUS("AzureServices") NetworkRuleSet_Bypass_STATUS_None = NetworkRuleSet_Bypass_STATUS("None") )
const ( NetworkRuleSet_DefaultAction_STATUS_Allow = NetworkRuleSet_DefaultAction_STATUS("Allow") NetworkRuleSet_DefaultAction_STATUS_Deny = NetworkRuleSet_DefaultAction_STATUS("Deny") )
const ( Sku_Name_STATUS_Premium = Sku_Name_STATUS("premium") Sku_Name_STATUS_Standard = Sku_Name_STATUS("standard") )
const ( Permissions_Certificates_STATUS_Backup = Permissions_Certificates_STATUS("backup") Permissions_Certificates_STATUS_Create = Permissions_Certificates_STATUS("create") Permissions_Certificates_STATUS_Delete = Permissions_Certificates_STATUS("delete") Permissions_Certificates_STATUS_Deleteissuers = Permissions_Certificates_STATUS("deleteissuers") Permissions_Certificates_STATUS_Get = Permissions_Certificates_STATUS("get") Permissions_Certificates_STATUS_Getissuers = Permissions_Certificates_STATUS("getissuers") Permissions_Certificates_STATUS_Import = Permissions_Certificates_STATUS("import") Permissions_Certificates_STATUS_List = Permissions_Certificates_STATUS("list") Permissions_Certificates_STATUS_Listissuers = Permissions_Certificates_STATUS("listissuers") Permissions_Certificates_STATUS_Managecontacts = Permissions_Certificates_STATUS("managecontacts") Permissions_Certificates_STATUS_Manageissuers = Permissions_Certificates_STATUS("manageissuers") Permissions_Certificates_STATUS_Purge = Permissions_Certificates_STATUS("purge") Permissions_Certificates_STATUS_Recover = Permissions_Certificates_STATUS("recover") Permissions_Certificates_STATUS_Restore = Permissions_Certificates_STATUS("restore") Permissions_Certificates_STATUS_Setissuers = Permissions_Certificates_STATUS("setissuers") Permissions_Certificates_STATUS_Update = Permissions_Certificates_STATUS("update") )
const ( Permissions_Keys_STATUS_Backup = Permissions_Keys_STATUS("backup") Permissions_Keys_STATUS_Create = Permissions_Keys_STATUS("create") Permissions_Keys_STATUS_Decrypt = Permissions_Keys_STATUS("decrypt") Permissions_Keys_STATUS_Delete = Permissions_Keys_STATUS("delete") Permissions_Keys_STATUS_Encrypt = Permissions_Keys_STATUS("encrypt") Permissions_Keys_STATUS_Get = Permissions_Keys_STATUS("get") Permissions_Keys_STATUS_Import = Permissions_Keys_STATUS("import") Permissions_Keys_STATUS_List = Permissions_Keys_STATUS("list") Permissions_Keys_STATUS_Purge = Permissions_Keys_STATUS("purge") Permissions_Keys_STATUS_Recover = Permissions_Keys_STATUS("recover") Permissions_Keys_STATUS_Release = Permissions_Keys_STATUS("release") Permissions_Keys_STATUS_Restore = Permissions_Keys_STATUS("restore") Permissions_Keys_STATUS_Sign = Permissions_Keys_STATUS("sign") Permissions_Keys_STATUS_UnwrapKey = Permissions_Keys_STATUS("unwrapKey") Permissions_Keys_STATUS_Update = Permissions_Keys_STATUS("update") Permissions_Keys_STATUS_Verify = Permissions_Keys_STATUS("verify") Permissions_Keys_STATUS_WrapKey = Permissions_Keys_STATUS("wrapKey") )
const ( Permissions_Secrets_STATUS_Backup = Permissions_Secrets_STATUS("backup") Permissions_Secrets_STATUS_Delete = Permissions_Secrets_STATUS("delete") Permissions_Secrets_STATUS_Get = Permissions_Secrets_STATUS("get") Permissions_Secrets_STATUS_List = Permissions_Secrets_STATUS("list") Permissions_Secrets_STATUS_Purge = Permissions_Secrets_STATUS("purge") Permissions_Secrets_STATUS_Recover = Permissions_Secrets_STATUS("recover") Permissions_Secrets_STATUS_Restore = Permissions_Secrets_STATUS("restore") Permissions_Secrets_STATUS_Set = Permissions_Secrets_STATUS("set") )
const ( Permissions_Storage_STATUS_Backup = Permissions_Storage_STATUS("backup") Permissions_Storage_STATUS_Delete = Permissions_Storage_STATUS("delete") Permissions_Storage_STATUS_Deletesas = Permissions_Storage_STATUS("deletesas") Permissions_Storage_STATUS_Get = Permissions_Storage_STATUS("get") Permissions_Storage_STATUS_Getsas = Permissions_Storage_STATUS("getsas") Permissions_Storage_STATUS_List = Permissions_Storage_STATUS("list") Permissions_Storage_STATUS_Listsas = Permissions_Storage_STATUS("listsas") Permissions_Storage_STATUS_Purge = Permissions_Storage_STATUS("purge") Permissions_Storage_STATUS_Recover = Permissions_Storage_STATUS("recover") Permissions_Storage_STATUS_Regeneratekey = Permissions_Storage_STATUS("regeneratekey") Permissions_Storage_STATUS_Restore = Permissions_Storage_STATUS("restore") Permissions_Storage_STATUS_Set = Permissions_Storage_STATUS("set") Permissions_Storage_STATUS_Setsas = Permissions_Storage_STATUS("setsas") Permissions_Storage_STATUS_Update = Permissions_Storage_STATUS("update") )
const ( PrivateEndpointConnectionProvisioningState_STATUS_Creating = PrivateEndpointConnectionProvisioningState_STATUS("Creating") PrivateEndpointConnectionProvisioningState_STATUS_Deleting = PrivateEndpointConnectionProvisioningState_STATUS("Deleting") PrivateEndpointConnectionProvisioningState_STATUS_Disconnected = PrivateEndpointConnectionProvisioningState_STATUS("Disconnected") PrivateEndpointConnectionProvisioningState_STATUS_Failed = PrivateEndpointConnectionProvisioningState_STATUS("Failed") PrivateEndpointConnectionProvisioningState_STATUS_Succeeded = PrivateEndpointConnectionProvisioningState_STATUS("Succeeded") PrivateEndpointConnectionProvisioningState_STATUS_Updating = PrivateEndpointConnectionProvisioningState_STATUS("Updating") )
const ( PrivateEndpointServiceConnectionStatus_STATUS_Approved = PrivateEndpointServiceConnectionStatus_STATUS("Approved") PrivateEndpointServiceConnectionStatus_STATUS_Disconnected = PrivateEndpointServiceConnectionStatus_STATUS("Disconnected") PrivateEndpointServiceConnectionStatus_STATUS_Pending = PrivateEndpointServiceConnectionStatus_STATUS("Pending") PrivateEndpointServiceConnectionStatus_STATUS_Rejected = PrivateEndpointServiceConnectionStatus_STATUS("Rejected") )
const PrivateLinkServiceConnectionState_ActionsRequired_STATUS_None = PrivateLinkServiceConnectionState_ActionsRequired_STATUS("None")
const Sku_Family_A = Sku_Family("A")
const Sku_Family_STATUS_A = Sku_Family_STATUS("A")
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type AccessPolicyEntry ¶
type AccessPolicyEntry struct { // ApplicationId: Application ID of the client making request on behalf of a principal ApplicationId *string `json:"applicationId,omitempty" optionalConfigMapPair:"ApplicationId"` // ObjectId: The object ID of a user, service principal or security group in the Azure Active Directory tenant for the // vault. The object ID must be unique for the list of access policies. ObjectId *string `json:"objectId,omitempty" optionalConfigMapPair:"ObjectId"` // Permissions: Permissions the identity has for keys, secrets and certificates. Permissions *Permissions `json:"permissions,omitempty"` // TenantId: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault. TenantId *string `json:"tenantId,omitempty" optionalConfigMapPair:"TenantId"` }
An identity that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID.
type AccessPolicyEntry_STATUS ¶
type AccessPolicyEntry_STATUS struct { // ApplicationId: Application ID of the client making request on behalf of a principal ApplicationId *string `json:"applicationId,omitempty"` // ObjectId: The object ID of a user, service principal or security group in the Azure Active Directory tenant for the // vault. The object ID must be unique for the list of access policies. ObjectId *string `json:"objectId,omitempty"` // Permissions: Permissions the identity has for keys, secrets and certificates. Permissions *Permissions_STATUS `json:"permissions,omitempty"` // TenantId: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault. TenantId *string `json:"tenantId,omitempty"` }
An identity that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID.
type IPRule ¶
type IPRule struct { // Value: An IPv4 address range in CIDR notation, such as '124.56.78.91' (simple IP address) or '124.56.78.0/24' (all // addresses that start with 124.56.78). Value *string `json:"value,omitempty"` }
A rule governing the accessibility of a vault from a specific ip address or ip range.
type IPRule_STATUS ¶
type IPRule_STATUS struct { // Value: An IPv4 address range in CIDR notation, such as '124.56.78.91' (simple IP address) or '124.56.78.0/24' (all // addresses that start with 124.56.78). Value *string `json:"value,omitempty"` }
A rule governing the accessibility of a vault from a specific ip address or ip range.
type NetworkRuleSet ¶
type NetworkRuleSet struct { // Bypass: Tells what traffic can bypass network rules. This can be 'AzureServices' or 'None'. If not specified the // default is 'AzureServices'. Bypass *NetworkRuleSet_Bypass `json:"bypass,omitempty"` // DefaultAction: The default action when no rule from ipRules and from virtualNetworkRules match. This is only used after // the bypass property has been evaluated. DefaultAction *NetworkRuleSet_DefaultAction `json:"defaultAction,omitempty"` // IpRules: The list of IP address rules. IpRules []IPRule `json:"ipRules,omitempty"` // VirtualNetworkRules: The list of virtual network rules. VirtualNetworkRules []VirtualNetworkRule `json:"virtualNetworkRules,omitempty"` }
A set of rules governing the network accessibility of a vault.
type NetworkRuleSet_Bypass ¶
type NetworkRuleSet_Bypass string
+kubebuilder:validation:Enum={"AzureServices","None"}
type NetworkRuleSet_Bypass_STATUS ¶
type NetworkRuleSet_Bypass_STATUS string
type NetworkRuleSet_DefaultAction ¶
type NetworkRuleSet_DefaultAction string
+kubebuilder:validation:Enum={"Allow","Deny"}
type NetworkRuleSet_DefaultAction_STATUS ¶
type NetworkRuleSet_DefaultAction_STATUS string
type NetworkRuleSet_STATUS ¶
type NetworkRuleSet_STATUS struct { // Bypass: Tells what traffic can bypass network rules. This can be 'AzureServices' or 'None'. If not specified the // default is 'AzureServices'. Bypass *NetworkRuleSet_Bypass_STATUS `json:"bypass,omitempty"` // DefaultAction: The default action when no rule from ipRules and from virtualNetworkRules match. This is only used after // the bypass property has been evaluated. DefaultAction *NetworkRuleSet_DefaultAction_STATUS `json:"defaultAction,omitempty"` // IpRules: The list of IP address rules. IpRules []IPRule_STATUS `json:"ipRules,omitempty"` // VirtualNetworkRules: The list of virtual network rules. VirtualNetworkRules []VirtualNetworkRule_STATUS `json:"virtualNetworkRules,omitempty"` }
A set of rules governing the network accessibility of a vault.
type Permissions ¶
type Permissions struct { // Certificates: Permissions to certificates Certificates []Permissions_Certificates `json:"certificates,omitempty"` // Keys: Permissions to keys Keys []Permissions_Keys `json:"keys,omitempty"` // Secrets: Permissions to secrets Secrets []Permissions_Secrets `json:"secrets,omitempty"` // Storage: Permissions to storage accounts Storage []Permissions_Storage `json:"storage,omitempty"` }
Permissions the identity has for keys, secrets, certificates and storage.
type Permissions_Certificates ¶
type Permissions_Certificates string
+kubebuilder:validation:Enum={"backup","create","delete","deleteissuers","get","getissuers","import","list","listissuers","managecontacts","manageissuers","purge","recover","restore","setissuers","update"}
type Permissions_Certificates_STATUS ¶
type Permissions_Certificates_STATUS string
type Permissions_Keys ¶
type Permissions_Keys string
+kubebuilder:validation:Enum={"backup","create","decrypt","delete","encrypt","get","import","list","purge","recover","release","restore","sign","unwrapKey","update","verify","wrapKey"}
type Permissions_Keys_STATUS ¶
type Permissions_Keys_STATUS string
type Permissions_STATUS ¶
type Permissions_STATUS struct { // Certificates: Permissions to certificates Certificates []Permissions_Certificates_STATUS `json:"certificates,omitempty"` // Keys: Permissions to keys Keys []Permissions_Keys_STATUS `json:"keys,omitempty"` // Secrets: Permissions to secrets Secrets []Permissions_Secrets_STATUS `json:"secrets,omitempty"` // Storage: Permissions to storage accounts Storage []Permissions_Storage_STATUS `json:"storage,omitempty"` }
Permissions the identity has for keys, secrets, certificates and storage.
type Permissions_Secrets ¶
type Permissions_Secrets string
+kubebuilder:validation:Enum={"backup","delete","get","list","purge","recover","restore","set"}
type Permissions_Secrets_STATUS ¶
type Permissions_Secrets_STATUS string
type Permissions_Storage ¶
type Permissions_Storage string
+kubebuilder:validation:Enum={"backup","delete","deletesas","get","getsas","list","listsas","purge","recover","regeneratekey","restore","set","setsas","update"}
type Permissions_Storage_STATUS ¶
type Permissions_Storage_STATUS string
type PrivateEndpointConnectionItem_STATUS ¶
type PrivateEndpointConnectionItem_STATUS struct { // Etag: Modified whenever there is a change in the state of private endpoint connection. Etag *string `json:"etag,omitempty"` // Id: Id of private endpoint connection. Id *string `json:"id,omitempty"` // Properties: Private endpoint connection properties. Properties *PrivateEndpointConnectionProperties_STATUS `json:"properties,omitempty"` }
Private endpoint connection item.
type PrivateEndpointConnectionProperties_STATUS ¶
type PrivateEndpointConnectionProperties_STATUS struct { // PrivateEndpoint: Properties of the private endpoint object. PrivateEndpoint *PrivateEndpoint_STATUS `json:"privateEndpoint,omitempty"` // PrivateLinkServiceConnectionState: Approval state of the private link connection. PrivateLinkServiceConnectionState *PrivateLinkServiceConnectionState_STATUS `json:"privateLinkServiceConnectionState,omitempty"` // ProvisioningState: Provisioning state of the private endpoint connection. ProvisioningState *PrivateEndpointConnectionProvisioningState_STATUS `json:"provisioningState,omitempty"` }
Properties of the private endpoint connection resource.
type PrivateEndpointConnectionProvisioningState_STATUS ¶
type PrivateEndpointConnectionProvisioningState_STATUS string
The current provisioning state.
type PrivateEndpointServiceConnectionStatus_STATUS ¶
type PrivateEndpointServiceConnectionStatus_STATUS string
The private endpoint connection status.
type PrivateEndpoint_STATUS ¶
type PrivateEndpoint_STATUS struct { // Id: Full identifier of the private endpoint resource. Id *string `json:"id,omitempty"` }
Private endpoint object properties.
type PrivateLinkServiceConnectionState_ActionsRequired_STATUS ¶
type PrivateLinkServiceConnectionState_ActionsRequired_STATUS string
type PrivateLinkServiceConnectionState_STATUS ¶
type PrivateLinkServiceConnectionState_STATUS struct { // ActionsRequired: A message indicating if changes on the service provider require any updates on the consumer. ActionsRequired *PrivateLinkServiceConnectionState_ActionsRequired_STATUS `json:"actionsRequired,omitempty"` // Description: The reason for approval or rejection. Description *string `json:"description,omitempty"` // Status: Indicates whether the connection has been approved, rejected or removed by the key vault owner. Status *PrivateEndpointServiceConnectionStatus_STATUS `json:"status,omitempty"` }
An object that represents the approval state of the private link connection.
type Sku ¶
type Sku struct { // Family: SKU family name Family *Sku_Family `json:"family,omitempty"` // Name: SKU name to specify whether the key vault is a standard vault or a premium vault. Name *Sku_Name `json:"name,omitempty"` }
SKU details
type Sku_Family_STATUS ¶
type Sku_Family_STATUS string
type Sku_Name_STATUS ¶
type Sku_Name_STATUS string
type Sku_STATUS ¶
type Sku_STATUS struct { // Family: SKU family name Family *Sku_Family_STATUS `json:"family,omitempty"` // Name: SKU name to specify whether the key vault is a standard vault or a premium vault. Name *Sku_Name_STATUS `json:"name,omitempty"` }
SKU details
type SystemData_STATUS ¶
type SystemData_STATUS struct { // CreatedAt: The timestamp of the key vault resource creation (UTC). CreatedAt *string `json:"createdAt,omitempty"` // CreatedBy: The identity that created the key vault resource. CreatedBy *string `json:"createdBy,omitempty"` // CreatedByType: The type of identity that created the key vault resource. CreatedByType *IdentityType_STATUS `json:"createdByType,omitempty"` // LastModifiedAt: The timestamp of the key vault resource last modification (UTC). LastModifiedAt *string `json:"lastModifiedAt,omitempty"` // LastModifiedBy: The identity that last modified the key vault resource. LastModifiedBy *string `json:"lastModifiedBy,omitempty"` // LastModifiedByType: The type of identity that last modified the key vault resource. LastModifiedByType *IdentityType_STATUS `json:"lastModifiedByType,omitempty"` }
Metadata pertaining to creation and last modification of the key vault resource.
type VaultProperties ¶
type VaultProperties struct { // AccessPolicies: An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use // the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not // required. Otherwise, access policies are required. AccessPolicies []AccessPolicyEntry `json:"accessPolicies,omitempty"` // CreateMode: The vault's create mode to indicate whether the vault need to be recovered or not. CreateMode *VaultProperties_CreateMode `json:"createMode,omitempty"` // EnablePurgeProtection: Property specifying whether protection against purge is enabled for this vault. Setting this // property to true activates protection against purge for this vault and its content - only the Key Vault service may // initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this // functionality is irreversible - that is, the property does not accept false as its value. EnablePurgeProtection *bool `json:"enablePurgeProtection,omitempty"` // EnableRbacAuthorization: Property that controls how data actions are authorized. When true, the key vault will use Role // Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties // will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy // stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value // of false. Note that management actions are always authorized with RBAC. EnableRbacAuthorization *bool `json:"enableRbacAuthorization,omitempty"` // EnableSoftDelete: Property to specify whether the 'soft delete' functionality is enabled for this key vault. If it's not // set to any value(true or false) when creating new key vault, it will be set to true by default. Once set to true, it // cannot be reverted to false. EnableSoftDelete *bool `json:"enableSoftDelete,omitempty"` // EnabledForDeployment: Property to specify whether Azure Virtual Machines are permitted to retrieve certificates stored // as secrets from the key vault. EnabledForDeployment *bool `json:"enabledForDeployment,omitempty"` // EnabledForDiskEncryption: Property to specify whether Azure Disk Encryption is permitted to retrieve secrets from the // vault and unwrap keys. EnabledForDiskEncryption *bool `json:"enabledForDiskEncryption,omitempty"` // EnabledForTemplateDeployment: Property to specify whether Azure Resource Manager is permitted to retrieve secrets from // the key vault. EnabledForTemplateDeployment *bool `json:"enabledForTemplateDeployment,omitempty"` // NetworkAcls: Rules governing the accessibility of the key vault from specific network locations. NetworkAcls *NetworkRuleSet `json:"networkAcls,omitempty"` // ProvisioningState: Provisioning state of the vault. ProvisioningState *VaultProperties_ProvisioningState `json:"provisioningState,omitempty"` // Sku: SKU details Sku *Sku `json:"sku,omitempty"` // SoftDeleteRetentionInDays: softDelete data retention days. It accepts >=7 and <=90. SoftDeleteRetentionInDays *int `json:"softDeleteRetentionInDays,omitempty"` // TenantId: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault. TenantId *string `json:"tenantId,omitempty" optionalConfigMapPair:"TenantId"` // VaultUri: The URI of the vault for performing operations on keys and secrets. VaultUri *string `json:"vaultUri,omitempty"` }
Properties of the vault
type VaultProperties_CreateMode ¶
type VaultProperties_CreateMode string
+kubebuilder:validation:Enum={"createOrRecover","default","purgeThenCreate","recover"}
type VaultProperties_CreateMode_STATUS ¶
type VaultProperties_CreateMode_STATUS string
type VaultProperties_ProvisioningState ¶
type VaultProperties_ProvisioningState string
+kubebuilder:validation:Enum={"RegisteringDns","Succeeded"}
type VaultProperties_ProvisioningState_STATUS ¶
type VaultProperties_ProvisioningState_STATUS string
type VaultProperties_STATUS ¶
type VaultProperties_STATUS struct { // AccessPolicies: An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use // the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not // required. Otherwise, access policies are required. AccessPolicies []AccessPolicyEntry_STATUS `json:"accessPolicies,omitempty"` // CreateMode: The vault's create mode to indicate whether the vault need to be recovered or not. CreateMode *VaultProperties_CreateMode_STATUS `json:"createMode,omitempty"` // EnablePurgeProtection: Property specifying whether protection against purge is enabled for this vault. Setting this // property to true activates protection against purge for this vault and its content - only the Key Vault service may // initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this // functionality is irreversible - that is, the property does not accept false as its value. EnablePurgeProtection *bool `json:"enablePurgeProtection,omitempty"` // EnableRbacAuthorization: Property that controls how data actions are authorized. When true, the key vault will use Role // Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties // will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy // stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value // of false. Note that management actions are always authorized with RBAC. EnableRbacAuthorization *bool `json:"enableRbacAuthorization,omitempty"` // EnableSoftDelete: Property to specify whether the 'soft delete' functionality is enabled for this key vault. If it's not // set to any value(true or false) when creating new key vault, it will be set to true by default. Once set to true, it // cannot be reverted to false. EnableSoftDelete *bool `json:"enableSoftDelete,omitempty"` // EnabledForDeployment: Property to specify whether Azure Virtual Machines are permitted to retrieve certificates stored // as secrets from the key vault. EnabledForDeployment *bool `json:"enabledForDeployment,omitempty"` // EnabledForDiskEncryption: Property to specify whether Azure Disk Encryption is permitted to retrieve secrets from the // vault and unwrap keys. EnabledForDiskEncryption *bool `json:"enabledForDiskEncryption,omitempty"` // EnabledForTemplateDeployment: Property to specify whether Azure Resource Manager is permitted to retrieve secrets from // the key vault. EnabledForTemplateDeployment *bool `json:"enabledForTemplateDeployment,omitempty"` // HsmPoolResourceId: The resource id of HSM Pool. HsmPoolResourceId *string `json:"hsmPoolResourceId,omitempty"` // NetworkAcls: Rules governing the accessibility of the key vault from specific network locations. NetworkAcls *NetworkRuleSet_STATUS `json:"networkAcls,omitempty"` // PrivateEndpointConnections: List of private endpoint connections associated with the key vault. PrivateEndpointConnections []PrivateEndpointConnectionItem_STATUS `json:"privateEndpointConnections,omitempty"` // ProvisioningState: Provisioning state of the vault. ProvisioningState *VaultProperties_ProvisioningState_STATUS `json:"provisioningState,omitempty"` // Sku: SKU details Sku *Sku_STATUS `json:"sku,omitempty"` // SoftDeleteRetentionInDays: softDelete data retention days. It accepts >=7 and <=90. SoftDeleteRetentionInDays *int `json:"softDeleteRetentionInDays,omitempty"` // TenantId: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault. TenantId *string `json:"tenantId,omitempty"` // VaultUri: The URI of the vault for performing operations on keys and secrets. VaultUri *string `json:"vaultUri,omitempty"` }
Properties of the vault
type Vault_STATUS ¶
type Vault_STATUS struct { // Id: Fully qualified identifier of the key vault resource. Id *string `json:"id,omitempty"` // Location: Azure location of the key vault resource. Location *string `json:"location,omitempty"` // Name: Name of the key vault resource. Name *string `json:"name,omitempty"` // Properties: Properties of the vault Properties *VaultProperties_STATUS `json:"properties,omitempty"` // SystemData: System metadata for the key vault. SystemData *SystemData_STATUS `json:"systemData,omitempty"` // Tags: Tags assigned to the key vault resource. Tags map[string]string `json:"tags,omitempty"` // Type: Resource type of the key vault resource. Type *string `json:"type,omitempty"` }
Resource information with extended details.
type Vault_Spec ¶
type Vault_Spec struct { // Location: The supported Azure location where the key vault should be created. Location *string `json:"location,omitempty"` Name string `json:"name,omitempty"` // Properties: Properties of the vault Properties *VaultProperties `json:"properties,omitempty"` // Tags: The tags that will be assigned to the key vault. Tags map[string]string `json:"tags,omitempty"` }
func (Vault_Spec) GetAPIVersion ¶
func (vault Vault_Spec) GetAPIVersion() string
GetAPIVersion returns the ARM API version of the resource. This is always "2021-04-01-preview"
func (*Vault_Spec) GetName ¶
func (vault *Vault_Spec) GetName() string
GetName returns the Name of the resource
func (*Vault_Spec) GetType ¶
func (vault *Vault_Spec) GetType() string
GetType returns the ARM Type of the resource. This is always "Microsoft.KeyVault/vaults"
type VirtualNetworkRule ¶
type VirtualNetworkRule struct { Id *string `json:"id,omitempty"` // IgnoreMissingVnetServiceEndpoint: Property to specify whether NRP will ignore the check if parent subnet has // serviceEndpoints configured. IgnoreMissingVnetServiceEndpoint *bool `json:"ignoreMissingVnetServiceEndpoint,omitempty"` }
A rule governing the accessibility of a vault from a specific virtual network.
type VirtualNetworkRule_STATUS ¶
type VirtualNetworkRule_STATUS struct { // Id: Full resource id of a vnet subnet, such as // '/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/virtualNetworks/test-vnet/subnets/subnet1'. Id *string `json:"id,omitempty"` // IgnoreMissingVnetServiceEndpoint: Property to specify whether NRP will ignore the check if parent subnet has // serviceEndpoints configured. IgnoreMissingVnetServiceEndpoint *bool `json:"ignoreMissingVnetServiceEndpoint,omitempty"` }
A rule governing the accessibility of a vault from a specific virtual network.