Documentation ¶
Overview ¶
+kubebuilder:object:generate=true +groupName=consul.vault.upbound.io +versionName=v1alpha1
Index ¶
- Constants
- Variables
- type SecretBackend
- func (in *SecretBackend) DeepCopy() *SecretBackend
- func (in *SecretBackend) DeepCopyInto(out *SecretBackend)
- func (in *SecretBackend) DeepCopyObject() runtime.Object
- func (mg *SecretBackend) GetCondition(ct xpv1.ConditionType) xpv1.Condition
- func (tr *SecretBackend) GetConnectionDetailsMapping() map[string]string
- func (mg *SecretBackend) GetDeletionPolicy() xpv1.DeletionPolicy
- func (tr *SecretBackend) GetID() string
- func (tr *SecretBackend) GetInitParameters() (map[string]any, error)
- func (mg *SecretBackend) GetManagementPolicies() xpv1.ManagementPolicies
- func (tr *SecretBackend) GetObservation() (map[string]any, error)
- func (tr *SecretBackend) GetParameters() (map[string]any, error)
- func (mg *SecretBackend) GetProviderConfigReference() *xpv1.Reference
- func (mg *SecretBackend) GetProviderReference() *xpv1.Reference
- func (mg *SecretBackend) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo
- func (mg *SecretBackend) GetTerraformResourceType() string
- func (tr *SecretBackend) GetTerraformSchemaVersion() int
- func (mg *SecretBackend) GetWriteConnectionSecretToReference() *xpv1.SecretReference
- func (tr *SecretBackend) LateInitialize(attrs []byte) (bool, error)
- func (mg *SecretBackend) SetConditions(c ...xpv1.Condition)
- func (mg *SecretBackend) SetDeletionPolicy(r xpv1.DeletionPolicy)
- func (mg *SecretBackend) SetManagementPolicies(r xpv1.ManagementPolicies)
- func (tr *SecretBackend) SetObservation(obs map[string]any) error
- func (tr *SecretBackend) SetParameters(params map[string]any) error
- func (mg *SecretBackend) SetProviderConfigReference(r *xpv1.Reference)
- func (mg *SecretBackend) SetProviderReference(r *xpv1.Reference)
- func (mg *SecretBackend) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)
- func (mg *SecretBackend) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)
- type SecretBackendInitParameters
- type SecretBackendList
- type SecretBackendObservation
- type SecretBackendParameters
- type SecretBackendRole
- func (in *SecretBackendRole) DeepCopy() *SecretBackendRole
- func (in *SecretBackendRole) DeepCopyInto(out *SecretBackendRole)
- func (in *SecretBackendRole) DeepCopyObject() runtime.Object
- func (mg *SecretBackendRole) GetCondition(ct xpv1.ConditionType) xpv1.Condition
- func (tr *SecretBackendRole) GetConnectionDetailsMapping() map[string]string
- func (mg *SecretBackendRole) GetDeletionPolicy() xpv1.DeletionPolicy
- func (tr *SecretBackendRole) GetID() string
- func (tr *SecretBackendRole) GetInitParameters() (map[string]any, error)
- func (mg *SecretBackendRole) GetManagementPolicies() xpv1.ManagementPolicies
- func (tr *SecretBackendRole) GetObservation() (map[string]any, error)
- func (tr *SecretBackendRole) GetParameters() (map[string]any, error)
- func (mg *SecretBackendRole) GetProviderConfigReference() *xpv1.Reference
- func (mg *SecretBackendRole) GetProviderReference() *xpv1.Reference
- func (mg *SecretBackendRole) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo
- func (mg *SecretBackendRole) GetTerraformResourceType() string
- func (tr *SecretBackendRole) GetTerraformSchemaVersion() int
- func (mg *SecretBackendRole) GetWriteConnectionSecretToReference() *xpv1.SecretReference
- func (tr *SecretBackendRole) LateInitialize(attrs []byte) (bool, error)
- func (mg *SecretBackendRole) SetConditions(c ...xpv1.Condition)
- func (mg *SecretBackendRole) SetDeletionPolicy(r xpv1.DeletionPolicy)
- func (mg *SecretBackendRole) SetManagementPolicies(r xpv1.ManagementPolicies)
- func (tr *SecretBackendRole) SetObservation(obs map[string]any) error
- func (tr *SecretBackendRole) SetParameters(params map[string]any) error
- func (mg *SecretBackendRole) SetProviderConfigReference(r *xpv1.Reference)
- func (mg *SecretBackendRole) SetProviderReference(r *xpv1.Reference)
- func (mg *SecretBackendRole) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)
- func (mg *SecretBackendRole) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)
- type SecretBackendRoleInitParameters
- type SecretBackendRoleList
- type SecretBackendRoleObservation
- type SecretBackendRoleParameters
- type SecretBackendRoleSpec
- type SecretBackendRoleStatus
- type SecretBackendSpec
- type SecretBackendStatus
Constants ¶
const ( CRDGroup = "consul.vault.upbound.io" CRDVersion = "v1alpha1" )
Package type metadata.
Variables ¶
var ( // CRDGroupVersion is the API Group Version used to register the objects CRDGroupVersion = schema.GroupVersion{Group: CRDGroup, Version: CRDVersion} // SchemeBuilder is used to add go types to the GroupVersionKind scheme SchemeBuilder = &scheme.Builder{GroupVersion: CRDGroupVersion} // AddToScheme adds the types in this group-version to the given scheme. AddToScheme = SchemeBuilder.AddToScheme )
var ( SecretBackend_Kind = "SecretBackend" SecretBackend_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: SecretBackend_Kind}.String() SecretBackend_KindAPIVersion = SecretBackend_Kind + "." + CRDGroupVersion.String() SecretBackend_GroupVersionKind = CRDGroupVersion.WithKind(SecretBackend_Kind) )
Repository type metadata.
var ( SecretBackendRole_Kind = "SecretBackendRole" SecretBackendRole_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: SecretBackendRole_Kind}.String() SecretBackendRole_KindAPIVersion = SecretBackendRole_Kind + "." + CRDGroupVersion.String() SecretBackendRole_GroupVersionKind = CRDGroupVersion.WithKind(SecretBackendRole_Kind) )
Repository type metadata.
Functions ¶
This section is empty.
Types ¶
type SecretBackend ¶
type SecretBackend struct { metav1.TypeMeta `json:",inline"` metav1.ObjectMeta `json:"metadata,omitempty"` // +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.address) || has(self.initProvider.address)",message="address is a required parameter" Spec SecretBackendSpec `json:"spec"` Status SecretBackendStatus `json:"status,omitempty"` }
SecretBackend is the Schema for the SecretBackends API. Creates a Consul secret backend for Vault. +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}
func (*SecretBackend) DeepCopy ¶
func (in *SecretBackend) DeepCopy() *SecretBackend
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackend.
func (*SecretBackend) DeepCopyInto ¶
func (in *SecretBackend) DeepCopyInto(out *SecretBackend)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*SecretBackend) DeepCopyObject ¶
func (in *SecretBackend) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
func (*SecretBackend) GetCondition ¶
func (mg *SecretBackend) GetCondition(ct xpv1.ConditionType) xpv1.Condition
GetCondition of this SecretBackend.
func (*SecretBackend) GetConnectionDetailsMapping ¶
func (tr *SecretBackend) GetConnectionDetailsMapping() map[string]string
GetConnectionDetailsMapping for this SecretBackend
func (*SecretBackend) GetDeletionPolicy ¶
func (mg *SecretBackend) GetDeletionPolicy() xpv1.DeletionPolicy
GetDeletionPolicy of this SecretBackend.
func (*SecretBackend) GetID ¶
func (tr *SecretBackend) GetID() string
GetID returns ID of underlying Terraform resource of this SecretBackend
func (*SecretBackend) GetInitParameters ¶ added in v0.2.0
func (tr *SecretBackend) GetInitParameters() (map[string]any, error)
GetInitParameters of this SecretBackend
func (*SecretBackend) GetManagementPolicies ¶ added in v0.2.0
func (mg *SecretBackend) GetManagementPolicies() xpv1.ManagementPolicies
GetManagementPolicies of this SecretBackend.
func (*SecretBackend) GetObservation ¶
func (tr *SecretBackend) GetObservation() (map[string]any, error)
GetObservation of this SecretBackend
func (*SecretBackend) GetParameters ¶
func (tr *SecretBackend) GetParameters() (map[string]any, error)
GetParameters of this SecretBackend
func (*SecretBackend) GetProviderConfigReference ¶
func (mg *SecretBackend) GetProviderConfigReference() *xpv1.Reference
GetProviderConfigReference of this SecretBackend.
func (*SecretBackend) GetProviderReference ¶
func (mg *SecretBackend) GetProviderReference() *xpv1.Reference
GetProviderReference of this SecretBackend. Deprecated: Use GetProviderConfigReference.
func (*SecretBackend) GetPublishConnectionDetailsTo ¶
func (mg *SecretBackend) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo
GetPublishConnectionDetailsTo of this SecretBackend.
func (*SecretBackend) GetTerraformResourceType ¶
func (mg *SecretBackend) GetTerraformResourceType() string
GetTerraformResourceType returns Terraform resource type for this SecretBackend
func (*SecretBackend) GetTerraformSchemaVersion ¶
func (tr *SecretBackend) GetTerraformSchemaVersion() int
GetTerraformSchemaVersion returns the associated Terraform schema version
func (*SecretBackend) GetWriteConnectionSecretToReference ¶
func (mg *SecretBackend) GetWriteConnectionSecretToReference() *xpv1.SecretReference
GetWriteConnectionSecretToReference of this SecretBackend.
func (*SecretBackend) LateInitialize ¶
func (tr *SecretBackend) LateInitialize(attrs []byte) (bool, error)
LateInitialize this SecretBackend using its observed tfState. returns True if there are any spec changes for the resource.
func (*SecretBackend) SetConditions ¶
func (mg *SecretBackend) SetConditions(c ...xpv1.Condition)
SetConditions of this SecretBackend.
func (*SecretBackend) SetDeletionPolicy ¶
func (mg *SecretBackend) SetDeletionPolicy(r xpv1.DeletionPolicy)
SetDeletionPolicy of this SecretBackend.
func (*SecretBackend) SetManagementPolicies ¶ added in v0.2.0
func (mg *SecretBackend) SetManagementPolicies(r xpv1.ManagementPolicies)
SetManagementPolicies of this SecretBackend.
func (*SecretBackend) SetObservation ¶
func (tr *SecretBackend) SetObservation(obs map[string]any) error
SetObservation for this SecretBackend
func (*SecretBackend) SetParameters ¶
func (tr *SecretBackend) SetParameters(params map[string]any) error
SetParameters for this SecretBackend
func (*SecretBackend) SetProviderConfigReference ¶
func (mg *SecretBackend) SetProviderConfigReference(r *xpv1.Reference)
SetProviderConfigReference of this SecretBackend.
func (*SecretBackend) SetProviderReference ¶
func (mg *SecretBackend) SetProviderReference(r *xpv1.Reference)
SetProviderReference of this SecretBackend. Deprecated: Use SetProviderConfigReference.
func (*SecretBackend) SetPublishConnectionDetailsTo ¶
func (mg *SecretBackend) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)
SetPublishConnectionDetailsTo of this SecretBackend.
func (*SecretBackend) SetWriteConnectionSecretToReference ¶
func (mg *SecretBackend) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)
SetWriteConnectionSecretToReference of this SecretBackend.
type SecretBackendInitParameters ¶ added in v0.2.0
type SecretBackendInitParameters struct { // Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500". // Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500". Address *string `json:"address,omitempty" tf:"address,omitempty"` // Denotes that the resource is used to bootstrap the Consul ACL system. // Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap. Bootstrap *bool `json:"bootstrap,omitempty" tf:"bootstrap,omitempty"` // CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. // CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. CACert *string `json:"caCert,omitempty" tf:"ca_cert,omitempty"` // The default TTL for credentials issued by this backend. // Default lease duration for secrets in seconds DefaultLeaseTTLSeconds *float64 `json:"defaultLeaseTtlSeconds,omitempty" tf:"default_lease_ttl_seconds,omitempty"` // A human-friendly description for this backend. // Human-friendly description of the mount for the backend. Description *string `json:"description,omitempty" tf:"description,omitempty"` // If set, opts out of mount migration on path updates. // See here for more info on Mount Migration // If set, opts out of mount migration on path updates. DisableRemount *bool `json:"disableRemount,omitempty" tf:"disable_remount,omitempty"` // Specifies if the secret backend is local only. // Specifies if the secret backend is local only Local *bool `json:"local,omitempty" tf:"local,omitempty"` // The maximum TTL that can be requested // for credentials issued by this backend. // Maximum possible lease duration for secrets in seconds MaxLeaseTTLSeconds *float64 `json:"maxLeaseTtlSeconds,omitempty" tf:"max_lease_ttl_seconds,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // The unique location this backend should be mounted at. Must not begin or end with a /. Defaults // to consul. // Unique name of the Vault Consul mount to configure Path *string `json:"path,omitempty" tf:"path,omitempty"` // Specifies the URL scheme to use. Defaults to http. // Specifies the URL scheme to use. Defaults to "http". Scheme *string `json:"scheme,omitempty" tf:"scheme,omitempty"` }
func (*SecretBackendInitParameters) DeepCopy ¶ added in v0.2.0
func (in *SecretBackendInitParameters) DeepCopy() *SecretBackendInitParameters
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendInitParameters.
func (*SecretBackendInitParameters) DeepCopyInto ¶ added in v0.2.0
func (in *SecretBackendInitParameters) DeepCopyInto(out *SecretBackendInitParameters)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendList ¶
type SecretBackendList struct { metav1.TypeMeta `json:",inline"` metav1.ListMeta `json:"metadata,omitempty"` Items []SecretBackend `json:"items"` }
SecretBackendList contains a list of SecretBackends
func (*SecretBackendList) DeepCopy ¶
func (in *SecretBackendList) DeepCopy() *SecretBackendList
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendList.
func (*SecretBackendList) DeepCopyInto ¶
func (in *SecretBackendList) DeepCopyInto(out *SecretBackendList)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*SecretBackendList) DeepCopyObject ¶
func (in *SecretBackendList) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
func (*SecretBackendList) GetItems ¶
func (l *SecretBackendList) GetItems() []resource.Managed
GetItems of this SecretBackendList.
type SecretBackendObservation ¶
type SecretBackendObservation struct { // Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500". // Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500". Address *string `json:"address,omitempty" tf:"address,omitempty"` // Denotes that the resource is used to bootstrap the Consul ACL system. // Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap. Bootstrap *bool `json:"bootstrap,omitempty" tf:"bootstrap,omitempty"` // CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. // CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. CACert *string `json:"caCert,omitempty" tf:"ca_cert,omitempty"` // The default TTL for credentials issued by this backend. // Default lease duration for secrets in seconds DefaultLeaseTTLSeconds *float64 `json:"defaultLeaseTtlSeconds,omitempty" tf:"default_lease_ttl_seconds,omitempty"` // A human-friendly description for this backend. // Human-friendly description of the mount for the backend. Description *string `json:"description,omitempty" tf:"description,omitempty"` // If set, opts out of mount migration on path updates. // See here for more info on Mount Migration // If set, opts out of mount migration on path updates. DisableRemount *bool `json:"disableRemount,omitempty" tf:"disable_remount,omitempty"` ID *string `json:"id,omitempty" tf:"id,omitempty"` // Specifies if the secret backend is local only. // Specifies if the secret backend is local only Local *bool `json:"local,omitempty" tf:"local,omitempty"` // The maximum TTL that can be requested // for credentials issued by this backend. // Maximum possible lease duration for secrets in seconds MaxLeaseTTLSeconds *float64 `json:"maxLeaseTtlSeconds,omitempty" tf:"max_lease_ttl_seconds,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // The unique location this backend should be mounted at. Must not begin or end with a /. Defaults // to consul. // Unique name of the Vault Consul mount to configure Path *string `json:"path,omitempty" tf:"path,omitempty"` // Specifies the URL scheme to use. Defaults to http. // Specifies the URL scheme to use. Defaults to "http". Scheme *string `json:"scheme,omitempty" tf:"scheme,omitempty"` }
func (*SecretBackendObservation) DeepCopy ¶
func (in *SecretBackendObservation) DeepCopy() *SecretBackendObservation
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendObservation.
func (*SecretBackendObservation) DeepCopyInto ¶
func (in *SecretBackendObservation) DeepCopyInto(out *SecretBackendObservation)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendParameters ¶
type SecretBackendParameters struct { // Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500". // Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500". // +kubebuilder:validation:Optional Address *string `json:"address,omitempty" tf:"address,omitempty"` // Denotes that the resource is used to bootstrap the Consul ACL system. // Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap. // +kubebuilder:validation:Optional Bootstrap *bool `json:"bootstrap,omitempty" tf:"bootstrap,omitempty"` // CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. // CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. // +kubebuilder:validation:Optional CACert *string `json:"caCert,omitempty" tf:"ca_cert,omitempty"` // Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if // this is set you need to also set client_key. // Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. // +kubebuilder:validation:Optional ClientCertSecretRef *v1.SecretKeySelector `json:"clientCertSecretRef,omitempty" tf:"-"` // Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set // you need to also set client_cert. // Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. // +kubebuilder:validation:Optional ClientKeySecretRef *v1.SecretKeySelector `json:"clientKeySecretRef,omitempty" tf:"-"` // The default TTL for credentials issued by this backend. // Default lease duration for secrets in seconds // +kubebuilder:validation:Optional DefaultLeaseTTLSeconds *float64 `json:"defaultLeaseTtlSeconds,omitempty" tf:"default_lease_ttl_seconds,omitempty"` // A human-friendly description for this backend. // Human-friendly description of the mount for the backend. // +kubebuilder:validation:Optional Description *string `json:"description,omitempty" tf:"description,omitempty"` // If set, opts out of mount migration on path updates. // See here for more info on Mount Migration // If set, opts out of mount migration on path updates. // +kubebuilder:validation:Optional DisableRemount *bool `json:"disableRemount,omitempty" tf:"disable_remount,omitempty"` // Specifies if the secret backend is local only. // Specifies if the secret backend is local only // +kubebuilder:validation:Optional Local *bool `json:"local,omitempty" tf:"local,omitempty"` // The maximum TTL that can be requested // for credentials issued by this backend. // Maximum possible lease duration for secrets in seconds // +kubebuilder:validation:Optional MaxLeaseTTLSeconds *float64 `json:"maxLeaseTtlSeconds,omitempty" tf:"max_lease_ttl_seconds,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) // +kubebuilder:validation:Optional Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // The unique location this backend should be mounted at. Must not begin or end with a /. Defaults // to consul. // Unique name of the Vault Consul mount to configure // +kubebuilder:validation:Optional Path *string `json:"path,omitempty" tf:"path,omitempty"` // Specifies the URL scheme to use. Defaults to http. // Specifies the URL scheme to use. Defaults to "http". // +kubebuilder:validation:Optional Scheme *string `json:"scheme,omitempty" tf:"scheme,omitempty"` // The Consul management token this backend should use to issue new tokens. This field is required // when bootstrap is false. // Specifies the Consul token to use when managing or issuing new tokens. // +kubebuilder:validation:Optional TokenSecretRef *v1.SecretKeySelector `json:"tokenSecretRef,omitempty" tf:"-"` }
func (*SecretBackendParameters) DeepCopy ¶
func (in *SecretBackendParameters) DeepCopy() *SecretBackendParameters
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendParameters.
func (*SecretBackendParameters) DeepCopyInto ¶
func (in *SecretBackendParameters) DeepCopyInto(out *SecretBackendParameters)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendRole ¶
type SecretBackendRole struct { metav1.TypeMeta `json:",inline"` metav1.ObjectMeta `json:"metadata,omitempty"` // +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.name) || has(self.initProvider.name)",message="name is a required parameter" Spec SecretBackendRoleSpec `json:"spec"` Status SecretBackendRoleStatus `json:"status,omitempty"` }
SecretBackendRole is the Schema for the SecretBackendRoles API. Manages a Consul secrets role for a Consul secrets engine in Vault. +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}
func (*SecretBackendRole) DeepCopy ¶
func (in *SecretBackendRole) DeepCopy() *SecretBackendRole
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRole.
func (*SecretBackendRole) DeepCopyInto ¶
func (in *SecretBackendRole) DeepCopyInto(out *SecretBackendRole)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*SecretBackendRole) DeepCopyObject ¶
func (in *SecretBackendRole) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
func (*SecretBackendRole) GetCondition ¶
func (mg *SecretBackendRole) GetCondition(ct xpv1.ConditionType) xpv1.Condition
GetCondition of this SecretBackendRole.
func (*SecretBackendRole) GetConnectionDetailsMapping ¶
func (tr *SecretBackendRole) GetConnectionDetailsMapping() map[string]string
GetConnectionDetailsMapping for this SecretBackendRole
func (*SecretBackendRole) GetDeletionPolicy ¶
func (mg *SecretBackendRole) GetDeletionPolicy() xpv1.DeletionPolicy
GetDeletionPolicy of this SecretBackendRole.
func (*SecretBackendRole) GetID ¶
func (tr *SecretBackendRole) GetID() string
GetID returns ID of underlying Terraform resource of this SecretBackendRole
func (*SecretBackendRole) GetInitParameters ¶ added in v0.2.0
func (tr *SecretBackendRole) GetInitParameters() (map[string]any, error)
GetInitParameters of this SecretBackendRole
func (*SecretBackendRole) GetManagementPolicies ¶ added in v0.2.0
func (mg *SecretBackendRole) GetManagementPolicies() xpv1.ManagementPolicies
GetManagementPolicies of this SecretBackendRole.
func (*SecretBackendRole) GetObservation ¶
func (tr *SecretBackendRole) GetObservation() (map[string]any, error)
GetObservation of this SecretBackendRole
func (*SecretBackendRole) GetParameters ¶
func (tr *SecretBackendRole) GetParameters() (map[string]any, error)
GetParameters of this SecretBackendRole
func (*SecretBackendRole) GetProviderConfigReference ¶
func (mg *SecretBackendRole) GetProviderConfigReference() *xpv1.Reference
GetProviderConfigReference of this SecretBackendRole.
func (*SecretBackendRole) GetProviderReference ¶
func (mg *SecretBackendRole) GetProviderReference() *xpv1.Reference
GetProviderReference of this SecretBackendRole. Deprecated: Use GetProviderConfigReference.
func (*SecretBackendRole) GetPublishConnectionDetailsTo ¶
func (mg *SecretBackendRole) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo
GetPublishConnectionDetailsTo of this SecretBackendRole.
func (*SecretBackendRole) GetTerraformResourceType ¶
func (mg *SecretBackendRole) GetTerraformResourceType() string
GetTerraformResourceType returns Terraform resource type for this SecretBackendRole
func (*SecretBackendRole) GetTerraformSchemaVersion ¶
func (tr *SecretBackendRole) GetTerraformSchemaVersion() int
GetTerraformSchemaVersion returns the associated Terraform schema version
func (*SecretBackendRole) GetWriteConnectionSecretToReference ¶
func (mg *SecretBackendRole) GetWriteConnectionSecretToReference() *xpv1.SecretReference
GetWriteConnectionSecretToReference of this SecretBackendRole.
func (*SecretBackendRole) LateInitialize ¶
func (tr *SecretBackendRole) LateInitialize(attrs []byte) (bool, error)
LateInitialize this SecretBackendRole using its observed tfState. returns True if there are any spec changes for the resource.
func (*SecretBackendRole) SetConditions ¶
func (mg *SecretBackendRole) SetConditions(c ...xpv1.Condition)
SetConditions of this SecretBackendRole.
func (*SecretBackendRole) SetDeletionPolicy ¶
func (mg *SecretBackendRole) SetDeletionPolicy(r xpv1.DeletionPolicy)
SetDeletionPolicy of this SecretBackendRole.
func (*SecretBackendRole) SetManagementPolicies ¶ added in v0.2.0
func (mg *SecretBackendRole) SetManagementPolicies(r xpv1.ManagementPolicies)
SetManagementPolicies of this SecretBackendRole.
func (*SecretBackendRole) SetObservation ¶
func (tr *SecretBackendRole) SetObservation(obs map[string]any) error
SetObservation for this SecretBackendRole
func (*SecretBackendRole) SetParameters ¶
func (tr *SecretBackendRole) SetParameters(params map[string]any) error
SetParameters for this SecretBackendRole
func (*SecretBackendRole) SetProviderConfigReference ¶
func (mg *SecretBackendRole) SetProviderConfigReference(r *xpv1.Reference)
SetProviderConfigReference of this SecretBackendRole.
func (*SecretBackendRole) SetProviderReference ¶
func (mg *SecretBackendRole) SetProviderReference(r *xpv1.Reference)
SetProviderReference of this SecretBackendRole. Deprecated: Use SetProviderConfigReference.
func (*SecretBackendRole) SetPublishConnectionDetailsTo ¶
func (mg *SecretBackendRole) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)
SetPublishConnectionDetailsTo of this SecretBackendRole.
func (*SecretBackendRole) SetWriteConnectionSecretToReference ¶
func (mg *SecretBackendRole) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)
SetWriteConnectionSecretToReference of this SecretBackendRole.
type SecretBackendRoleInitParameters ¶ added in v0.2.0
type SecretBackendRoleInitParameters struct { // The unique name of an existing Consul secrets backend mount. Must not begin or end with a /. One of path or backend is required. // The path of the Consul Secret Backend the role belongs to. Backend *string `json:"backend,omitempty" tf:"backend,omitempty"` // The Consul namespace that the token will be created in. // Applicable for Vault 1.10+ and Consul 1.7+". // The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+ ConsulNamespace *string `json:"consulNamespace,omitempty" tf:"consul_namespace,omitempty"` // SEE NOTE The list of Consul ACL policies to associate with these roles. // List of Consul policies to associate with this role ConsulPolicies []*string `json:"consulPolicies,omitempty" tf:"consul_policies,omitempty"` // SEE NOTE Set of Consul roles to attach to the token. // Applicable for Vault 1.10+ with Consul 1.5+. // Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+ ConsulRoles []*string `json:"consulRoles,omitempty" tf:"consul_roles,omitempty"` // Indicates that the token should not be replicated globally and instead be local to the current datacenter. // Indicates that the token should not be replicated globally and instead be local to the current datacenter. Local *bool `json:"local,omitempty" tf:"local,omitempty"` // Maximum TTL for leases associated with this role, in seconds. // Maximum TTL for leases associated with this role, in seconds. MaxTTL *float64 `json:"maxTtl,omitempty" tf:"max_ttl,omitempty"` // The name of the Consul secrets engine role to create. // The name of an existing role against which to create this Consul credential Name *string `json:"name,omitempty" tf:"name,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // SEE NOTE Set of Consul node // identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+. // Set of Consul node identities to attach to // the token. Applicable for Vault 1.11+ with Consul 1.8+ NodeIdentities []*string `json:"nodeIdentities,omitempty" tf:"node_identities,omitempty"` // The admin partition that the token will be created in. // Applicable for Vault 1.10+ and Consul 1.11+". // The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+ Partition *string `json:"partition,omitempty" tf:"partition,omitempty"` // The list of Consul ACL policies to associate with these roles. // NOTE: The new parameter consul_policies should be used in favor of this. This parameter, // policies, remains supported for legacy users, but Vault has deprecated this field. // List of Consul policies to associate with this role Policies []*string `json:"policies,omitempty" tf:"policies,omitempty"` // SEE NOTE Set of Consul // service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. // Set of Consul service identities to attach to // the token. Applicable for Vault 1.11+ with Consul 1.5+ ServiceIdentities []*string `json:"serviceIdentities,omitempty" tf:"service_identities,omitempty"` // Specifies the TTL for this role. // Specifies the TTL for this role. TTL *float64 `json:"ttl,omitempty" tf:"ttl,omitempty"` // Specifies the type of token to create when using this role. Valid values are "client" or "management". // Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field. // Specifies the type of token to create when using this role. Valid values are "client" or "management". TokenType *string `json:"tokenType,omitempty" tf:"token_type,omitempty"` }
func (*SecretBackendRoleInitParameters) DeepCopy ¶ added in v0.2.0
func (in *SecretBackendRoleInitParameters) DeepCopy() *SecretBackendRoleInitParameters
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleInitParameters.
func (*SecretBackendRoleInitParameters) DeepCopyInto ¶ added in v0.2.0
func (in *SecretBackendRoleInitParameters) DeepCopyInto(out *SecretBackendRoleInitParameters)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendRoleList ¶
type SecretBackendRoleList struct { metav1.TypeMeta `json:",inline"` metav1.ListMeta `json:"metadata,omitempty"` Items []SecretBackendRole `json:"items"` }
SecretBackendRoleList contains a list of SecretBackendRoles
func (*SecretBackendRoleList) DeepCopy ¶
func (in *SecretBackendRoleList) DeepCopy() *SecretBackendRoleList
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleList.
func (*SecretBackendRoleList) DeepCopyInto ¶
func (in *SecretBackendRoleList) DeepCopyInto(out *SecretBackendRoleList)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*SecretBackendRoleList) DeepCopyObject ¶
func (in *SecretBackendRoleList) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
func (*SecretBackendRoleList) GetItems ¶
func (l *SecretBackendRoleList) GetItems() []resource.Managed
GetItems of this SecretBackendRoleList.
type SecretBackendRoleObservation ¶
type SecretBackendRoleObservation struct { // The unique name of an existing Consul secrets backend mount. Must not begin or end with a /. One of path or backend is required. // The path of the Consul Secret Backend the role belongs to. Backend *string `json:"backend,omitempty" tf:"backend,omitempty"` // The Consul namespace that the token will be created in. // Applicable for Vault 1.10+ and Consul 1.7+". // The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+ ConsulNamespace *string `json:"consulNamespace,omitempty" tf:"consul_namespace,omitempty"` // SEE NOTE The list of Consul ACL policies to associate with these roles. // List of Consul policies to associate with this role ConsulPolicies []*string `json:"consulPolicies,omitempty" tf:"consul_policies,omitempty"` // SEE NOTE Set of Consul roles to attach to the token. // Applicable for Vault 1.10+ with Consul 1.5+. // Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+ ConsulRoles []*string `json:"consulRoles,omitempty" tf:"consul_roles,omitempty"` ID *string `json:"id,omitempty" tf:"id,omitempty"` // Indicates that the token should not be replicated globally and instead be local to the current datacenter. // Indicates that the token should not be replicated globally and instead be local to the current datacenter. Local *bool `json:"local,omitempty" tf:"local,omitempty"` // Maximum TTL for leases associated with this role, in seconds. // Maximum TTL for leases associated with this role, in seconds. MaxTTL *float64 `json:"maxTtl,omitempty" tf:"max_ttl,omitempty"` // The name of the Consul secrets engine role to create. // The name of an existing role against which to create this Consul credential Name *string `json:"name,omitempty" tf:"name,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // SEE NOTE Set of Consul node // identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+. // Set of Consul node identities to attach to // the token. Applicable for Vault 1.11+ with Consul 1.8+ NodeIdentities []*string `json:"nodeIdentities,omitempty" tf:"node_identities,omitempty"` // The admin partition that the token will be created in. // Applicable for Vault 1.10+ and Consul 1.11+". // The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+ Partition *string `json:"partition,omitempty" tf:"partition,omitempty"` // The list of Consul ACL policies to associate with these roles. // NOTE: The new parameter consul_policies should be used in favor of this. This parameter, // policies, remains supported for legacy users, but Vault has deprecated this field. // List of Consul policies to associate with this role Policies []*string `json:"policies,omitempty" tf:"policies,omitempty"` // SEE NOTE Set of Consul // service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. // Set of Consul service identities to attach to // the token. Applicable for Vault 1.11+ with Consul 1.5+ ServiceIdentities []*string `json:"serviceIdentities,omitempty" tf:"service_identities,omitempty"` // Specifies the TTL for this role. // Specifies the TTL for this role. TTL *float64 `json:"ttl,omitempty" tf:"ttl,omitempty"` // Specifies the type of token to create when using this role. Valid values are "client" or "management". // Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field. // Specifies the type of token to create when using this role. Valid values are "client" or "management". TokenType *string `json:"tokenType,omitempty" tf:"token_type,omitempty"` }
func (*SecretBackendRoleObservation) DeepCopy ¶
func (in *SecretBackendRoleObservation) DeepCopy() *SecretBackendRoleObservation
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleObservation.
func (*SecretBackendRoleObservation) DeepCopyInto ¶
func (in *SecretBackendRoleObservation) DeepCopyInto(out *SecretBackendRoleObservation)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendRoleParameters ¶
type SecretBackendRoleParameters struct { // The unique name of an existing Consul secrets backend mount. Must not begin or end with a /. One of path or backend is required. // The path of the Consul Secret Backend the role belongs to. // +kubebuilder:validation:Optional Backend *string `json:"backend,omitempty" tf:"backend,omitempty"` // The Consul namespace that the token will be created in. // Applicable for Vault 1.10+ and Consul 1.7+". // The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+ // +kubebuilder:validation:Optional ConsulNamespace *string `json:"consulNamespace,omitempty" tf:"consul_namespace,omitempty"` // SEE NOTE The list of Consul ACL policies to associate with these roles. // List of Consul policies to associate with this role // +kubebuilder:validation:Optional ConsulPolicies []*string `json:"consulPolicies,omitempty" tf:"consul_policies,omitempty"` // SEE NOTE Set of Consul roles to attach to the token. // Applicable for Vault 1.10+ with Consul 1.5+. // Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+ // +kubebuilder:validation:Optional ConsulRoles []*string `json:"consulRoles,omitempty" tf:"consul_roles,omitempty"` // Indicates that the token should not be replicated globally and instead be local to the current datacenter. // Indicates that the token should not be replicated globally and instead be local to the current datacenter. // +kubebuilder:validation:Optional Local *bool `json:"local,omitempty" tf:"local,omitempty"` // Maximum TTL for leases associated with this role, in seconds. // Maximum TTL for leases associated with this role, in seconds. // +kubebuilder:validation:Optional MaxTTL *float64 `json:"maxTtl,omitempty" tf:"max_ttl,omitempty"` // The name of the Consul secrets engine role to create. // The name of an existing role against which to create this Consul credential // +kubebuilder:validation:Optional Name *string `json:"name,omitempty" tf:"name,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) // +kubebuilder:validation:Optional Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // SEE NOTE Set of Consul node // identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+. // Set of Consul node identities to attach to // the token. Applicable for Vault 1.11+ with Consul 1.8+ // +kubebuilder:validation:Optional NodeIdentities []*string `json:"nodeIdentities,omitempty" tf:"node_identities,omitempty"` // The admin partition that the token will be created in. // Applicable for Vault 1.10+ and Consul 1.11+". // The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+ // +kubebuilder:validation:Optional Partition *string `json:"partition,omitempty" tf:"partition,omitempty"` // The list of Consul ACL policies to associate with these roles. // NOTE: The new parameter consul_policies should be used in favor of this. This parameter, // policies, remains supported for legacy users, but Vault has deprecated this field. // List of Consul policies to associate with this role // +kubebuilder:validation:Optional Policies []*string `json:"policies,omitempty" tf:"policies,omitempty"` // SEE NOTE Set of Consul // service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. // Set of Consul service identities to attach to // the token. Applicable for Vault 1.11+ with Consul 1.5+ // +kubebuilder:validation:Optional ServiceIdentities []*string `json:"serviceIdentities,omitempty" tf:"service_identities,omitempty"` // Specifies the TTL for this role. // Specifies the TTL for this role. // +kubebuilder:validation:Optional TTL *float64 `json:"ttl,omitempty" tf:"ttl,omitempty"` // Specifies the type of token to create when using this role. Valid values are "client" or "management". // Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field. // Specifies the type of token to create when using this role. Valid values are "client" or "management". // +kubebuilder:validation:Optional TokenType *string `json:"tokenType,omitempty" tf:"token_type,omitempty"` }
func (*SecretBackendRoleParameters) DeepCopy ¶
func (in *SecretBackendRoleParameters) DeepCopy() *SecretBackendRoleParameters
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleParameters.
func (*SecretBackendRoleParameters) DeepCopyInto ¶
func (in *SecretBackendRoleParameters) DeepCopyInto(out *SecretBackendRoleParameters)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendRoleSpec ¶
type SecretBackendRoleSpec struct { v1.ResourceSpec `json:",inline"` ForProvider SecretBackendRoleParameters `json:"forProvider"` // THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored // unless the relevant Crossplane feature flag is enabled, and may be // changed or removed without notice. // InitProvider holds the same fields as ForProvider, with the exception // of Identifier and other resource reference fields. The fields that are // in InitProvider are merged into ForProvider when the resource is created. // The same fields are also added to the terraform ignore_changes hook, to // avoid updating them after creation. This is useful for fields that are // required on creation, but we do not desire to update them after creation, // for example because of an external controller is managing them, like an // autoscaler. InitProvider SecretBackendRoleInitParameters `json:"initProvider,omitempty"` }
SecretBackendRoleSpec defines the desired state of SecretBackendRole
func (*SecretBackendRoleSpec) DeepCopy ¶
func (in *SecretBackendRoleSpec) DeepCopy() *SecretBackendRoleSpec
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleSpec.
func (*SecretBackendRoleSpec) DeepCopyInto ¶
func (in *SecretBackendRoleSpec) DeepCopyInto(out *SecretBackendRoleSpec)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendRoleStatus ¶
type SecretBackendRoleStatus struct { v1.ResourceStatus `json:",inline"` AtProvider SecretBackendRoleObservation `json:"atProvider,omitempty"` }
SecretBackendRoleStatus defines the observed state of SecretBackendRole.
func (*SecretBackendRoleStatus) DeepCopy ¶
func (in *SecretBackendRoleStatus) DeepCopy() *SecretBackendRoleStatus
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleStatus.
func (*SecretBackendRoleStatus) DeepCopyInto ¶
func (in *SecretBackendRoleStatus) DeepCopyInto(out *SecretBackendRoleStatus)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendSpec ¶
type SecretBackendSpec struct { v1.ResourceSpec `json:",inline"` ForProvider SecretBackendParameters `json:"forProvider"` // THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored // unless the relevant Crossplane feature flag is enabled, and may be // changed or removed without notice. // InitProvider holds the same fields as ForProvider, with the exception // of Identifier and other resource reference fields. The fields that are // in InitProvider are merged into ForProvider when the resource is created. // The same fields are also added to the terraform ignore_changes hook, to // avoid updating them after creation. This is useful for fields that are // required on creation, but we do not desire to update them after creation, // for example because of an external controller is managing them, like an // autoscaler. InitProvider SecretBackendInitParameters `json:"initProvider,omitempty"` }
SecretBackendSpec defines the desired state of SecretBackend
func (*SecretBackendSpec) DeepCopy ¶
func (in *SecretBackendSpec) DeepCopy() *SecretBackendSpec
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendSpec.
func (*SecretBackendSpec) DeepCopyInto ¶
func (in *SecretBackendSpec) DeepCopyInto(out *SecretBackendSpec)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendStatus ¶
type SecretBackendStatus struct { v1.ResourceStatus `json:",inline"` AtProvider SecretBackendObservation `json:"atProvider,omitempty"` }
SecretBackendStatus defines the observed state of SecretBackend.
func (*SecretBackendStatus) DeepCopy ¶
func (in *SecretBackendStatus) DeepCopy() *SecretBackendStatus
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendStatus.
func (*SecretBackendStatus) DeepCopyInto ¶
func (in *SecretBackendStatus) DeepCopyInto(out *SecretBackendStatus)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.