v1alpha1

package
v1.0.0 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: May 14, 2024 License: Apache-2.0 Imports: 9 Imported by: 0

Documentation

Overview

+kubebuilder:object:generate=true +groupName=pki.vault.upbound.io +versionName=v1alpha1

Index

Constants

View Source
const (
	CRDGroup   = "pki.vault.upbound.io"
	CRDVersion = "v1alpha1"
)

Package type metadata.

Variables

View Source
var (
	// CRDGroupVersion is the API Group Version used to register the objects
	CRDGroupVersion = schema.GroupVersion{Group: CRDGroup, Version: CRDVersion}

	// SchemeBuilder is used to add go types to the GroupVersionKind scheme
	SchemeBuilder = &scheme.Builder{GroupVersion: CRDGroupVersion}

	// AddToScheme adds the types in this group-version to the given scheme.
	AddToScheme = SchemeBuilder.AddToScheme
)
View Source
var (
	SecretBackendCert_Kind             = "SecretBackendCert"
	SecretBackendCert_GroupKind        = schema.GroupKind{Group: CRDGroup, Kind: SecretBackendCert_Kind}.String()
	SecretBackendCert_KindAPIVersion   = SecretBackendCert_Kind + "." + CRDGroupVersion.String()
	SecretBackendCert_GroupVersionKind = CRDGroupVersion.WithKind(SecretBackendCert_Kind)
)

Repository type metadata.

View Source
var (
	SecretBackendConfigCA_Kind             = "SecretBackendConfigCA"
	SecretBackendConfigCA_GroupKind        = schema.GroupKind{Group: CRDGroup, Kind: SecretBackendConfigCA_Kind}.String()
	SecretBackendConfigCA_KindAPIVersion   = SecretBackendConfigCA_Kind + "." + CRDGroupVersion.String()
	SecretBackendConfigCA_GroupVersionKind = CRDGroupVersion.WithKind(SecretBackendConfigCA_Kind)
)

Repository type metadata.

View Source
var (
	SecretBackendConfigUrls_Kind             = "SecretBackendConfigUrls"
	SecretBackendConfigUrls_GroupKind        = schema.GroupKind{Group: CRDGroup, Kind: SecretBackendConfigUrls_Kind}.String()
	SecretBackendConfigUrls_KindAPIVersion   = SecretBackendConfigUrls_Kind + "." + CRDGroupVersion.String()
	SecretBackendConfigUrls_GroupVersionKind = CRDGroupVersion.WithKind(SecretBackendConfigUrls_Kind)
)

Repository type metadata.

View Source
var (
	SecretBackendCrlConfig_Kind             = "SecretBackendCrlConfig"
	SecretBackendCrlConfig_GroupKind        = schema.GroupKind{Group: CRDGroup, Kind: SecretBackendCrlConfig_Kind}.String()
	SecretBackendCrlConfig_KindAPIVersion   = SecretBackendCrlConfig_Kind + "." + CRDGroupVersion.String()
	SecretBackendCrlConfig_GroupVersionKind = CRDGroupVersion.WithKind(SecretBackendCrlConfig_Kind)
)

Repository type metadata.

View Source
var (
	SecretBackendIntermediateCertRequest_Kind             = "SecretBackendIntermediateCertRequest"
	SecretBackendIntermediateCertRequest_GroupKind        = schema.GroupKind{Group: CRDGroup, Kind: SecretBackendIntermediateCertRequest_Kind}.String()
	SecretBackendIntermediateCertRequest_KindAPIVersion   = SecretBackendIntermediateCertRequest_Kind + "." + CRDGroupVersion.String()
	SecretBackendIntermediateCertRequest_GroupVersionKind = CRDGroupVersion.WithKind(SecretBackendIntermediateCertRequest_Kind)
)

Repository type metadata.

View Source
var (
	SecretBackendIntermediateSetSigned_Kind             = "SecretBackendIntermediateSetSigned"
	SecretBackendIntermediateSetSigned_GroupKind        = schema.GroupKind{Group: CRDGroup, Kind: SecretBackendIntermediateSetSigned_Kind}.String()
	SecretBackendIntermediateSetSigned_KindAPIVersion   = SecretBackendIntermediateSetSigned_Kind + "." + CRDGroupVersion.String()
	SecretBackendIntermediateSetSigned_GroupVersionKind = CRDGroupVersion.WithKind(SecretBackendIntermediateSetSigned_Kind)
)

Repository type metadata.

View Source
var (
	SecretBackendRole_Kind             = "SecretBackendRole"
	SecretBackendRole_GroupKind        = schema.GroupKind{Group: CRDGroup, Kind: SecretBackendRole_Kind}.String()
	SecretBackendRole_KindAPIVersion   = SecretBackendRole_Kind + "." + CRDGroupVersion.String()
	SecretBackendRole_GroupVersionKind = CRDGroupVersion.WithKind(SecretBackendRole_Kind)
)

Repository type metadata.

View Source
var (
	SecretBackendRootCert_Kind             = "SecretBackendRootCert"
	SecretBackendRootCert_GroupKind        = schema.GroupKind{Group: CRDGroup, Kind: SecretBackendRootCert_Kind}.String()
	SecretBackendRootCert_KindAPIVersion   = SecretBackendRootCert_Kind + "." + CRDGroupVersion.String()
	SecretBackendRootCert_GroupVersionKind = CRDGroupVersion.WithKind(SecretBackendRootCert_Kind)
)

Repository type metadata.

View Source
var (
	SecretBackendRootSignIntermediate_Kind             = "SecretBackendRootSignIntermediate"
	SecretBackendRootSignIntermediate_GroupKind        = schema.GroupKind{Group: CRDGroup, Kind: SecretBackendRootSignIntermediate_Kind}.String()
	SecretBackendRootSignIntermediate_KindAPIVersion   = SecretBackendRootSignIntermediate_Kind + "." + CRDGroupVersion.String()
	SecretBackendRootSignIntermediate_GroupVersionKind = CRDGroupVersion.WithKind(SecretBackendRootSignIntermediate_Kind)
)

Repository type metadata.

View Source
var (
	SecretBackendSign_Kind             = "SecretBackendSign"
	SecretBackendSign_GroupKind        = schema.GroupKind{Group: CRDGroup, Kind: SecretBackendSign_Kind}.String()
	SecretBackendSign_KindAPIVersion   = SecretBackendSign_Kind + "." + CRDGroupVersion.String()
	SecretBackendSign_GroupVersionKind = CRDGroupVersion.WithKind(SecretBackendSign_Kind)
)

Repository type metadata.

Functions

This section is empty.

Types

type PolicyIdentifierInitParameters added in v0.2.0

type PolicyIdentifierInitParameters struct {

	// The URL of the CPS for the policy identifier
	// Optional CPS URL
	Cps *string `json:"cps,omitempty" tf:"cps,omitempty"`

	// A notice for the policy identifier
	// Optional notice
	Notice *string `json:"notice,omitempty" tf:"notice,omitempty"`

	// The OID for the policy identifier
	// OID
	Oid *string `json:"oid,omitempty" tf:"oid,omitempty"`
}

func (*PolicyIdentifierInitParameters) DeepCopy added in v0.2.0

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PolicyIdentifierInitParameters.

func (*PolicyIdentifierInitParameters) DeepCopyInto added in v0.2.0

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type PolicyIdentifierObservation

type PolicyIdentifierObservation struct {

	// The URL of the CPS for the policy identifier
	// Optional CPS URL
	Cps *string `json:"cps,omitempty" tf:"cps,omitempty"`

	// A notice for the policy identifier
	// Optional notice
	Notice *string `json:"notice,omitempty" tf:"notice,omitempty"`

	// The OID for the policy identifier
	// OID
	Oid *string `json:"oid,omitempty" tf:"oid,omitempty"`
}

func (*PolicyIdentifierObservation) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PolicyIdentifierObservation.

func (*PolicyIdentifierObservation) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type PolicyIdentifierParameters

type PolicyIdentifierParameters struct {

	// The URL of the CPS for the policy identifier
	// Optional CPS URL
	// +kubebuilder:validation:Optional
	Cps *string `json:"cps,omitempty" tf:"cps,omitempty"`

	// A notice for the policy identifier
	// Optional notice
	// +kubebuilder:validation:Optional
	Notice *string `json:"notice,omitempty" tf:"notice,omitempty"`

	// The OID for the policy identifier
	// OID
	// +kubebuilder:validation:Optional
	Oid *string `json:"oid,omitempty" tf:"oid,omitempty"`
}

func (*PolicyIdentifierParameters) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PolicyIdentifierParameters.

func (*PolicyIdentifierParameters) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendCert

type SecretBackendCert struct {
	metav1.TypeMeta   `json:",inline"`
	metav1.ObjectMeta `json:"metadata,omitempty"`
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.backend) || has(self.initProvider.backend)",message="backend is a required parameter"
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.commonName) || has(self.initProvider.commonName)",message="commonName is a required parameter"
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.name) || has(self.initProvider.name)",message="name is a required parameter"
	Spec   SecretBackendCertSpec   `json:"spec"`
	Status SecretBackendCertStatus `json:"status,omitempty"`
}

SecretBackendCert is the Schema for the SecretBackendCerts API. Generate an PKI certificate. +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}

func (*SecretBackendCert) DeepCopy

func (in *SecretBackendCert) DeepCopy() *SecretBackendCert

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCert.

func (*SecretBackendCert) DeepCopyInto

func (in *SecretBackendCert) DeepCopyInto(out *SecretBackendCert)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendCert) DeepCopyObject

func (in *SecretBackendCert) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendCert) GetCondition

func (mg *SecretBackendCert) GetCondition(ct xpv1.ConditionType) xpv1.Condition

GetCondition of this SecretBackendCert.

func (*SecretBackendCert) GetConnectionDetailsMapping

func (tr *SecretBackendCert) GetConnectionDetailsMapping() map[string]string

GetConnectionDetailsMapping for this SecretBackendCert

func (*SecretBackendCert) GetDeletionPolicy

func (mg *SecretBackendCert) GetDeletionPolicy() xpv1.DeletionPolicy

GetDeletionPolicy of this SecretBackendCert.

func (*SecretBackendCert) GetID

func (tr *SecretBackendCert) GetID() string

GetID returns ID of underlying Terraform resource of this SecretBackendCert

func (*SecretBackendCert) GetInitParameters added in v0.2.0

func (tr *SecretBackendCert) GetInitParameters() (map[string]any, error)

GetInitParameters of this SecretBackendCert

func (*SecretBackendCert) GetManagementPolicies added in v0.2.0

func (mg *SecretBackendCert) GetManagementPolicies() xpv1.ManagementPolicies

GetManagementPolicies of this SecretBackendCert.

func (*SecretBackendCert) GetObservation

func (tr *SecretBackendCert) GetObservation() (map[string]any, error)

GetObservation of this SecretBackendCert

func (*SecretBackendCert) GetParameters

func (tr *SecretBackendCert) GetParameters() (map[string]any, error)

GetParameters of this SecretBackendCert

func (*SecretBackendCert) GetProviderConfigReference

func (mg *SecretBackendCert) GetProviderConfigReference() *xpv1.Reference

GetProviderConfigReference of this SecretBackendCert.

func (*SecretBackendCert) GetProviderReference

func (mg *SecretBackendCert) GetProviderReference() *xpv1.Reference

GetProviderReference of this SecretBackendCert. Deprecated: Use GetProviderConfigReference.

func (*SecretBackendCert) GetPublishConnectionDetailsTo

func (mg *SecretBackendCert) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo

GetPublishConnectionDetailsTo of this SecretBackendCert.

func (*SecretBackendCert) GetTerraformResourceType

func (mg *SecretBackendCert) GetTerraformResourceType() string

GetTerraformResourceType returns Terraform resource type for this SecretBackendCert

func (*SecretBackendCert) GetTerraformSchemaVersion

func (tr *SecretBackendCert) GetTerraformSchemaVersion() int

GetTerraformSchemaVersion returns the associated Terraform schema version

func (*SecretBackendCert) GetWriteConnectionSecretToReference

func (mg *SecretBackendCert) GetWriteConnectionSecretToReference() *xpv1.SecretReference

GetWriteConnectionSecretToReference of this SecretBackendCert.

func (*SecretBackendCert) LateInitialize

func (tr *SecretBackendCert) LateInitialize(attrs []byte) (bool, error)

LateInitialize this SecretBackendCert using its observed tfState. returns True if there are any spec changes for the resource.

func (*SecretBackendCert) SetConditions

func (mg *SecretBackendCert) SetConditions(c ...xpv1.Condition)

SetConditions of this SecretBackendCert.

func (*SecretBackendCert) SetDeletionPolicy

func (mg *SecretBackendCert) SetDeletionPolicy(r xpv1.DeletionPolicy)

SetDeletionPolicy of this SecretBackendCert.

func (*SecretBackendCert) SetManagementPolicies added in v0.2.0

func (mg *SecretBackendCert) SetManagementPolicies(r xpv1.ManagementPolicies)

SetManagementPolicies of this SecretBackendCert.

func (*SecretBackendCert) SetObservation

func (tr *SecretBackendCert) SetObservation(obs map[string]any) error

SetObservation for this SecretBackendCert

func (*SecretBackendCert) SetParameters

func (tr *SecretBackendCert) SetParameters(params map[string]any) error

SetParameters for this SecretBackendCert

func (*SecretBackendCert) SetProviderConfigReference

func (mg *SecretBackendCert) SetProviderConfigReference(r *xpv1.Reference)

SetProviderConfigReference of this SecretBackendCert.

func (*SecretBackendCert) SetProviderReference

func (mg *SecretBackendCert) SetProviderReference(r *xpv1.Reference)

SetProviderReference of this SecretBackendCert. Deprecated: Use SetProviderConfigReference.

func (*SecretBackendCert) SetPublishConnectionDetailsTo

func (mg *SecretBackendCert) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)

SetPublishConnectionDetailsTo of this SecretBackendCert.

func (*SecretBackendCert) SetWriteConnectionSecretToReference

func (mg *SecretBackendCert) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)

SetWriteConnectionSecretToReference of this SecretBackendCert.

type SecretBackendCertInitParameters added in v0.2.0

type SecretBackendCertInitParameters struct {

	// List of alternative names
	// List of alternative names.
	AltNames []*string `json:"altNames,omitempty" tf:"alt_names,omitempty"`

	// If set to true, certs will be renewed if the expiration is within min_seconds_remaining. Default false
	// If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining
	AutoRenew *bool `json:"autoRenew,omitempty" tf:"auto_renew,omitempty"`

	// The PKI secret backend the resource belongs to.
	// The PKI secret backend the resource belongs to.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// CN of certificate to create
	// CN of the certificate to create.
	CommonName *string `json:"commonName,omitempty" tf:"common_name,omitempty"`

	// Flag to exclude CN from SANs
	// Flag to exclude CN from SANs.
	ExcludeCnFromSans *bool `json:"excludeCnFromSans,omitempty" tf:"exclude_cn_from_sans,omitempty"`

	// The format of data
	// The format of data.
	Format *string `json:"format,omitempty" tf:"format,omitempty"`

	// List of alternative IPs
	// List of alternative IPs.
	IPSans []*string `json:"ipSans,omitempty" tf:"ip_sans,omitempty"`

	// Specifies the default issuer of this request.
	IssuerRef *string `json:"issuerRef,omitempty" tf:"issuer_ref,omitempty"`

	// Generate a new certificate when the expiration is within this number of seconds, default is 604800 (7 days)
	// Generate a new certificate when the expiration is within this number of seconds
	MinSecondsRemaining *float64 `json:"minSecondsRemaining,omitempty" tf:"min_seconds_remaining,omitempty"`

	// Name of the role to create the certificate against
	// Name of the role to create the certificate against.
	Name *string `json:"name,omitempty" tf:"name,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// List of other SANs
	// List of other SANs.
	OtherSans []*string `json:"otherSans,omitempty" tf:"other_sans,omitempty"`

	// The private key format
	// The private key format.
	PrivateKeyFormat *string `json:"privateKeyFormat,omitempty" tf:"private_key_format,omitempty"`

	// If set to true, the certificate will be revoked on resource destruction.
	// Revoke the certificate upon resource destruction.
	Revoke *bool `json:"revoke,omitempty" tf:"revoke,omitempty"`

	// Time to live
	// Time to live.
	TTL *string `json:"ttl,omitempty" tf:"ttl,omitempty"`

	// List of alternative URIs
	// List of alternative URIs.
	URISans []*string `json:"uriSans,omitempty" tf:"uri_sans,omitempty"`

	// List of Subject User IDs
	// List of Subject User IDs.
	UserIds []*string `json:"userIds,omitempty" tf:"user_ids,omitempty"`
}

func (*SecretBackendCertInitParameters) DeepCopy added in v0.2.0

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCertInitParameters.

func (*SecretBackendCertInitParameters) DeepCopyInto added in v0.2.0

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendCertList

type SecretBackendCertList struct {
	metav1.TypeMeta `json:",inline"`
	metav1.ListMeta `json:"metadata,omitempty"`
	Items           []SecretBackendCert `json:"items"`
}

SecretBackendCertList contains a list of SecretBackendCerts

func (*SecretBackendCertList) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCertList.

func (*SecretBackendCertList) DeepCopyInto

func (in *SecretBackendCertList) DeepCopyInto(out *SecretBackendCertList)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendCertList) DeepCopyObject

func (in *SecretBackendCertList) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendCertList) GetItems

func (l *SecretBackendCertList) GetItems() []resource.Managed

GetItems of this SecretBackendCertList.

type SecretBackendCertObservation

type SecretBackendCertObservation struct {

	// List of alternative names
	// List of alternative names.
	AltNames []*string `json:"altNames,omitempty" tf:"alt_names,omitempty"`

	// If set to true, certs will be renewed if the expiration is within min_seconds_remaining. Default false
	// If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining
	AutoRenew *bool `json:"autoRenew,omitempty" tf:"auto_renew,omitempty"`

	// The PKI secret backend the resource belongs to.
	// The PKI secret backend the resource belongs to.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// The CA chain
	// The CA chain.
	CAChain *string `json:"caChain,omitempty" tf:"ca_chain,omitempty"`

	// The certificate
	// The certicate.
	Certificate *string `json:"certificate,omitempty" tf:"certificate,omitempty"`

	// CN of certificate to create
	// CN of the certificate to create.
	CommonName *string `json:"commonName,omitempty" tf:"common_name,omitempty"`

	// Flag to exclude CN from SANs
	// Flag to exclude CN from SANs.
	ExcludeCnFromSans *bool `json:"excludeCnFromSans,omitempty" tf:"exclude_cn_from_sans,omitempty"`

	// The expiration date of the certificate in unix epoch format
	// The certificate expiration as a Unix-style timestamp.
	Expiration *float64 `json:"expiration,omitempty" tf:"expiration,omitempty"`

	// The format of data
	// The format of data.
	Format *string `json:"format,omitempty" tf:"format,omitempty"`

	ID *string `json:"id,omitempty" tf:"id,omitempty"`

	// List of alternative IPs
	// List of alternative IPs.
	IPSans []*string `json:"ipSans,omitempty" tf:"ip_sans,omitempty"`

	// Specifies the default issuer of this request.
	IssuerRef *string `json:"issuerRef,omitempty" tf:"issuer_ref,omitempty"`

	// The issuing CA
	// The issuing CA.
	IssuingCA *string `json:"issuingCa,omitempty" tf:"issuing_ca,omitempty"`

	// Generate a new certificate when the expiration is within this number of seconds, default is 604800 (7 days)
	// Generate a new certificate when the expiration is within this number of seconds
	MinSecondsRemaining *float64 `json:"minSecondsRemaining,omitempty" tf:"min_seconds_remaining,omitempty"`

	// Name of the role to create the certificate against
	// Name of the role to create the certificate against.
	Name *string `json:"name,omitempty" tf:"name,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// List of other SANs
	// List of other SANs.
	OtherSans []*string `json:"otherSans,omitempty" tf:"other_sans,omitempty"`

	// The private key format
	// The private key format.
	PrivateKeyFormat *string `json:"privateKeyFormat,omitempty" tf:"private_key_format,omitempty"`

	// The private key type
	// The private key type.
	PrivateKeyType *string `json:"privateKeyType,omitempty" tf:"private_key_type,omitempty"`

	// true if the current time (during refresh) is after the start of the early renewal window declared by min_seconds_remaining, and false otherwise; if auto_renew is set to true then the provider will plan to replace the certificate once renewal is pending.
	// Initially false, and then set to true during refresh once the expiration is less than min_seconds_remaining in the future.
	RenewPending *bool `json:"renewPending,omitempty" tf:"renew_pending,omitempty"`

	// If set to true, the certificate will be revoked on resource destruction.
	// Revoke the certificate upon resource destruction.
	Revoke *bool `json:"revoke,omitempty" tf:"revoke,omitempty"`

	// The serial number
	// The serial number.
	SerialNumber *string `json:"serialNumber,omitempty" tf:"serial_number,omitempty"`

	// Time to live
	// Time to live.
	TTL *string `json:"ttl,omitempty" tf:"ttl,omitempty"`

	// List of alternative URIs
	// List of alternative URIs.
	URISans []*string `json:"uriSans,omitempty" tf:"uri_sans,omitempty"`

	// List of Subject User IDs
	// List of Subject User IDs.
	UserIds []*string `json:"userIds,omitempty" tf:"user_ids,omitempty"`
}

func (*SecretBackendCertObservation) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCertObservation.

func (*SecretBackendCertObservation) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendCertParameters

type SecretBackendCertParameters struct {

	// List of alternative names
	// List of alternative names.
	// +kubebuilder:validation:Optional
	AltNames []*string `json:"altNames,omitempty" tf:"alt_names,omitempty"`

	// If set to true, certs will be renewed if the expiration is within min_seconds_remaining. Default false
	// If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining
	// +kubebuilder:validation:Optional
	AutoRenew *bool `json:"autoRenew,omitempty" tf:"auto_renew,omitempty"`

	// The PKI secret backend the resource belongs to.
	// The PKI secret backend the resource belongs to.
	// +kubebuilder:validation:Optional
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// CN of certificate to create
	// CN of the certificate to create.
	// +kubebuilder:validation:Optional
	CommonName *string `json:"commonName,omitempty" tf:"common_name,omitempty"`

	// Flag to exclude CN from SANs
	// Flag to exclude CN from SANs.
	// +kubebuilder:validation:Optional
	ExcludeCnFromSans *bool `json:"excludeCnFromSans,omitempty" tf:"exclude_cn_from_sans,omitempty"`

	// The format of data
	// The format of data.
	// +kubebuilder:validation:Optional
	Format *string `json:"format,omitempty" tf:"format,omitempty"`

	// List of alternative IPs
	// List of alternative IPs.
	// +kubebuilder:validation:Optional
	IPSans []*string `json:"ipSans,omitempty" tf:"ip_sans,omitempty"`

	// Specifies the default issuer of this request.
	// +kubebuilder:validation:Optional
	IssuerRef *string `json:"issuerRef,omitempty" tf:"issuer_ref,omitempty"`

	// Generate a new certificate when the expiration is within this number of seconds, default is 604800 (7 days)
	// Generate a new certificate when the expiration is within this number of seconds
	// +kubebuilder:validation:Optional
	MinSecondsRemaining *float64 `json:"minSecondsRemaining,omitempty" tf:"min_seconds_remaining,omitempty"`

	// Name of the role to create the certificate against
	// Name of the role to create the certificate against.
	// +kubebuilder:validation:Optional
	Name *string `json:"name,omitempty" tf:"name,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	// +kubebuilder:validation:Optional
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// List of other SANs
	// List of other SANs.
	// +kubebuilder:validation:Optional
	OtherSans []*string `json:"otherSans,omitempty" tf:"other_sans,omitempty"`

	// The private key format
	// The private key format.
	// +kubebuilder:validation:Optional
	PrivateKeyFormat *string `json:"privateKeyFormat,omitempty" tf:"private_key_format,omitempty"`

	// If set to true, the certificate will be revoked on resource destruction.
	// Revoke the certificate upon resource destruction.
	// +kubebuilder:validation:Optional
	Revoke *bool `json:"revoke,omitempty" tf:"revoke,omitempty"`

	// Time to live
	// Time to live.
	// +kubebuilder:validation:Optional
	TTL *string `json:"ttl,omitempty" tf:"ttl,omitempty"`

	// List of alternative URIs
	// List of alternative URIs.
	// +kubebuilder:validation:Optional
	URISans []*string `json:"uriSans,omitempty" tf:"uri_sans,omitempty"`

	// List of Subject User IDs
	// List of Subject User IDs.
	// +kubebuilder:validation:Optional
	UserIds []*string `json:"userIds,omitempty" tf:"user_ids,omitempty"`
}

func (*SecretBackendCertParameters) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCertParameters.

func (*SecretBackendCertParameters) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendCertSpec

type SecretBackendCertSpec struct {
	v1.ResourceSpec `json:",inline"`
	ForProvider     SecretBackendCertParameters `json:"forProvider"`
	// THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored
	// unless the relevant Crossplane feature flag is enabled, and may be
	// changed or removed without notice.
	// InitProvider holds the same fields as ForProvider, with the exception
	// of Identifier and other resource reference fields. The fields that are
	// in InitProvider are merged into ForProvider when the resource is created.
	// The same fields are also added to the terraform ignore_changes hook, to
	// avoid updating them after creation. This is useful for fields that are
	// required on creation, but we do not desire to update them after creation,
	// for example because of an external controller is managing them, like an
	// autoscaler.
	InitProvider SecretBackendCertInitParameters `json:"initProvider,omitempty"`
}

SecretBackendCertSpec defines the desired state of SecretBackendCert

func (*SecretBackendCertSpec) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCertSpec.

func (*SecretBackendCertSpec) DeepCopyInto

func (in *SecretBackendCertSpec) DeepCopyInto(out *SecretBackendCertSpec)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendCertStatus

type SecretBackendCertStatus struct {
	v1.ResourceStatus `json:",inline"`
	AtProvider        SecretBackendCertObservation `json:"atProvider,omitempty"`
}

SecretBackendCertStatus defines the observed state of SecretBackendCert.

func (*SecretBackendCertStatus) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCertStatus.

func (*SecretBackendCertStatus) DeepCopyInto

func (in *SecretBackendCertStatus) DeepCopyInto(out *SecretBackendCertStatus)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendConfigCA

type SecretBackendConfigCA struct {
	metav1.TypeMeta   `json:",inline"`
	metav1.ObjectMeta `json:"metadata,omitempty"`
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.backend) || has(self.initProvider.backend)",message="backend is a required parameter"
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.pemBundleSecretRef)",message="pemBundleSecretRef is a required parameter"
	Spec   SecretBackendConfigCASpec   `json:"spec"`
	Status SecretBackendConfigCAStatus `json:"status,omitempty"`
}

SecretBackendConfigCA is the Schema for the SecretBackendConfigCAs API. Submit the CA information to PKI. +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}

func (*SecretBackendConfigCA) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendConfigCA.

func (*SecretBackendConfigCA) DeepCopyInto

func (in *SecretBackendConfigCA) DeepCopyInto(out *SecretBackendConfigCA)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendConfigCA) DeepCopyObject

func (in *SecretBackendConfigCA) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendConfigCA) GetCondition

func (mg *SecretBackendConfigCA) GetCondition(ct xpv1.ConditionType) xpv1.Condition

GetCondition of this SecretBackendConfigCA.

func (*SecretBackendConfigCA) GetConnectionDetailsMapping

func (tr *SecretBackendConfigCA) GetConnectionDetailsMapping() map[string]string

GetConnectionDetailsMapping for this SecretBackendConfigCA

func (*SecretBackendConfigCA) GetDeletionPolicy

func (mg *SecretBackendConfigCA) GetDeletionPolicy() xpv1.DeletionPolicy

GetDeletionPolicy of this SecretBackendConfigCA.

func (*SecretBackendConfigCA) GetID

func (tr *SecretBackendConfigCA) GetID() string

GetID returns ID of underlying Terraform resource of this SecretBackendConfigCA

func (*SecretBackendConfigCA) GetInitParameters added in v0.2.0

func (tr *SecretBackendConfigCA) GetInitParameters() (map[string]any, error)

GetInitParameters of this SecretBackendConfigCA

func (*SecretBackendConfigCA) GetManagementPolicies added in v0.2.0

func (mg *SecretBackendConfigCA) GetManagementPolicies() xpv1.ManagementPolicies

GetManagementPolicies of this SecretBackendConfigCA.

func (*SecretBackendConfigCA) GetObservation

func (tr *SecretBackendConfigCA) GetObservation() (map[string]any, error)

GetObservation of this SecretBackendConfigCA

func (*SecretBackendConfigCA) GetParameters

func (tr *SecretBackendConfigCA) GetParameters() (map[string]any, error)

GetParameters of this SecretBackendConfigCA

func (*SecretBackendConfigCA) GetProviderConfigReference

func (mg *SecretBackendConfigCA) GetProviderConfigReference() *xpv1.Reference

GetProviderConfigReference of this SecretBackendConfigCA.

func (*SecretBackendConfigCA) GetProviderReference

func (mg *SecretBackendConfigCA) GetProviderReference() *xpv1.Reference

GetProviderReference of this SecretBackendConfigCA. Deprecated: Use GetProviderConfigReference.

func (*SecretBackendConfigCA) GetPublishConnectionDetailsTo

func (mg *SecretBackendConfigCA) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo

GetPublishConnectionDetailsTo of this SecretBackendConfigCA.

func (*SecretBackendConfigCA) GetTerraformResourceType

func (mg *SecretBackendConfigCA) GetTerraformResourceType() string

GetTerraformResourceType returns Terraform resource type for this SecretBackendConfigCA

func (*SecretBackendConfigCA) GetTerraformSchemaVersion

func (tr *SecretBackendConfigCA) GetTerraformSchemaVersion() int

GetTerraformSchemaVersion returns the associated Terraform schema version

func (*SecretBackendConfigCA) GetWriteConnectionSecretToReference

func (mg *SecretBackendConfigCA) GetWriteConnectionSecretToReference() *xpv1.SecretReference

GetWriteConnectionSecretToReference of this SecretBackendConfigCA.

func (*SecretBackendConfigCA) LateInitialize

func (tr *SecretBackendConfigCA) LateInitialize(attrs []byte) (bool, error)

LateInitialize this SecretBackendConfigCA using its observed tfState. returns True if there are any spec changes for the resource.

func (*SecretBackendConfigCA) SetConditions

func (mg *SecretBackendConfigCA) SetConditions(c ...xpv1.Condition)

SetConditions of this SecretBackendConfigCA.

func (*SecretBackendConfigCA) SetDeletionPolicy

func (mg *SecretBackendConfigCA) SetDeletionPolicy(r xpv1.DeletionPolicy)

SetDeletionPolicy of this SecretBackendConfigCA.

func (*SecretBackendConfigCA) SetManagementPolicies added in v0.2.0

func (mg *SecretBackendConfigCA) SetManagementPolicies(r xpv1.ManagementPolicies)

SetManagementPolicies of this SecretBackendConfigCA.

func (*SecretBackendConfigCA) SetObservation

func (tr *SecretBackendConfigCA) SetObservation(obs map[string]any) error

SetObservation for this SecretBackendConfigCA

func (*SecretBackendConfigCA) SetParameters

func (tr *SecretBackendConfigCA) SetParameters(params map[string]any) error

SetParameters for this SecretBackendConfigCA

func (*SecretBackendConfigCA) SetProviderConfigReference

func (mg *SecretBackendConfigCA) SetProviderConfigReference(r *xpv1.Reference)

SetProviderConfigReference of this SecretBackendConfigCA.

func (*SecretBackendConfigCA) SetProviderReference

func (mg *SecretBackendConfigCA) SetProviderReference(r *xpv1.Reference)

SetProviderReference of this SecretBackendConfigCA. Deprecated: Use SetProviderConfigReference.

func (*SecretBackendConfigCA) SetPublishConnectionDetailsTo

func (mg *SecretBackendConfigCA) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)

SetPublishConnectionDetailsTo of this SecretBackendConfigCA.

func (*SecretBackendConfigCA) SetWriteConnectionSecretToReference

func (mg *SecretBackendConfigCA) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)

SetWriteConnectionSecretToReference of this SecretBackendConfigCA.

type SecretBackendConfigCAInitParameters added in v0.2.0

type SecretBackendConfigCAInitParameters struct {

	// The PKI secret backend the resource belongs to.
	// The PKI secret backend the resource belongs to.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`
}

func (*SecretBackendConfigCAInitParameters) DeepCopy added in v0.2.0

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendConfigCAInitParameters.

func (*SecretBackendConfigCAInitParameters) DeepCopyInto added in v0.2.0

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendConfigCAList

type SecretBackendConfigCAList struct {
	metav1.TypeMeta `json:",inline"`
	metav1.ListMeta `json:"metadata,omitempty"`
	Items           []SecretBackendConfigCA `json:"items"`
}

SecretBackendConfigCAList contains a list of SecretBackendConfigCAs

func (*SecretBackendConfigCAList) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendConfigCAList.

func (*SecretBackendConfigCAList) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendConfigCAList) DeepCopyObject

func (in *SecretBackendConfigCAList) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendConfigCAList) GetItems

func (l *SecretBackendConfigCAList) GetItems() []resource.Managed

GetItems of this SecretBackendConfigCAList.

type SecretBackendConfigCAObservation

type SecretBackendConfigCAObservation struct {

	// The PKI secret backend the resource belongs to.
	// The PKI secret backend the resource belongs to.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	ID *string `json:"id,omitempty" tf:"id,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`
}

func (*SecretBackendConfigCAObservation) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendConfigCAObservation.

func (*SecretBackendConfigCAObservation) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendConfigCAParameters

type SecretBackendConfigCAParameters struct {

	// The PKI secret backend the resource belongs to.
	// The PKI secret backend the resource belongs to.
	// +kubebuilder:validation:Optional
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	// +kubebuilder:validation:Optional
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The key and certificate PEM bundle
	// The key and certificate PEM bundle.
	// +kubebuilder:validation:Optional
	PemBundleSecretRef v1.SecretKeySelector `json:"pemBundleSecretRef" tf:"-"`
}

func (*SecretBackendConfigCAParameters) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendConfigCAParameters.

func (*SecretBackendConfigCAParameters) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendConfigCASpec

type SecretBackendConfigCASpec struct {
	v1.ResourceSpec `json:",inline"`
	ForProvider     SecretBackendConfigCAParameters `json:"forProvider"`
	// THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored
	// unless the relevant Crossplane feature flag is enabled, and may be
	// changed or removed without notice.
	// InitProvider holds the same fields as ForProvider, with the exception
	// of Identifier and other resource reference fields. The fields that are
	// in InitProvider are merged into ForProvider when the resource is created.
	// The same fields are also added to the terraform ignore_changes hook, to
	// avoid updating them after creation. This is useful for fields that are
	// required on creation, but we do not desire to update them after creation,
	// for example because of an external controller is managing them, like an
	// autoscaler.
	InitProvider SecretBackendConfigCAInitParameters `json:"initProvider,omitempty"`
}

SecretBackendConfigCASpec defines the desired state of SecretBackendConfigCA

func (*SecretBackendConfigCASpec) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendConfigCASpec.

func (*SecretBackendConfigCASpec) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendConfigCAStatus

type SecretBackendConfigCAStatus struct {
	v1.ResourceStatus `json:",inline"`
	AtProvider        SecretBackendConfigCAObservation `json:"atProvider,omitempty"`
}

SecretBackendConfigCAStatus defines the observed state of SecretBackendConfigCA.

func (*SecretBackendConfigCAStatus) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendConfigCAStatus.

func (*SecretBackendConfigCAStatus) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendConfigUrls

type SecretBackendConfigUrls struct {
	metav1.TypeMeta   `json:",inline"`
	metav1.ObjectMeta `json:"metadata,omitempty"`
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.backend) || has(self.initProvider.backend)",message="backend is a required parameter"
	Spec   SecretBackendConfigUrlsSpec   `json:"spec"`
	Status SecretBackendConfigUrlsStatus `json:"status,omitempty"`
}

SecretBackendConfigUrls is the Schema for the SecretBackendConfigUrlss API. Sets the config URL's on an PKI Secret Backend for Vault. +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}

func (*SecretBackendConfigUrls) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendConfigUrls.

func (*SecretBackendConfigUrls) DeepCopyInto

func (in *SecretBackendConfigUrls) DeepCopyInto(out *SecretBackendConfigUrls)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendConfigUrls) DeepCopyObject

func (in *SecretBackendConfigUrls) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendConfigUrls) GetCondition

GetCondition of this SecretBackendConfigUrls.

func (*SecretBackendConfigUrls) GetConnectionDetailsMapping

func (tr *SecretBackendConfigUrls) GetConnectionDetailsMapping() map[string]string

GetConnectionDetailsMapping for this SecretBackendConfigUrls

func (*SecretBackendConfigUrls) GetDeletionPolicy

func (mg *SecretBackendConfigUrls) GetDeletionPolicy() xpv1.DeletionPolicy

GetDeletionPolicy of this SecretBackendConfigUrls.

func (*SecretBackendConfigUrls) GetID

func (tr *SecretBackendConfigUrls) GetID() string

GetID returns ID of underlying Terraform resource of this SecretBackendConfigUrls

func (*SecretBackendConfigUrls) GetInitParameters added in v0.2.0

func (tr *SecretBackendConfigUrls) GetInitParameters() (map[string]any, error)

GetInitParameters of this SecretBackendConfigUrls

func (*SecretBackendConfigUrls) GetManagementPolicies added in v0.2.0

func (mg *SecretBackendConfigUrls) GetManagementPolicies() xpv1.ManagementPolicies

GetManagementPolicies of this SecretBackendConfigUrls.

func (*SecretBackendConfigUrls) GetObservation

func (tr *SecretBackendConfigUrls) GetObservation() (map[string]any, error)

GetObservation of this SecretBackendConfigUrls

func (*SecretBackendConfigUrls) GetParameters

func (tr *SecretBackendConfigUrls) GetParameters() (map[string]any, error)

GetParameters of this SecretBackendConfigUrls

func (*SecretBackendConfigUrls) GetProviderConfigReference

func (mg *SecretBackendConfigUrls) GetProviderConfigReference() *xpv1.Reference

GetProviderConfigReference of this SecretBackendConfigUrls.

func (*SecretBackendConfigUrls) GetProviderReference

func (mg *SecretBackendConfigUrls) GetProviderReference() *xpv1.Reference

GetProviderReference of this SecretBackendConfigUrls. Deprecated: Use GetProviderConfigReference.

func (*SecretBackendConfigUrls) GetPublishConnectionDetailsTo

func (mg *SecretBackendConfigUrls) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo

GetPublishConnectionDetailsTo of this SecretBackendConfigUrls.

func (*SecretBackendConfigUrls) GetTerraformResourceType

func (mg *SecretBackendConfigUrls) GetTerraformResourceType() string

GetTerraformResourceType returns Terraform resource type for this SecretBackendConfigUrls

func (*SecretBackendConfigUrls) GetTerraformSchemaVersion

func (tr *SecretBackendConfigUrls) GetTerraformSchemaVersion() int

GetTerraformSchemaVersion returns the associated Terraform schema version

func (*SecretBackendConfigUrls) GetWriteConnectionSecretToReference

func (mg *SecretBackendConfigUrls) GetWriteConnectionSecretToReference() *xpv1.SecretReference

GetWriteConnectionSecretToReference of this SecretBackendConfigUrls.

func (*SecretBackendConfigUrls) LateInitialize

func (tr *SecretBackendConfigUrls) LateInitialize(attrs []byte) (bool, error)

LateInitialize this SecretBackendConfigUrls using its observed tfState. returns True if there are any spec changes for the resource.

func (*SecretBackendConfigUrls) SetConditions

func (mg *SecretBackendConfigUrls) SetConditions(c ...xpv1.Condition)

SetConditions of this SecretBackendConfigUrls.

func (*SecretBackendConfigUrls) SetDeletionPolicy

func (mg *SecretBackendConfigUrls) SetDeletionPolicy(r xpv1.DeletionPolicy)

SetDeletionPolicy of this SecretBackendConfigUrls.

func (*SecretBackendConfigUrls) SetManagementPolicies added in v0.2.0

func (mg *SecretBackendConfigUrls) SetManagementPolicies(r xpv1.ManagementPolicies)

SetManagementPolicies of this SecretBackendConfigUrls.

func (*SecretBackendConfigUrls) SetObservation

func (tr *SecretBackendConfigUrls) SetObservation(obs map[string]any) error

SetObservation for this SecretBackendConfigUrls

func (*SecretBackendConfigUrls) SetParameters

func (tr *SecretBackendConfigUrls) SetParameters(params map[string]any) error

SetParameters for this SecretBackendConfigUrls

func (*SecretBackendConfigUrls) SetProviderConfigReference

func (mg *SecretBackendConfigUrls) SetProviderConfigReference(r *xpv1.Reference)

SetProviderConfigReference of this SecretBackendConfigUrls.

func (*SecretBackendConfigUrls) SetProviderReference

func (mg *SecretBackendConfigUrls) SetProviderReference(r *xpv1.Reference)

SetProviderReference of this SecretBackendConfigUrls. Deprecated: Use SetProviderConfigReference.

func (*SecretBackendConfigUrls) SetPublishConnectionDetailsTo

func (mg *SecretBackendConfigUrls) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)

SetPublishConnectionDetailsTo of this SecretBackendConfigUrls.

func (*SecretBackendConfigUrls) SetWriteConnectionSecretToReference

func (mg *SecretBackendConfigUrls) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)

SetWriteConnectionSecretToReference of this SecretBackendConfigUrls.

type SecretBackendConfigUrlsInitParameters added in v0.2.0

type SecretBackendConfigUrlsInitParameters struct {

	// The path the PKI secret backend is mounted at, with no leading or trailing /s.
	// The path of the PKI secret backend the resource belongs to.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// Specifies the URL values for the CRL Distribution Points field.
	// Specifies the URL values for the CRL Distribution Points field.
	CrlDistributionPoints []*string `json:"crlDistributionPoints,omitempty" tf:"crl_distribution_points,omitempty"`

	// Specifies the URL values for the Issuing Certificate field.
	// Specifies the URL values for the Issuing Certificate field.
	IssuingCertificates []*string `json:"issuingCertificates,omitempty" tf:"issuing_certificates,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// Specifies the URL values for the OCSP Servers field.
	// Specifies the URL values for the OCSP Servers field.
	OcspServers []*string `json:"ocspServers,omitempty" tf:"ocsp_servers,omitempty"`
}

func (*SecretBackendConfigUrlsInitParameters) DeepCopy added in v0.2.0

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendConfigUrlsInitParameters.

func (*SecretBackendConfigUrlsInitParameters) DeepCopyInto added in v0.2.0

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendConfigUrlsList

type SecretBackendConfigUrlsList struct {
	metav1.TypeMeta `json:",inline"`
	metav1.ListMeta `json:"metadata,omitempty"`
	Items           []SecretBackendConfigUrls `json:"items"`
}

SecretBackendConfigUrlsList contains a list of SecretBackendConfigUrlss

func (*SecretBackendConfigUrlsList) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendConfigUrlsList.

func (*SecretBackendConfigUrlsList) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendConfigUrlsList) DeepCopyObject

func (in *SecretBackendConfigUrlsList) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendConfigUrlsList) GetItems

GetItems of this SecretBackendConfigUrlsList.

type SecretBackendConfigUrlsObservation

type SecretBackendConfigUrlsObservation struct {

	// The path the PKI secret backend is mounted at, with no leading or trailing /s.
	// The path of the PKI secret backend the resource belongs to.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// Specifies the URL values for the CRL Distribution Points field.
	// Specifies the URL values for the CRL Distribution Points field.
	CrlDistributionPoints []*string `json:"crlDistributionPoints,omitempty" tf:"crl_distribution_points,omitempty"`

	ID *string `json:"id,omitempty" tf:"id,omitempty"`

	// Specifies the URL values for the Issuing Certificate field.
	// Specifies the URL values for the Issuing Certificate field.
	IssuingCertificates []*string `json:"issuingCertificates,omitempty" tf:"issuing_certificates,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// Specifies the URL values for the OCSP Servers field.
	// Specifies the URL values for the OCSP Servers field.
	OcspServers []*string `json:"ocspServers,omitempty" tf:"ocsp_servers,omitempty"`
}

func (*SecretBackendConfigUrlsObservation) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendConfigUrlsObservation.

func (*SecretBackendConfigUrlsObservation) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendConfigUrlsParameters

type SecretBackendConfigUrlsParameters struct {

	// The path the PKI secret backend is mounted at, with no leading or trailing /s.
	// The path of the PKI secret backend the resource belongs to.
	// +kubebuilder:validation:Optional
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// Specifies the URL values for the CRL Distribution Points field.
	// Specifies the URL values for the CRL Distribution Points field.
	// +kubebuilder:validation:Optional
	CrlDistributionPoints []*string `json:"crlDistributionPoints,omitempty" tf:"crl_distribution_points,omitempty"`

	// Specifies the URL values for the Issuing Certificate field.
	// Specifies the URL values for the Issuing Certificate field.
	// +kubebuilder:validation:Optional
	IssuingCertificates []*string `json:"issuingCertificates,omitempty" tf:"issuing_certificates,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	// +kubebuilder:validation:Optional
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// Specifies the URL values for the OCSP Servers field.
	// Specifies the URL values for the OCSP Servers field.
	// +kubebuilder:validation:Optional
	OcspServers []*string `json:"ocspServers,omitempty" tf:"ocsp_servers,omitempty"`
}

func (*SecretBackendConfigUrlsParameters) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendConfigUrlsParameters.

func (*SecretBackendConfigUrlsParameters) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendConfigUrlsSpec

type SecretBackendConfigUrlsSpec struct {
	v1.ResourceSpec `json:",inline"`
	ForProvider     SecretBackendConfigUrlsParameters `json:"forProvider"`
	// THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored
	// unless the relevant Crossplane feature flag is enabled, and may be
	// changed or removed without notice.
	// InitProvider holds the same fields as ForProvider, with the exception
	// of Identifier and other resource reference fields. The fields that are
	// in InitProvider are merged into ForProvider when the resource is created.
	// The same fields are also added to the terraform ignore_changes hook, to
	// avoid updating them after creation. This is useful for fields that are
	// required on creation, but we do not desire to update them after creation,
	// for example because of an external controller is managing them, like an
	// autoscaler.
	InitProvider SecretBackendConfigUrlsInitParameters `json:"initProvider,omitempty"`
}

SecretBackendConfigUrlsSpec defines the desired state of SecretBackendConfigUrls

func (*SecretBackendConfigUrlsSpec) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendConfigUrlsSpec.

func (*SecretBackendConfigUrlsSpec) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendConfigUrlsStatus

type SecretBackendConfigUrlsStatus struct {
	v1.ResourceStatus `json:",inline"`
	AtProvider        SecretBackendConfigUrlsObservation `json:"atProvider,omitempty"`
}

SecretBackendConfigUrlsStatus defines the observed state of SecretBackendConfigUrls.

func (*SecretBackendConfigUrlsStatus) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendConfigUrlsStatus.

func (*SecretBackendConfigUrlsStatus) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendCrlConfig

type SecretBackendCrlConfig struct {
	metav1.TypeMeta   `json:",inline"`
	metav1.ObjectMeta `json:"metadata,omitempty"`
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.backend) || has(self.initProvider.backend)",message="backend is a required parameter"
	Spec   SecretBackendCrlConfigSpec   `json:"spec"`
	Status SecretBackendCrlConfigStatus `json:"status,omitempty"`
}

SecretBackendCrlConfig is the Schema for the SecretBackendCrlConfigs API. Sets the CRL config on an PKI Secret Backend for Vault. +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}

func (*SecretBackendCrlConfig) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCrlConfig.

func (*SecretBackendCrlConfig) DeepCopyInto

func (in *SecretBackendCrlConfig) DeepCopyInto(out *SecretBackendCrlConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendCrlConfig) DeepCopyObject

func (in *SecretBackendCrlConfig) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendCrlConfig) GetCondition

GetCondition of this SecretBackendCrlConfig.

func (*SecretBackendCrlConfig) GetConnectionDetailsMapping

func (tr *SecretBackendCrlConfig) GetConnectionDetailsMapping() map[string]string

GetConnectionDetailsMapping for this SecretBackendCrlConfig

func (*SecretBackendCrlConfig) GetDeletionPolicy

func (mg *SecretBackendCrlConfig) GetDeletionPolicy() xpv1.DeletionPolicy

GetDeletionPolicy of this SecretBackendCrlConfig.

func (*SecretBackendCrlConfig) GetID

func (tr *SecretBackendCrlConfig) GetID() string

GetID returns ID of underlying Terraform resource of this SecretBackendCrlConfig

func (*SecretBackendCrlConfig) GetInitParameters added in v0.2.0

func (tr *SecretBackendCrlConfig) GetInitParameters() (map[string]any, error)

GetInitParameters of this SecretBackendCrlConfig

func (*SecretBackendCrlConfig) GetManagementPolicies added in v0.2.0

func (mg *SecretBackendCrlConfig) GetManagementPolicies() xpv1.ManagementPolicies

GetManagementPolicies of this SecretBackendCrlConfig.

func (*SecretBackendCrlConfig) GetObservation

func (tr *SecretBackendCrlConfig) GetObservation() (map[string]any, error)

GetObservation of this SecretBackendCrlConfig

func (*SecretBackendCrlConfig) GetParameters

func (tr *SecretBackendCrlConfig) GetParameters() (map[string]any, error)

GetParameters of this SecretBackendCrlConfig

func (*SecretBackendCrlConfig) GetProviderConfigReference

func (mg *SecretBackendCrlConfig) GetProviderConfigReference() *xpv1.Reference

GetProviderConfigReference of this SecretBackendCrlConfig.

func (*SecretBackendCrlConfig) GetProviderReference

func (mg *SecretBackendCrlConfig) GetProviderReference() *xpv1.Reference

GetProviderReference of this SecretBackendCrlConfig. Deprecated: Use GetProviderConfigReference.

func (*SecretBackendCrlConfig) GetPublishConnectionDetailsTo

func (mg *SecretBackendCrlConfig) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo

GetPublishConnectionDetailsTo of this SecretBackendCrlConfig.

func (*SecretBackendCrlConfig) GetTerraformResourceType

func (mg *SecretBackendCrlConfig) GetTerraformResourceType() string

GetTerraformResourceType returns Terraform resource type for this SecretBackendCrlConfig

func (*SecretBackendCrlConfig) GetTerraformSchemaVersion

func (tr *SecretBackendCrlConfig) GetTerraformSchemaVersion() int

GetTerraformSchemaVersion returns the associated Terraform schema version

func (*SecretBackendCrlConfig) GetWriteConnectionSecretToReference

func (mg *SecretBackendCrlConfig) GetWriteConnectionSecretToReference() *xpv1.SecretReference

GetWriteConnectionSecretToReference of this SecretBackendCrlConfig.

func (*SecretBackendCrlConfig) LateInitialize

func (tr *SecretBackendCrlConfig) LateInitialize(attrs []byte) (bool, error)

LateInitialize this SecretBackendCrlConfig using its observed tfState. returns True if there are any spec changes for the resource.

func (*SecretBackendCrlConfig) SetConditions

func (mg *SecretBackendCrlConfig) SetConditions(c ...xpv1.Condition)

SetConditions of this SecretBackendCrlConfig.

func (*SecretBackendCrlConfig) SetDeletionPolicy

func (mg *SecretBackendCrlConfig) SetDeletionPolicy(r xpv1.DeletionPolicy)

SetDeletionPolicy of this SecretBackendCrlConfig.

func (*SecretBackendCrlConfig) SetManagementPolicies added in v0.2.0

func (mg *SecretBackendCrlConfig) SetManagementPolicies(r xpv1.ManagementPolicies)

SetManagementPolicies of this SecretBackendCrlConfig.

func (*SecretBackendCrlConfig) SetObservation

func (tr *SecretBackendCrlConfig) SetObservation(obs map[string]any) error

SetObservation for this SecretBackendCrlConfig

func (*SecretBackendCrlConfig) SetParameters

func (tr *SecretBackendCrlConfig) SetParameters(params map[string]any) error

SetParameters for this SecretBackendCrlConfig

func (*SecretBackendCrlConfig) SetProviderConfigReference

func (mg *SecretBackendCrlConfig) SetProviderConfigReference(r *xpv1.Reference)

SetProviderConfigReference of this SecretBackendCrlConfig.

func (*SecretBackendCrlConfig) SetProviderReference

func (mg *SecretBackendCrlConfig) SetProviderReference(r *xpv1.Reference)

SetProviderReference of this SecretBackendCrlConfig. Deprecated: Use SetProviderConfigReference.

func (*SecretBackendCrlConfig) SetPublishConnectionDetailsTo

func (mg *SecretBackendCrlConfig) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)

SetPublishConnectionDetailsTo of this SecretBackendCrlConfig.

func (*SecretBackendCrlConfig) SetWriteConnectionSecretToReference

func (mg *SecretBackendCrlConfig) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)

SetWriteConnectionSecretToReference of this SecretBackendCrlConfig.

type SecretBackendCrlConfigInitParameters added in v0.2.0

type SecretBackendCrlConfigInitParameters struct {

	// Enables periodic rebuilding of the CRL upon expiry. Vault 1.12+
	// Enables or disables periodic rebuilding of the CRL upon expiry.
	AutoRebuild *bool `json:"autoRebuild,omitempty" tf:"auto_rebuild,omitempty"`

	// Grace period before CRL expiry to attempt rebuild of CRL. Vault 1.12+
	// Grace period before CRL expiry to attempt rebuild of CRL.
	AutoRebuildGracePeriod *string `json:"autoRebuildGracePeriod,omitempty" tf:"auto_rebuild_grace_period,omitempty"`

	// The path the PKI secret backend is mounted at, with no leading or trailing /s.
	// The path of the PKI secret backend the resource belongs to.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// Enable cross-cluster revocation request queues. Vault 1.13+
	// Enable cross-cluster revocation request queues.
	CrossClusterRevocation *bool `json:"crossClusterRevocation,omitempty" tf:"cross_cluster_revocation,omitempty"`

	// Interval to check for new revocations on, to regenerate the delta CRL.
	// Interval to check for new revocations on, to regenerate the delta CRL.
	DeltaRebuildInterval *string `json:"deltaRebuildInterval,omitempty" tf:"delta_rebuild_interval,omitempty"`

	// Disables or enables CRL building.
	// Disables or enables CRL building
	Disable *bool `json:"disable,omitempty" tf:"disable,omitempty"`

	// Enables building of delta CRLs with up-to-date revocation information,
	// augmenting the last complete CRL.  Vault 1.12+
	// Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL.
	EnableDelta *bool `json:"enableDelta,omitempty" tf:"enable_delta,omitempty"`

	// Specifies the time until expiration.
	// Specifies the time until expiration.
	Expiry *string `json:"expiry,omitempty" tf:"expiry,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// Disables the OCSP responder in Vault. Vault 1.12+
	// Disables or enables the OCSP responder in Vault.
	OcspDisable *bool `json:"ocspDisable,omitempty" tf:"ocsp_disable,omitempty"`

	// The amount of time an OCSP response can be cached for, useful for OCSP stapling
	// refresh durations. Vault 1.12+
	// The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations.
	OcspExpiry *string `json:"ocspExpiry,omitempty" tf:"ocsp_expiry,omitempty"`

	// Enables unified CRL and OCSP building. Vault 1.13+
	// Enables unified CRL and OCSP building.
	UnifiedCrl *bool `json:"unifiedCrl,omitempty" tf:"unified_crl,omitempty"`

	// Enables serving the unified CRL and OCSP on the existing, previously
	// cluster-local paths. Vault 1.13+
	// Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths.
	UnifiedCrlOnExistingPaths *bool `json:"unifiedCrlOnExistingPaths,omitempty" tf:"unified_crl_on_existing_paths,omitempty"`
}

func (*SecretBackendCrlConfigInitParameters) DeepCopy added in v0.2.0

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCrlConfigInitParameters.

func (*SecretBackendCrlConfigInitParameters) DeepCopyInto added in v0.2.0

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendCrlConfigList

type SecretBackendCrlConfigList struct {
	metav1.TypeMeta `json:",inline"`
	metav1.ListMeta `json:"metadata,omitempty"`
	Items           []SecretBackendCrlConfig `json:"items"`
}

SecretBackendCrlConfigList contains a list of SecretBackendCrlConfigs

func (*SecretBackendCrlConfigList) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCrlConfigList.

func (*SecretBackendCrlConfigList) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendCrlConfigList) DeepCopyObject

func (in *SecretBackendCrlConfigList) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendCrlConfigList) GetItems

GetItems of this SecretBackendCrlConfigList.

type SecretBackendCrlConfigObservation

type SecretBackendCrlConfigObservation struct {

	// Enables periodic rebuilding of the CRL upon expiry. Vault 1.12+
	// Enables or disables periodic rebuilding of the CRL upon expiry.
	AutoRebuild *bool `json:"autoRebuild,omitempty" tf:"auto_rebuild,omitempty"`

	// Grace period before CRL expiry to attempt rebuild of CRL. Vault 1.12+
	// Grace period before CRL expiry to attempt rebuild of CRL.
	AutoRebuildGracePeriod *string `json:"autoRebuildGracePeriod,omitempty" tf:"auto_rebuild_grace_period,omitempty"`

	// The path the PKI secret backend is mounted at, with no leading or trailing /s.
	// The path of the PKI secret backend the resource belongs to.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// Enable cross-cluster revocation request queues. Vault 1.13+
	// Enable cross-cluster revocation request queues.
	CrossClusterRevocation *bool `json:"crossClusterRevocation,omitempty" tf:"cross_cluster_revocation,omitempty"`

	// Interval to check for new revocations on, to regenerate the delta CRL.
	// Interval to check for new revocations on, to regenerate the delta CRL.
	DeltaRebuildInterval *string `json:"deltaRebuildInterval,omitempty" tf:"delta_rebuild_interval,omitempty"`

	// Disables or enables CRL building.
	// Disables or enables CRL building
	Disable *bool `json:"disable,omitempty" tf:"disable,omitempty"`

	// Enables building of delta CRLs with up-to-date revocation information,
	// augmenting the last complete CRL.  Vault 1.12+
	// Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL.
	EnableDelta *bool `json:"enableDelta,omitempty" tf:"enable_delta,omitempty"`

	// Specifies the time until expiration.
	// Specifies the time until expiration.
	Expiry *string `json:"expiry,omitempty" tf:"expiry,omitempty"`

	ID *string `json:"id,omitempty" tf:"id,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// Disables the OCSP responder in Vault. Vault 1.12+
	// Disables or enables the OCSP responder in Vault.
	OcspDisable *bool `json:"ocspDisable,omitempty" tf:"ocsp_disable,omitempty"`

	// The amount of time an OCSP response can be cached for, useful for OCSP stapling
	// refresh durations. Vault 1.12+
	// The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations.
	OcspExpiry *string `json:"ocspExpiry,omitempty" tf:"ocsp_expiry,omitempty"`

	// Enables unified CRL and OCSP building. Vault 1.13+
	// Enables unified CRL and OCSP building.
	UnifiedCrl *bool `json:"unifiedCrl,omitempty" tf:"unified_crl,omitempty"`

	// Enables serving the unified CRL and OCSP on the existing, previously
	// cluster-local paths. Vault 1.13+
	// Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths.
	UnifiedCrlOnExistingPaths *bool `json:"unifiedCrlOnExistingPaths,omitempty" tf:"unified_crl_on_existing_paths,omitempty"`
}

func (*SecretBackendCrlConfigObservation) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCrlConfigObservation.

func (*SecretBackendCrlConfigObservation) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendCrlConfigParameters

type SecretBackendCrlConfigParameters struct {

	// Enables periodic rebuilding of the CRL upon expiry. Vault 1.12+
	// Enables or disables periodic rebuilding of the CRL upon expiry.
	// +kubebuilder:validation:Optional
	AutoRebuild *bool `json:"autoRebuild,omitempty" tf:"auto_rebuild,omitempty"`

	// Grace period before CRL expiry to attempt rebuild of CRL. Vault 1.12+
	// Grace period before CRL expiry to attempt rebuild of CRL.
	// +kubebuilder:validation:Optional
	AutoRebuildGracePeriod *string `json:"autoRebuildGracePeriod,omitempty" tf:"auto_rebuild_grace_period,omitempty"`

	// The path the PKI secret backend is mounted at, with no leading or trailing /s.
	// The path of the PKI secret backend the resource belongs to.
	// +kubebuilder:validation:Optional
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// Enable cross-cluster revocation request queues. Vault 1.13+
	// Enable cross-cluster revocation request queues.
	// +kubebuilder:validation:Optional
	CrossClusterRevocation *bool `json:"crossClusterRevocation,omitempty" tf:"cross_cluster_revocation,omitempty"`

	// Interval to check for new revocations on, to regenerate the delta CRL.
	// Interval to check for new revocations on, to regenerate the delta CRL.
	// +kubebuilder:validation:Optional
	DeltaRebuildInterval *string `json:"deltaRebuildInterval,omitempty" tf:"delta_rebuild_interval,omitempty"`

	// Disables or enables CRL building.
	// Disables or enables CRL building
	// +kubebuilder:validation:Optional
	Disable *bool `json:"disable,omitempty" tf:"disable,omitempty"`

	// Enables building of delta CRLs with up-to-date revocation information,
	// augmenting the last complete CRL.  Vault 1.12+
	// Enables or disables building of delta CRLs with up-to-date revocation information, augmenting the last complete CRL.
	// +kubebuilder:validation:Optional
	EnableDelta *bool `json:"enableDelta,omitempty" tf:"enable_delta,omitempty"`

	// Specifies the time until expiration.
	// Specifies the time until expiration.
	// +kubebuilder:validation:Optional
	Expiry *string `json:"expiry,omitempty" tf:"expiry,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	// +kubebuilder:validation:Optional
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// Disables the OCSP responder in Vault. Vault 1.12+
	// Disables or enables the OCSP responder in Vault.
	// +kubebuilder:validation:Optional
	OcspDisable *bool `json:"ocspDisable,omitempty" tf:"ocsp_disable,omitempty"`

	// The amount of time an OCSP response can be cached for, useful for OCSP stapling
	// refresh durations. Vault 1.12+
	// The amount of time an OCSP response can be cached for, useful for OCSP stapling refresh durations.
	// +kubebuilder:validation:Optional
	OcspExpiry *string `json:"ocspExpiry,omitempty" tf:"ocsp_expiry,omitempty"`

	// Enables unified CRL and OCSP building. Vault 1.13+
	// Enables unified CRL and OCSP building.
	// +kubebuilder:validation:Optional
	UnifiedCrl *bool `json:"unifiedCrl,omitempty" tf:"unified_crl,omitempty"`

	// Enables serving the unified CRL and OCSP on the existing, previously
	// cluster-local paths. Vault 1.13+
	// Enables serving the unified CRL and OCSP on the existing, previously cluster-local paths.
	// +kubebuilder:validation:Optional
	UnifiedCrlOnExistingPaths *bool `json:"unifiedCrlOnExistingPaths,omitempty" tf:"unified_crl_on_existing_paths,omitempty"`
}

func (*SecretBackendCrlConfigParameters) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCrlConfigParameters.

func (*SecretBackendCrlConfigParameters) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendCrlConfigSpec

type SecretBackendCrlConfigSpec struct {
	v1.ResourceSpec `json:",inline"`
	ForProvider     SecretBackendCrlConfigParameters `json:"forProvider"`
	// THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored
	// unless the relevant Crossplane feature flag is enabled, and may be
	// changed or removed without notice.
	// InitProvider holds the same fields as ForProvider, with the exception
	// of Identifier and other resource reference fields. The fields that are
	// in InitProvider are merged into ForProvider when the resource is created.
	// The same fields are also added to the terraform ignore_changes hook, to
	// avoid updating them after creation. This is useful for fields that are
	// required on creation, but we do not desire to update them after creation,
	// for example because of an external controller is managing them, like an
	// autoscaler.
	InitProvider SecretBackendCrlConfigInitParameters `json:"initProvider,omitempty"`
}

SecretBackendCrlConfigSpec defines the desired state of SecretBackendCrlConfig

func (*SecretBackendCrlConfigSpec) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCrlConfigSpec.

func (*SecretBackendCrlConfigSpec) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendCrlConfigStatus

type SecretBackendCrlConfigStatus struct {
	v1.ResourceStatus `json:",inline"`
	AtProvider        SecretBackendCrlConfigObservation `json:"atProvider,omitempty"`
}

SecretBackendCrlConfigStatus defines the observed state of SecretBackendCrlConfig.

func (*SecretBackendCrlConfigStatus) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCrlConfigStatus.

func (*SecretBackendCrlConfigStatus) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendIntermediateCertRequest

type SecretBackendIntermediateCertRequest struct {
	metav1.TypeMeta   `json:",inline"`
	metav1.ObjectMeta `json:"metadata,omitempty"`
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.backend) || has(self.initProvider.backend)",message="backend is a required parameter"
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.commonName) || has(self.initProvider.commonName)",message="commonName is a required parameter"
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.type) || has(self.initProvider.type)",message="type is a required parameter"
	Spec   SecretBackendIntermediateCertRequestSpec   `json:"spec"`
	Status SecretBackendIntermediateCertRequestStatus `json:"status,omitempty"`
}

SecretBackendIntermediateCertRequest is the Schema for the SecretBackendIntermediateCertRequests API. Generate a new private key and a CSR for signing the PKI. +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}

func (*SecretBackendIntermediateCertRequest) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendIntermediateCertRequest.

func (*SecretBackendIntermediateCertRequest) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendIntermediateCertRequest) DeepCopyObject

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendIntermediateCertRequest) GetCondition

GetCondition of this SecretBackendIntermediateCertRequest.

func (*SecretBackendIntermediateCertRequest) GetConnectionDetailsMapping

func (tr *SecretBackendIntermediateCertRequest) GetConnectionDetailsMapping() map[string]string

GetConnectionDetailsMapping for this SecretBackendIntermediateCertRequest

func (*SecretBackendIntermediateCertRequest) GetDeletionPolicy

GetDeletionPolicy of this SecretBackendIntermediateCertRequest.

func (*SecretBackendIntermediateCertRequest) GetID

GetID returns ID of underlying Terraform resource of this SecretBackendIntermediateCertRequest

func (*SecretBackendIntermediateCertRequest) GetInitParameters added in v0.2.0

func (tr *SecretBackendIntermediateCertRequest) GetInitParameters() (map[string]any, error)

GetInitParameters of this SecretBackendIntermediateCertRequest

func (*SecretBackendIntermediateCertRequest) GetManagementPolicies added in v0.2.0

func (mg *SecretBackendIntermediateCertRequest) GetManagementPolicies() xpv1.ManagementPolicies

GetManagementPolicies of this SecretBackendIntermediateCertRequest.

func (*SecretBackendIntermediateCertRequest) GetObservation

func (tr *SecretBackendIntermediateCertRequest) GetObservation() (map[string]any, error)

GetObservation of this SecretBackendIntermediateCertRequest

func (*SecretBackendIntermediateCertRequest) GetParameters

func (tr *SecretBackendIntermediateCertRequest) GetParameters() (map[string]any, error)

GetParameters of this SecretBackendIntermediateCertRequest

func (*SecretBackendIntermediateCertRequest) GetProviderConfigReference

func (mg *SecretBackendIntermediateCertRequest) GetProviderConfigReference() *xpv1.Reference

GetProviderConfigReference of this SecretBackendIntermediateCertRequest.

func (*SecretBackendIntermediateCertRequest) GetProviderReference

func (mg *SecretBackendIntermediateCertRequest) GetProviderReference() *xpv1.Reference

GetProviderReference of this SecretBackendIntermediateCertRequest. Deprecated: Use GetProviderConfigReference.

func (*SecretBackendIntermediateCertRequest) GetPublishConnectionDetailsTo

func (mg *SecretBackendIntermediateCertRequest) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo

GetPublishConnectionDetailsTo of this SecretBackendIntermediateCertRequest.

func (*SecretBackendIntermediateCertRequest) GetTerraformResourceType

func (mg *SecretBackendIntermediateCertRequest) GetTerraformResourceType() string

GetTerraformResourceType returns Terraform resource type for this SecretBackendIntermediateCertRequest

func (*SecretBackendIntermediateCertRequest) GetTerraformSchemaVersion

func (tr *SecretBackendIntermediateCertRequest) GetTerraformSchemaVersion() int

GetTerraformSchemaVersion returns the associated Terraform schema version

func (*SecretBackendIntermediateCertRequest) GetWriteConnectionSecretToReference

func (mg *SecretBackendIntermediateCertRequest) GetWriteConnectionSecretToReference() *xpv1.SecretReference

GetWriteConnectionSecretToReference of this SecretBackendIntermediateCertRequest.

func (*SecretBackendIntermediateCertRequest) LateInitialize

func (tr *SecretBackendIntermediateCertRequest) LateInitialize(attrs []byte) (bool, error)

LateInitialize this SecretBackendIntermediateCertRequest using its observed tfState. returns True if there are any spec changes for the resource.

func (*SecretBackendIntermediateCertRequest) SetConditions

func (mg *SecretBackendIntermediateCertRequest) SetConditions(c ...xpv1.Condition)

SetConditions of this SecretBackendIntermediateCertRequest.

func (*SecretBackendIntermediateCertRequest) SetDeletionPolicy

func (mg *SecretBackendIntermediateCertRequest) SetDeletionPolicy(r xpv1.DeletionPolicy)

SetDeletionPolicy of this SecretBackendIntermediateCertRequest.

func (*SecretBackendIntermediateCertRequest) SetManagementPolicies added in v0.2.0

func (mg *SecretBackendIntermediateCertRequest) SetManagementPolicies(r xpv1.ManagementPolicies)

SetManagementPolicies of this SecretBackendIntermediateCertRequest.

func (*SecretBackendIntermediateCertRequest) SetObservation

func (tr *SecretBackendIntermediateCertRequest) SetObservation(obs map[string]any) error

SetObservation for this SecretBackendIntermediateCertRequest

func (*SecretBackendIntermediateCertRequest) SetParameters

func (tr *SecretBackendIntermediateCertRequest) SetParameters(params map[string]any) error

SetParameters for this SecretBackendIntermediateCertRequest

func (*SecretBackendIntermediateCertRequest) SetProviderConfigReference

func (mg *SecretBackendIntermediateCertRequest) SetProviderConfigReference(r *xpv1.Reference)

SetProviderConfigReference of this SecretBackendIntermediateCertRequest.

func (*SecretBackendIntermediateCertRequest) SetProviderReference

func (mg *SecretBackendIntermediateCertRequest) SetProviderReference(r *xpv1.Reference)

SetProviderReference of this SecretBackendIntermediateCertRequest. Deprecated: Use SetProviderConfigReference.

func (*SecretBackendIntermediateCertRequest) SetPublishConnectionDetailsTo

func (mg *SecretBackendIntermediateCertRequest) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)

SetPublishConnectionDetailsTo of this SecretBackendIntermediateCertRequest.

func (*SecretBackendIntermediateCertRequest) SetWriteConnectionSecretToReference

func (mg *SecretBackendIntermediateCertRequest) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)

SetWriteConnectionSecretToReference of this SecretBackendIntermediateCertRequest.

type SecretBackendIntermediateCertRequestInitParameters added in v0.2.0

type SecretBackendIntermediateCertRequestInitParameters struct {

	// Adds a Basic Constraints extension with 'CA: true'.
	// Only needed as a workaround in some compatibility scenarios with Active Directory
	// Certificate Services
	// Set 'CA: true' in a Basic Constraints extension. Only needed as
	// a workaround in some compatibility scenarios with Active Directory Certificate Services.
	AddBasicConstraints *bool `json:"addBasicConstraints,omitempty" tf:"add_basic_constraints,omitempty"`

	// List of alternative names
	// List of alternative names.
	AltNames []*string `json:"altNames,omitempty" tf:"alt_names,omitempty"`

	// The PKI secret backend the resource belongs to.
	// The PKI secret backend the resource belongs to.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// CN of intermediate to create
	// CN of intermediate to create.
	CommonName *string `json:"commonName,omitempty" tf:"common_name,omitempty"`

	// The country
	// The country.
	Country *string `json:"country,omitempty" tf:"country,omitempty"`

	// Flag to exclude CN from SANs
	// Flag to exclude CN from SANs.
	ExcludeCnFromSans *bool `json:"excludeCnFromSans,omitempty" tf:"exclude_cn_from_sans,omitempty"`

	// The format of data
	// The format of data.
	Format *string `json:"format,omitempty" tf:"format,omitempty"`

	// List of alternative IPs
	// List of alternative IPs.
	IPSans []*string `json:"ipSans,omitempty" tf:"ip_sans,omitempty"`

	// The number of bits to use
	// The number of bits to use.
	KeyBits *float64 `json:"keyBits,omitempty" tf:"key_bits,omitempty"`

	// When a new key is created with this request, optionally specifies
	// the name for this. The global ref default may not be used as a name.
	// When a new key is created with this request, optionally specifies the name for this.
	KeyName *string `json:"keyName,omitempty" tf:"key_name,omitempty"`

	// Specifies the key (either default, by name, or by identifier) to use
	// for generating this request. Only suitable for type=existing requests.
	// Specifies the key to use for generating this request.
	KeyRef *string `json:"keyRef,omitempty" tf:"key_ref,omitempty"`

	// The desired key type
	// The desired key type.
	KeyType *string `json:"keyType,omitempty" tf:"key_type,omitempty"`

	// The locality
	// The locality.
	Locality *string `json:"locality,omitempty" tf:"locality,omitempty"`

	// The ID of the previously configured managed key. This field is
	// required if type is kms and it conflicts with managed_key_name
	// The ID of the previously configured managed key.
	ManagedKeyID *string `json:"managedKeyId,omitempty" tf:"managed_key_id,omitempty"`

	// The name of the previously configured managed key. This field is
	// required if type is kms  and it conflicts with managed_key_id
	// The name of the previously configured managed key.
	ManagedKeyName *string `json:"managedKeyName,omitempty" tf:"managed_key_name,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The organization
	// The organization.
	Organization *string `json:"organization,omitempty" tf:"organization,omitempty"`

	// List of other SANs
	// List of other SANs.
	OtherSans []*string `json:"otherSans,omitempty" tf:"other_sans,omitempty"`

	// The organization unit
	// The organization unit.
	Ou *string `json:"ou,omitempty" tf:"ou,omitempty"`

	// The postal code
	// The postal code.
	PostalCode *string `json:"postalCode,omitempty" tf:"postal_code,omitempty"`

	// The private key format
	// The private key format.
	PrivateKeyFormat *string `json:"privateKeyFormat,omitempty" tf:"private_key_format,omitempty"`

	// The province
	// The province.
	Province *string `json:"province,omitempty" tf:"province,omitempty"`

	// The street address
	// The street address.
	StreetAddress *string `json:"streetAddress,omitempty" tf:"street_address,omitempty"`

	// Type of intermediate to create. Must be either "exported" or "internal"
	// or "kms"
	// Type of intermediate to create. Must be either "existing", "exported", "internal" or "kms"
	Type *string `json:"type,omitempty" tf:"type,omitempty"`

	// List of alternative URIs
	// List of alternative URIs.
	URISans []*string `json:"uriSans,omitempty" tf:"uri_sans,omitempty"`
}

func (*SecretBackendIntermediateCertRequestInitParameters) DeepCopy added in v0.2.0

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendIntermediateCertRequestInitParameters.

func (*SecretBackendIntermediateCertRequestInitParameters) DeepCopyInto added in v0.2.0

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendIntermediateCertRequestList

type SecretBackendIntermediateCertRequestList struct {
	metav1.TypeMeta `json:",inline"`
	metav1.ListMeta `json:"metadata,omitempty"`
	Items           []SecretBackendIntermediateCertRequest `json:"items"`
}

SecretBackendIntermediateCertRequestList contains a list of SecretBackendIntermediateCertRequests

func (*SecretBackendIntermediateCertRequestList) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendIntermediateCertRequestList.

func (*SecretBackendIntermediateCertRequestList) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendIntermediateCertRequestList) DeepCopyObject

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendIntermediateCertRequestList) GetItems

GetItems of this SecretBackendIntermediateCertRequestList.

type SecretBackendIntermediateCertRequestObservation

type SecretBackendIntermediateCertRequestObservation struct {

	// Adds a Basic Constraints extension with 'CA: true'.
	// Only needed as a workaround in some compatibility scenarios with Active Directory
	// Certificate Services
	// Set 'CA: true' in a Basic Constraints extension. Only needed as
	// a workaround in some compatibility scenarios with Active Directory Certificate Services.
	AddBasicConstraints *bool `json:"addBasicConstraints,omitempty" tf:"add_basic_constraints,omitempty"`

	// List of alternative names
	// List of alternative names.
	AltNames []*string `json:"altNames,omitempty" tf:"alt_names,omitempty"`

	// The PKI secret backend the resource belongs to.
	// The PKI secret backend the resource belongs to.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// CN of intermediate to create
	// CN of intermediate to create.
	CommonName *string `json:"commonName,omitempty" tf:"common_name,omitempty"`

	// The country
	// The country.
	Country *string `json:"country,omitempty" tf:"country,omitempty"`

	// The CSR
	// The CSR.
	Csr *string `json:"csr,omitempty" tf:"csr,omitempty"`

	// Flag to exclude CN from SANs
	// Flag to exclude CN from SANs.
	ExcludeCnFromSans *bool `json:"excludeCnFromSans,omitempty" tf:"exclude_cn_from_sans,omitempty"`

	// The format of data
	// The format of data.
	Format *string `json:"format,omitempty" tf:"format,omitempty"`

	ID *string `json:"id,omitempty" tf:"id,omitempty"`

	// List of alternative IPs
	// List of alternative IPs.
	IPSans []*string `json:"ipSans,omitempty" tf:"ip_sans,omitempty"`

	// The number of bits to use
	// The number of bits to use.
	KeyBits *float64 `json:"keyBits,omitempty" tf:"key_bits,omitempty"`

	// The ID of the generated key.
	// The ID of the generated key.
	KeyID *string `json:"keyId,omitempty" tf:"key_id,omitempty"`

	// When a new key is created with this request, optionally specifies
	// the name for this. The global ref default may not be used as a name.
	// When a new key is created with this request, optionally specifies the name for this.
	KeyName *string `json:"keyName,omitempty" tf:"key_name,omitempty"`

	// Specifies the key (either default, by name, or by identifier) to use
	// for generating this request. Only suitable for type=existing requests.
	// Specifies the key to use for generating this request.
	KeyRef *string `json:"keyRef,omitempty" tf:"key_ref,omitempty"`

	// The desired key type
	// The desired key type.
	KeyType *string `json:"keyType,omitempty" tf:"key_type,omitempty"`

	// The locality
	// The locality.
	Locality *string `json:"locality,omitempty" tf:"locality,omitempty"`

	// The ID of the previously configured managed key. This field is
	// required if type is kms and it conflicts with managed_key_name
	// The ID of the previously configured managed key.
	ManagedKeyID *string `json:"managedKeyId,omitempty" tf:"managed_key_id,omitempty"`

	// The name of the previously configured managed key. This field is
	// required if type is kms  and it conflicts with managed_key_id
	// The name of the previously configured managed key.
	ManagedKeyName *string `json:"managedKeyName,omitempty" tf:"managed_key_name,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The organization
	// The organization.
	Organization *string `json:"organization,omitempty" tf:"organization,omitempty"`

	// List of other SANs
	// List of other SANs.
	OtherSans []*string `json:"otherSans,omitempty" tf:"other_sans,omitempty"`

	// The organization unit
	// The organization unit.
	Ou *string `json:"ou,omitempty" tf:"ou,omitempty"`

	// The postal code
	// The postal code.
	PostalCode *string `json:"postalCode,omitempty" tf:"postal_code,omitempty"`

	// The private key format
	// The private key format.
	PrivateKeyFormat *string `json:"privateKeyFormat,omitempty" tf:"private_key_format,omitempty"`

	// The private key type
	// The private key type.
	PrivateKeyType *string `json:"privateKeyType,omitempty" tf:"private_key_type,omitempty"`

	// The province
	// The province.
	Province *string `json:"province,omitempty" tf:"province,omitempty"`

	// The street address
	// The street address.
	StreetAddress *string `json:"streetAddress,omitempty" tf:"street_address,omitempty"`

	// Type of intermediate to create. Must be either "exported" or "internal"
	// or "kms"
	// Type of intermediate to create. Must be either "existing", "exported", "internal" or "kms"
	Type *string `json:"type,omitempty" tf:"type,omitempty"`

	// List of alternative URIs
	// List of alternative URIs.
	URISans []*string `json:"uriSans,omitempty" tf:"uri_sans,omitempty"`
}

func (*SecretBackendIntermediateCertRequestObservation) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendIntermediateCertRequestObservation.

func (*SecretBackendIntermediateCertRequestObservation) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendIntermediateCertRequestParameters

type SecretBackendIntermediateCertRequestParameters struct {

	// Adds a Basic Constraints extension with 'CA: true'.
	// Only needed as a workaround in some compatibility scenarios with Active Directory
	// Certificate Services
	// Set 'CA: true' in a Basic Constraints extension. Only needed as
	// a workaround in some compatibility scenarios with Active Directory Certificate Services.
	// +kubebuilder:validation:Optional
	AddBasicConstraints *bool `json:"addBasicConstraints,omitempty" tf:"add_basic_constraints,omitempty"`

	// List of alternative names
	// List of alternative names.
	// +kubebuilder:validation:Optional
	AltNames []*string `json:"altNames,omitempty" tf:"alt_names,omitempty"`

	// The PKI secret backend the resource belongs to.
	// The PKI secret backend the resource belongs to.
	// +kubebuilder:validation:Optional
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// CN of intermediate to create
	// CN of intermediate to create.
	// +kubebuilder:validation:Optional
	CommonName *string `json:"commonName,omitempty" tf:"common_name,omitempty"`

	// The country
	// The country.
	// +kubebuilder:validation:Optional
	Country *string `json:"country,omitempty" tf:"country,omitempty"`

	// Flag to exclude CN from SANs
	// Flag to exclude CN from SANs.
	// +kubebuilder:validation:Optional
	ExcludeCnFromSans *bool `json:"excludeCnFromSans,omitempty" tf:"exclude_cn_from_sans,omitempty"`

	// The format of data
	// The format of data.
	// +kubebuilder:validation:Optional
	Format *string `json:"format,omitempty" tf:"format,omitempty"`

	// List of alternative IPs
	// List of alternative IPs.
	// +kubebuilder:validation:Optional
	IPSans []*string `json:"ipSans,omitempty" tf:"ip_sans,omitempty"`

	// The number of bits to use
	// The number of bits to use.
	// +kubebuilder:validation:Optional
	KeyBits *float64 `json:"keyBits,omitempty" tf:"key_bits,omitempty"`

	// When a new key is created with this request, optionally specifies
	// the name for this. The global ref default may not be used as a name.
	// When a new key is created with this request, optionally specifies the name for this.
	// +kubebuilder:validation:Optional
	KeyName *string `json:"keyName,omitempty" tf:"key_name,omitempty"`

	// Specifies the key (either default, by name, or by identifier) to use
	// for generating this request. Only suitable for type=existing requests.
	// Specifies the key to use for generating this request.
	// +kubebuilder:validation:Optional
	KeyRef *string `json:"keyRef,omitempty" tf:"key_ref,omitempty"`

	// The desired key type
	// The desired key type.
	// +kubebuilder:validation:Optional
	KeyType *string `json:"keyType,omitempty" tf:"key_type,omitempty"`

	// The locality
	// The locality.
	// +kubebuilder:validation:Optional
	Locality *string `json:"locality,omitempty" tf:"locality,omitempty"`

	// The ID of the previously configured managed key. This field is
	// required if type is kms and it conflicts with managed_key_name
	// The ID of the previously configured managed key.
	// +kubebuilder:validation:Optional
	ManagedKeyID *string `json:"managedKeyId,omitempty" tf:"managed_key_id,omitempty"`

	// The name of the previously configured managed key. This field is
	// required if type is kms  and it conflicts with managed_key_id
	// The name of the previously configured managed key.
	// +kubebuilder:validation:Optional
	ManagedKeyName *string `json:"managedKeyName,omitempty" tf:"managed_key_name,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	// +kubebuilder:validation:Optional
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The organization
	// The organization.
	// +kubebuilder:validation:Optional
	Organization *string `json:"organization,omitempty" tf:"organization,omitempty"`

	// List of other SANs
	// List of other SANs.
	// +kubebuilder:validation:Optional
	OtherSans []*string `json:"otherSans,omitempty" tf:"other_sans,omitempty"`

	// The organization unit
	// The organization unit.
	// +kubebuilder:validation:Optional
	Ou *string `json:"ou,omitempty" tf:"ou,omitempty"`

	// The postal code
	// The postal code.
	// +kubebuilder:validation:Optional
	PostalCode *string `json:"postalCode,omitempty" tf:"postal_code,omitempty"`

	// The private key format
	// The private key format.
	// +kubebuilder:validation:Optional
	PrivateKeyFormat *string `json:"privateKeyFormat,omitempty" tf:"private_key_format,omitempty"`

	// The province
	// The province.
	// +kubebuilder:validation:Optional
	Province *string `json:"province,omitempty" tf:"province,omitempty"`

	// The street address
	// The street address.
	// +kubebuilder:validation:Optional
	StreetAddress *string `json:"streetAddress,omitempty" tf:"street_address,omitempty"`

	// Type of intermediate to create. Must be either "exported" or "internal"
	// or "kms"
	// Type of intermediate to create. Must be either "existing", "exported", "internal" or "kms"
	// +kubebuilder:validation:Optional
	Type *string `json:"type,omitempty" tf:"type,omitempty"`

	// List of alternative URIs
	// List of alternative URIs.
	// +kubebuilder:validation:Optional
	URISans []*string `json:"uriSans,omitempty" tf:"uri_sans,omitempty"`
}

func (*SecretBackendIntermediateCertRequestParameters) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendIntermediateCertRequestParameters.

func (*SecretBackendIntermediateCertRequestParameters) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendIntermediateCertRequestSpec

type SecretBackendIntermediateCertRequestSpec struct {
	v1.ResourceSpec `json:",inline"`
	ForProvider     SecretBackendIntermediateCertRequestParameters `json:"forProvider"`
	// THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored
	// unless the relevant Crossplane feature flag is enabled, and may be
	// changed or removed without notice.
	// InitProvider holds the same fields as ForProvider, with the exception
	// of Identifier and other resource reference fields. The fields that are
	// in InitProvider are merged into ForProvider when the resource is created.
	// The same fields are also added to the terraform ignore_changes hook, to
	// avoid updating them after creation. This is useful for fields that are
	// required on creation, but we do not desire to update them after creation,
	// for example because of an external controller is managing them, like an
	// autoscaler.
	InitProvider SecretBackendIntermediateCertRequestInitParameters `json:"initProvider,omitempty"`
}

SecretBackendIntermediateCertRequestSpec defines the desired state of SecretBackendIntermediateCertRequest

func (*SecretBackendIntermediateCertRequestSpec) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendIntermediateCertRequestSpec.

func (*SecretBackendIntermediateCertRequestSpec) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendIntermediateCertRequestStatus

type SecretBackendIntermediateCertRequestStatus struct {
	v1.ResourceStatus `json:",inline"`
	AtProvider        SecretBackendIntermediateCertRequestObservation `json:"atProvider,omitempty"`
}

SecretBackendIntermediateCertRequestStatus defines the observed state of SecretBackendIntermediateCertRequest.

func (*SecretBackendIntermediateCertRequestStatus) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendIntermediateCertRequestStatus.

func (*SecretBackendIntermediateCertRequestStatus) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendIntermediateSetSigned

type SecretBackendIntermediateSetSigned struct {
	metav1.TypeMeta   `json:",inline"`
	metav1.ObjectMeta `json:"metadata,omitempty"`
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.backend) || has(self.initProvider.backend)",message="backend is a required parameter"
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.certificate) || has(self.initProvider.certificate)",message="certificate is a required parameter"
	Spec   SecretBackendIntermediateSetSignedSpec   `json:"spec"`
	Status SecretBackendIntermediateSetSignedStatus `json:"status,omitempty"`
}

SecretBackendIntermediateSetSigned is the Schema for the SecretBackendIntermediateSetSigneds API. Submit the PKI CA certificate. +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}

func (*SecretBackendIntermediateSetSigned) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendIntermediateSetSigned.

func (*SecretBackendIntermediateSetSigned) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendIntermediateSetSigned) DeepCopyObject

func (in *SecretBackendIntermediateSetSigned) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendIntermediateSetSigned) GetCondition

GetCondition of this SecretBackendIntermediateSetSigned.

func (*SecretBackendIntermediateSetSigned) GetConnectionDetailsMapping

func (tr *SecretBackendIntermediateSetSigned) GetConnectionDetailsMapping() map[string]string

GetConnectionDetailsMapping for this SecretBackendIntermediateSetSigned

func (*SecretBackendIntermediateSetSigned) GetDeletionPolicy

func (mg *SecretBackendIntermediateSetSigned) GetDeletionPolicy() xpv1.DeletionPolicy

GetDeletionPolicy of this SecretBackendIntermediateSetSigned.

func (*SecretBackendIntermediateSetSigned) GetID

GetID returns ID of underlying Terraform resource of this SecretBackendIntermediateSetSigned

func (*SecretBackendIntermediateSetSigned) GetInitParameters added in v0.2.0

func (tr *SecretBackendIntermediateSetSigned) GetInitParameters() (map[string]any, error)

GetInitParameters of this SecretBackendIntermediateSetSigned

func (*SecretBackendIntermediateSetSigned) GetManagementPolicies added in v0.2.0

func (mg *SecretBackendIntermediateSetSigned) GetManagementPolicies() xpv1.ManagementPolicies

GetManagementPolicies of this SecretBackendIntermediateSetSigned.

func (*SecretBackendIntermediateSetSigned) GetObservation

func (tr *SecretBackendIntermediateSetSigned) GetObservation() (map[string]any, error)

GetObservation of this SecretBackendIntermediateSetSigned

func (*SecretBackendIntermediateSetSigned) GetParameters

func (tr *SecretBackendIntermediateSetSigned) GetParameters() (map[string]any, error)

GetParameters of this SecretBackendIntermediateSetSigned

func (*SecretBackendIntermediateSetSigned) GetProviderConfigReference

func (mg *SecretBackendIntermediateSetSigned) GetProviderConfigReference() *xpv1.Reference

GetProviderConfigReference of this SecretBackendIntermediateSetSigned.

func (*SecretBackendIntermediateSetSigned) GetProviderReference

func (mg *SecretBackendIntermediateSetSigned) GetProviderReference() *xpv1.Reference

GetProviderReference of this SecretBackendIntermediateSetSigned. Deprecated: Use GetProviderConfigReference.

func (*SecretBackendIntermediateSetSigned) GetPublishConnectionDetailsTo

func (mg *SecretBackendIntermediateSetSigned) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo

GetPublishConnectionDetailsTo of this SecretBackendIntermediateSetSigned.

func (*SecretBackendIntermediateSetSigned) GetTerraformResourceType

func (mg *SecretBackendIntermediateSetSigned) GetTerraformResourceType() string

GetTerraformResourceType returns Terraform resource type for this SecretBackendIntermediateSetSigned

func (*SecretBackendIntermediateSetSigned) GetTerraformSchemaVersion

func (tr *SecretBackendIntermediateSetSigned) GetTerraformSchemaVersion() int

GetTerraformSchemaVersion returns the associated Terraform schema version

func (*SecretBackendIntermediateSetSigned) GetWriteConnectionSecretToReference

func (mg *SecretBackendIntermediateSetSigned) GetWriteConnectionSecretToReference() *xpv1.SecretReference

GetWriteConnectionSecretToReference of this SecretBackendIntermediateSetSigned.

func (*SecretBackendIntermediateSetSigned) LateInitialize

func (tr *SecretBackendIntermediateSetSigned) LateInitialize(attrs []byte) (bool, error)

LateInitialize this SecretBackendIntermediateSetSigned using its observed tfState. returns True if there are any spec changes for the resource.

func (*SecretBackendIntermediateSetSigned) SetConditions

func (mg *SecretBackendIntermediateSetSigned) SetConditions(c ...xpv1.Condition)

SetConditions of this SecretBackendIntermediateSetSigned.

func (*SecretBackendIntermediateSetSigned) SetDeletionPolicy

func (mg *SecretBackendIntermediateSetSigned) SetDeletionPolicy(r xpv1.DeletionPolicy)

SetDeletionPolicy of this SecretBackendIntermediateSetSigned.

func (*SecretBackendIntermediateSetSigned) SetManagementPolicies added in v0.2.0

func (mg *SecretBackendIntermediateSetSigned) SetManagementPolicies(r xpv1.ManagementPolicies)

SetManagementPolicies of this SecretBackendIntermediateSetSigned.

func (*SecretBackendIntermediateSetSigned) SetObservation

func (tr *SecretBackendIntermediateSetSigned) SetObservation(obs map[string]any) error

SetObservation for this SecretBackendIntermediateSetSigned

func (*SecretBackendIntermediateSetSigned) SetParameters

func (tr *SecretBackendIntermediateSetSigned) SetParameters(params map[string]any) error

SetParameters for this SecretBackendIntermediateSetSigned

func (*SecretBackendIntermediateSetSigned) SetProviderConfigReference

func (mg *SecretBackendIntermediateSetSigned) SetProviderConfigReference(r *xpv1.Reference)

SetProviderConfigReference of this SecretBackendIntermediateSetSigned.

func (*SecretBackendIntermediateSetSigned) SetProviderReference

func (mg *SecretBackendIntermediateSetSigned) SetProviderReference(r *xpv1.Reference)

SetProviderReference of this SecretBackendIntermediateSetSigned. Deprecated: Use SetProviderConfigReference.

func (*SecretBackendIntermediateSetSigned) SetPublishConnectionDetailsTo

func (mg *SecretBackendIntermediateSetSigned) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)

SetPublishConnectionDetailsTo of this SecretBackendIntermediateSetSigned.

func (*SecretBackendIntermediateSetSigned) SetWriteConnectionSecretToReference

func (mg *SecretBackendIntermediateSetSigned) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)

SetWriteConnectionSecretToReference of this SecretBackendIntermediateSetSigned.

type SecretBackendIntermediateSetSignedInitParameters added in v0.2.0

type SecretBackendIntermediateSetSignedInitParameters struct {

	// The PKI secret backend the resource belongs to.
	// The PKI secret backend the resource belongs to.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// Specifies the PEM encoded certificate. May optionally append additional
	// CA certificates to populate the whole chain, which will then enable returning the full chain from
	// issue and sign operations.
	// The certificate.
	Certificate *string `json:"certificate,omitempty" tf:"certificate,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`
}

func (*SecretBackendIntermediateSetSignedInitParameters) DeepCopy added in v0.2.0

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendIntermediateSetSignedInitParameters.

func (*SecretBackendIntermediateSetSignedInitParameters) DeepCopyInto added in v0.2.0

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendIntermediateSetSignedList

type SecretBackendIntermediateSetSignedList struct {
	metav1.TypeMeta `json:",inline"`
	metav1.ListMeta `json:"metadata,omitempty"`
	Items           []SecretBackendIntermediateSetSigned `json:"items"`
}

SecretBackendIntermediateSetSignedList contains a list of SecretBackendIntermediateSetSigneds

func (*SecretBackendIntermediateSetSignedList) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendIntermediateSetSignedList.

func (*SecretBackendIntermediateSetSignedList) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendIntermediateSetSignedList) DeepCopyObject

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendIntermediateSetSignedList) GetItems

GetItems of this SecretBackendIntermediateSetSignedList.

type SecretBackendIntermediateSetSignedObservation

type SecretBackendIntermediateSetSignedObservation struct {

	// The PKI secret backend the resource belongs to.
	// The PKI secret backend the resource belongs to.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// Specifies the PEM encoded certificate. May optionally append additional
	// CA certificates to populate the whole chain, which will then enable returning the full chain from
	// issue and sign operations.
	// The certificate.
	Certificate *string `json:"certificate,omitempty" tf:"certificate,omitempty"`

	ID *string `json:"id,omitempty" tf:"id,omitempty"`

	// The imported issuers indicating which issuers were created as part of
	// this request.
	// The imported issuers.
	ImportedIssuers []*string `json:"importedIssuers,omitempty" tf:"imported_issuers,omitempty"`

	// The imported keys indicating which keys were created as part of this request.
	// The imported keys.
	ImportedKeys []*string `json:"importedKeys,omitempty" tf:"imported_keys,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`
}

func (*SecretBackendIntermediateSetSignedObservation) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendIntermediateSetSignedObservation.

func (*SecretBackendIntermediateSetSignedObservation) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendIntermediateSetSignedParameters

type SecretBackendIntermediateSetSignedParameters struct {

	// The PKI secret backend the resource belongs to.
	// The PKI secret backend the resource belongs to.
	// +kubebuilder:validation:Optional
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// Specifies the PEM encoded certificate. May optionally append additional
	// CA certificates to populate the whole chain, which will then enable returning the full chain from
	// issue and sign operations.
	// The certificate.
	// +kubebuilder:validation:Optional
	Certificate *string `json:"certificate,omitempty" tf:"certificate,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	// +kubebuilder:validation:Optional
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`
}

func (*SecretBackendIntermediateSetSignedParameters) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendIntermediateSetSignedParameters.

func (*SecretBackendIntermediateSetSignedParameters) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendIntermediateSetSignedSpec

type SecretBackendIntermediateSetSignedSpec struct {
	v1.ResourceSpec `json:",inline"`
	ForProvider     SecretBackendIntermediateSetSignedParameters `json:"forProvider"`
	// THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored
	// unless the relevant Crossplane feature flag is enabled, and may be
	// changed or removed without notice.
	// InitProvider holds the same fields as ForProvider, with the exception
	// of Identifier and other resource reference fields. The fields that are
	// in InitProvider are merged into ForProvider when the resource is created.
	// The same fields are also added to the terraform ignore_changes hook, to
	// avoid updating them after creation. This is useful for fields that are
	// required on creation, but we do not desire to update them after creation,
	// for example because of an external controller is managing them, like an
	// autoscaler.
	InitProvider SecretBackendIntermediateSetSignedInitParameters `json:"initProvider,omitempty"`
}

SecretBackendIntermediateSetSignedSpec defines the desired state of SecretBackendIntermediateSetSigned

func (*SecretBackendIntermediateSetSignedSpec) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendIntermediateSetSignedSpec.

func (*SecretBackendIntermediateSetSignedSpec) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendIntermediateSetSignedStatus

type SecretBackendIntermediateSetSignedStatus struct {
	v1.ResourceStatus `json:",inline"`
	AtProvider        SecretBackendIntermediateSetSignedObservation `json:"atProvider,omitempty"`
}

SecretBackendIntermediateSetSignedStatus defines the observed state of SecretBackendIntermediateSetSigned.

func (*SecretBackendIntermediateSetSignedStatus) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendIntermediateSetSignedStatus.

func (*SecretBackendIntermediateSetSignedStatus) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendRole

type SecretBackendRole struct {
	metav1.TypeMeta   `json:",inline"`
	metav1.ObjectMeta `json:"metadata,omitempty"`
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.backend) || has(self.initProvider.backend)",message="backend is a required parameter"
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.name) || has(self.initProvider.name)",message="name is a required parameter"
	Spec   SecretBackendRoleSpec   `json:"spec"`
	Status SecretBackendRoleStatus `json:"status,omitempty"`
}

SecretBackendRole is the Schema for the SecretBackendRoles API. Create a role on an PKI Secret Backend for Vault. +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}

func (*SecretBackendRole) DeepCopy

func (in *SecretBackendRole) DeepCopy() *SecretBackendRole

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRole.

func (*SecretBackendRole) DeepCopyInto

func (in *SecretBackendRole) DeepCopyInto(out *SecretBackendRole)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendRole) DeepCopyObject

func (in *SecretBackendRole) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendRole) GetCondition

func (mg *SecretBackendRole) GetCondition(ct xpv1.ConditionType) xpv1.Condition

GetCondition of this SecretBackendRole.

func (*SecretBackendRole) GetConnectionDetailsMapping

func (tr *SecretBackendRole) GetConnectionDetailsMapping() map[string]string

GetConnectionDetailsMapping for this SecretBackendRole

func (*SecretBackendRole) GetDeletionPolicy

func (mg *SecretBackendRole) GetDeletionPolicy() xpv1.DeletionPolicy

GetDeletionPolicy of this SecretBackendRole.

func (*SecretBackendRole) GetID

func (tr *SecretBackendRole) GetID() string

GetID returns ID of underlying Terraform resource of this SecretBackendRole

func (*SecretBackendRole) GetInitParameters added in v0.2.0

func (tr *SecretBackendRole) GetInitParameters() (map[string]any, error)

GetInitParameters of this SecretBackendRole

func (*SecretBackendRole) GetManagementPolicies added in v0.2.0

func (mg *SecretBackendRole) GetManagementPolicies() xpv1.ManagementPolicies

GetManagementPolicies of this SecretBackendRole.

func (*SecretBackendRole) GetObservation

func (tr *SecretBackendRole) GetObservation() (map[string]any, error)

GetObservation of this SecretBackendRole

func (*SecretBackendRole) GetParameters

func (tr *SecretBackendRole) GetParameters() (map[string]any, error)

GetParameters of this SecretBackendRole

func (*SecretBackendRole) GetProviderConfigReference

func (mg *SecretBackendRole) GetProviderConfigReference() *xpv1.Reference

GetProviderConfigReference of this SecretBackendRole.

func (*SecretBackendRole) GetProviderReference

func (mg *SecretBackendRole) GetProviderReference() *xpv1.Reference

GetProviderReference of this SecretBackendRole. Deprecated: Use GetProviderConfigReference.

func (*SecretBackendRole) GetPublishConnectionDetailsTo

func (mg *SecretBackendRole) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo

GetPublishConnectionDetailsTo of this SecretBackendRole.

func (*SecretBackendRole) GetTerraformResourceType

func (mg *SecretBackendRole) GetTerraformResourceType() string

GetTerraformResourceType returns Terraform resource type for this SecretBackendRole

func (*SecretBackendRole) GetTerraformSchemaVersion

func (tr *SecretBackendRole) GetTerraformSchemaVersion() int

GetTerraformSchemaVersion returns the associated Terraform schema version

func (*SecretBackendRole) GetWriteConnectionSecretToReference

func (mg *SecretBackendRole) GetWriteConnectionSecretToReference() *xpv1.SecretReference

GetWriteConnectionSecretToReference of this SecretBackendRole.

func (*SecretBackendRole) LateInitialize

func (tr *SecretBackendRole) LateInitialize(attrs []byte) (bool, error)

LateInitialize this SecretBackendRole using its observed tfState. returns True if there are any spec changes for the resource.

func (*SecretBackendRole) SetConditions

func (mg *SecretBackendRole) SetConditions(c ...xpv1.Condition)

SetConditions of this SecretBackendRole.

func (*SecretBackendRole) SetDeletionPolicy

func (mg *SecretBackendRole) SetDeletionPolicy(r xpv1.DeletionPolicy)

SetDeletionPolicy of this SecretBackendRole.

func (*SecretBackendRole) SetManagementPolicies added in v0.2.0

func (mg *SecretBackendRole) SetManagementPolicies(r xpv1.ManagementPolicies)

SetManagementPolicies of this SecretBackendRole.

func (*SecretBackendRole) SetObservation

func (tr *SecretBackendRole) SetObservation(obs map[string]any) error

SetObservation for this SecretBackendRole

func (*SecretBackendRole) SetParameters

func (tr *SecretBackendRole) SetParameters(params map[string]any) error

SetParameters for this SecretBackendRole

func (*SecretBackendRole) SetProviderConfigReference

func (mg *SecretBackendRole) SetProviderConfigReference(r *xpv1.Reference)

SetProviderConfigReference of this SecretBackendRole.

func (*SecretBackendRole) SetProviderReference

func (mg *SecretBackendRole) SetProviderReference(r *xpv1.Reference)

SetProviderReference of this SecretBackendRole. Deprecated: Use SetProviderConfigReference.

func (*SecretBackendRole) SetPublishConnectionDetailsTo

func (mg *SecretBackendRole) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)

SetPublishConnectionDetailsTo of this SecretBackendRole.

func (*SecretBackendRole) SetWriteConnectionSecretToReference

func (mg *SecretBackendRole) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)

SetWriteConnectionSecretToReference of this SecretBackendRole.

type SecretBackendRoleInitParameters added in v0.2.0

type SecretBackendRoleInitParameters struct {

	// Flag to allow any name
	// Flag to allow any name
	AllowAnyName *bool `json:"allowAnyName,omitempty" tf:"allow_any_name,omitempty"`

	// Flag to allow certificates matching the actual domain
	// Flag to allow certificates matching the actual domain.
	AllowBareDomains *bool `json:"allowBareDomains,omitempty" tf:"allow_bare_domains,omitempty"`

	// Flag to allow names containing glob patterns.
	// Flag to allow names containing glob patterns.
	AllowGlobDomains *bool `json:"allowGlobDomains,omitempty" tf:"allow_glob_domains,omitempty"`

	// Flag to allow IP SANs
	// Flag to allow IP SANs
	AllowIPSans *bool `json:"allowIpSans,omitempty" tf:"allow_ip_sans,omitempty"`

	// Flag to allow certificates for localhost
	// Flag to allow certificates for localhost.
	AllowLocalhost *bool `json:"allowLocalhost,omitempty" tf:"allow_localhost,omitempty"`

	// Flag to allow certificates matching subdomains
	// Flag to allow certificates matching subdomains.
	AllowSubdomains *bool `json:"allowSubdomains,omitempty" tf:"allow_subdomains,omitempty"`

	// Flag to allow wildcard certificates.
	// Flag to allow wildcard certificates
	AllowWildcardCertificates *bool `json:"allowWildcardCertificates,omitempty" tf:"allow_wildcard_certificates,omitempty"`

	// List of allowed domains for certificates
	// The domains of the role.
	AllowedDomains []*string `json:"allowedDomains,omitempty" tf:"allowed_domains,omitempty"`

	// Flag, if set, allowed_domains can be specified using identity template expressions such as {{identity.entity.aliases.<mount accessor>.name}}.
	// Flag to indicate that `allowed_domains` specifies a template expression (e.g. {{identity.entity.aliases.<mount accessor>.name}})
	AllowedDomainsTemplate *bool `json:"allowedDomainsTemplate,omitempty" tf:"allowed_domains_template,omitempty"`

	// Defines allowed custom SANs
	// Defines allowed custom SANs
	AllowedOtherSans []*string `json:"allowedOtherSans,omitempty" tf:"allowed_other_sans,omitempty"`

	// An array of allowed serial numbers to put in Subject
	// Defines allowed Subject serial numbers.
	AllowedSerialNumbers []*string `json:"allowedSerialNumbers,omitempty" tf:"allowed_serial_numbers,omitempty"`

	// Defines allowed URI SANs
	// Defines allowed URI SANs
	AllowedURISans []*string `json:"allowedUriSans,omitempty" tf:"allowed_uri_sans,omitempty"`

	// Flag, if set, allowed_uri_sans can be specified using identity template expressions such as {{identity.entity.aliases.<mount accessor>.name}}.
	// Flag to indicate that `allowed_uri_sans` specifies a template expression (e.g. {{identity.entity.aliases.<mount accessor>.name}})
	AllowedURISansTemplate *bool `json:"allowedUriSansTemplate,omitempty" tf:"allowed_uri_sans_template,omitempty"`

	// Defines allowed User IDs
	// The allowed User ID's.
	AllowedUserIds []*string `json:"allowedUserIds,omitempty" tf:"allowed_user_ids,omitempty"`

	// The path the PKI secret backend is mounted at, with no leading or trailing /s.
	// The path of the PKI secret backend the resource belongs to.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// Flag to mark basic constraints valid when issuing non-CA certificates
	// Flag to mark basic constraints valid when issuing non-CA certificates.
	BasicConstraintsValidForNonCA *bool `json:"basicConstraintsValidForNonCa,omitempty" tf:"basic_constraints_valid_for_non_ca,omitempty"`

	// Flag to specify certificates for client use
	// Flag to specify certificates for client use.
	ClientFlag *bool `json:"clientFlag,omitempty" tf:"client_flag,omitempty"`

	// Flag to specify certificates for code signing use
	// Flag to specify certificates for code signing use.
	CodeSigningFlag *bool `json:"codeSigningFlag,omitempty" tf:"code_signing_flag,omitempty"`

	// The country of generated certificates
	// The country of generated certificates.
	Country []*string `json:"country,omitempty" tf:"country,omitempty"`

	// Flag to specify certificates for email protection use
	// Flag to specify certificates for email protection use.
	EmailProtectionFlag *bool `json:"emailProtectionFlag,omitempty" tf:"email_protection_flag,omitempty"`

	// Flag to allow only valid host names
	// Flag to allow only valid host names
	EnforceHostnames *bool `json:"enforceHostnames,omitempty" tf:"enforce_hostnames,omitempty"`

	// Specify the allowed extended key usage constraint on issued certificates
	// Specify the allowed extended key usage constraint on issued certificates.
	ExtKeyUsage []*string `json:"extKeyUsage,omitempty" tf:"ext_key_usage,omitempty"`

	// Specify the allowed extended key usage OIDs constraint on issued certificates
	// A list of extended key usage OIDs.
	ExtKeyUsageOids []*string `json:"extKeyUsageOids,omitempty" tf:"ext_key_usage_oids,omitempty"`

	// Flag to generate leases with certificates
	// Flag to generate leases with certificates.
	GenerateLease *bool `json:"generateLease,omitempty" tf:"generate_lease,omitempty"`

	// Specifies the default issuer of this request. May
	// be the value default, a name, or an issuer ID. Use ACLs to prevent access to
	// the /pki/issuer/:issuer_ref/{issue,sign}/:name paths to prevent users
	// overriding the role's issuer_ref value.
	// Specifies the default issuer of this request.
	IssuerRef *string `json:"issuerRef,omitempty" tf:"issuer_ref,omitempty"`

	// The number of bits of generated keys
	// The number of bits of generated keys.
	KeyBits *float64 `json:"keyBits,omitempty" tf:"key_bits,omitempty"`

	// The generated key type, choices: rsa, ec, ed25519, any
	// Defaults to rsa
	// The generated key type.
	KeyType *string `json:"keyType,omitempty" tf:"key_type,omitempty"`

	// Specify the allowed key usage constraint on issued
	// certificates. Defaults to ["DigitalSignature", "KeyAgreement", "KeyEncipherment"]).
	// To specify no default key usage constraints, set this to an empty list [].
	// Specify the allowed key usage constraint on issued certificates.
	KeyUsage []*string `json:"keyUsage,omitempty" tf:"key_usage,omitempty"`

	// The locality of generated certificates
	// The locality of generated certificates.
	Locality []*string `json:"locality,omitempty" tf:"locality,omitempty"`

	// The maximum lease TTL, in seconds, for the role.
	// The maximum TTL.
	MaxTTL *string `json:"maxTtl,omitempty" tf:"max_ttl,omitempty"`

	// The name to identify this role within the backend. Must be unique within the backend.
	// Unique name for the role.
	Name *string `json:"name,omitempty" tf:"name,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// Flag to not store certificates in the storage backend
	// Flag to not store certificates in the storage backend.
	NoStore *bool `json:"noStore,omitempty" tf:"no_store,omitempty"`

	// Specifies the duration by which to backdate the NotBefore property.
	// Specifies the duration by which to backdate the NotBefore property.
	NotBeforeDuration *string `json:"notBeforeDuration,omitempty" tf:"not_before_duration,omitempty"`

	// The organization of generated certificates
	// The organization of generated certificates.
	Organization []*string `json:"organization,omitempty" tf:"organization,omitempty"`

	// The organization unit of generated certificates
	// The organization unit of generated certificates.
	Ou []*string `json:"ou,omitempty" tf:"ou,omitempty"`

	// (Vault 1.11+ only) A block for specifying policy identifers. The policy_identifier block can be repeated, and supports the following arguments:
	// Policy identifier block; can only be used with Vault 1.11+
	PolicyIdentifier []PolicyIdentifierInitParameters `json:"policyIdentifier,omitempty" tf:"policy_identifier,omitempty"`

	// Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use policy_identifier blocks instead
	// Specify the list of allowed policies OIDs.
	PolicyIdentifiers []*string `json:"policyIdentifiers,omitempty" tf:"policy_identifiers,omitempty"`

	// The postal code of generated certificates
	// The postal code of generated certificates.
	PostalCode []*string `json:"postalCode,omitempty" tf:"postal_code,omitempty"`

	// The province of generated certificates
	// The province of generated certificates.
	Province []*string `json:"province,omitempty" tf:"province,omitempty"`

	// Flag to force CN usage
	// Flag to force CN usage.
	RequireCn *bool `json:"requireCn,omitempty" tf:"require_cn,omitempty"`

	// Flag to specify certificates for server use
	// Flag to specify certificates for server use.
	ServerFlag *bool `json:"serverFlag,omitempty" tf:"server_flag,omitempty"`

	// The street address of generated certificates
	// The street address of generated certificates.
	StreetAddress []*string `json:"streetAddress,omitempty" tf:"street_address,omitempty"`

	// The TTL, in seconds, for any certificate issued against this role.
	// The TTL.
	TTL *string `json:"ttl,omitempty" tf:"ttl,omitempty"`

	// Flag to use the CN in the CSR
	// Flag to use the CN in the CSR.
	UseCsrCommonName *bool `json:"useCsrCommonName,omitempty" tf:"use_csr_common_name,omitempty"`

	// Flag to use the SANs in the CSR
	// Flag to use the SANs in the CSR.
	UseCsrSans *bool `json:"useCsrSans,omitempty" tf:"use_csr_sans,omitempty"`
}

func (*SecretBackendRoleInitParameters) DeepCopy added in v0.2.0

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleInitParameters.

func (*SecretBackendRoleInitParameters) DeepCopyInto added in v0.2.0

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendRoleList

type SecretBackendRoleList struct {
	metav1.TypeMeta `json:",inline"`
	metav1.ListMeta `json:"metadata,omitempty"`
	Items           []SecretBackendRole `json:"items"`
}

SecretBackendRoleList contains a list of SecretBackendRoles

func (*SecretBackendRoleList) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleList.

func (*SecretBackendRoleList) DeepCopyInto

func (in *SecretBackendRoleList) DeepCopyInto(out *SecretBackendRoleList)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendRoleList) DeepCopyObject

func (in *SecretBackendRoleList) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendRoleList) GetItems

func (l *SecretBackendRoleList) GetItems() []resource.Managed

GetItems of this SecretBackendRoleList.

type SecretBackendRoleObservation

type SecretBackendRoleObservation struct {

	// Flag to allow any name
	// Flag to allow any name
	AllowAnyName *bool `json:"allowAnyName,omitempty" tf:"allow_any_name,omitempty"`

	// Flag to allow certificates matching the actual domain
	// Flag to allow certificates matching the actual domain.
	AllowBareDomains *bool `json:"allowBareDomains,omitempty" tf:"allow_bare_domains,omitempty"`

	// Flag to allow names containing glob patterns.
	// Flag to allow names containing glob patterns.
	AllowGlobDomains *bool `json:"allowGlobDomains,omitempty" tf:"allow_glob_domains,omitempty"`

	// Flag to allow IP SANs
	// Flag to allow IP SANs
	AllowIPSans *bool `json:"allowIpSans,omitempty" tf:"allow_ip_sans,omitempty"`

	// Flag to allow certificates for localhost
	// Flag to allow certificates for localhost.
	AllowLocalhost *bool `json:"allowLocalhost,omitempty" tf:"allow_localhost,omitempty"`

	// Flag to allow certificates matching subdomains
	// Flag to allow certificates matching subdomains.
	AllowSubdomains *bool `json:"allowSubdomains,omitempty" tf:"allow_subdomains,omitempty"`

	// Flag to allow wildcard certificates.
	// Flag to allow wildcard certificates
	AllowWildcardCertificates *bool `json:"allowWildcardCertificates,omitempty" tf:"allow_wildcard_certificates,omitempty"`

	// List of allowed domains for certificates
	// The domains of the role.
	AllowedDomains []*string `json:"allowedDomains,omitempty" tf:"allowed_domains,omitempty"`

	// Flag, if set, allowed_domains can be specified using identity template expressions such as {{identity.entity.aliases.<mount accessor>.name}}.
	// Flag to indicate that `allowed_domains` specifies a template expression (e.g. {{identity.entity.aliases.<mount accessor>.name}})
	AllowedDomainsTemplate *bool `json:"allowedDomainsTemplate,omitempty" tf:"allowed_domains_template,omitempty"`

	// Defines allowed custom SANs
	// Defines allowed custom SANs
	AllowedOtherSans []*string `json:"allowedOtherSans,omitempty" tf:"allowed_other_sans,omitempty"`

	// An array of allowed serial numbers to put in Subject
	// Defines allowed Subject serial numbers.
	AllowedSerialNumbers []*string `json:"allowedSerialNumbers,omitempty" tf:"allowed_serial_numbers,omitempty"`

	// Defines allowed URI SANs
	// Defines allowed URI SANs
	AllowedURISans []*string `json:"allowedUriSans,omitempty" tf:"allowed_uri_sans,omitempty"`

	// Flag, if set, allowed_uri_sans can be specified using identity template expressions such as {{identity.entity.aliases.<mount accessor>.name}}.
	// Flag to indicate that `allowed_uri_sans` specifies a template expression (e.g. {{identity.entity.aliases.<mount accessor>.name}})
	AllowedURISansTemplate *bool `json:"allowedUriSansTemplate,omitempty" tf:"allowed_uri_sans_template,omitempty"`

	// Defines allowed User IDs
	// The allowed User ID's.
	AllowedUserIds []*string `json:"allowedUserIds,omitempty" tf:"allowed_user_ids,omitempty"`

	// The path the PKI secret backend is mounted at, with no leading or trailing /s.
	// The path of the PKI secret backend the resource belongs to.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// Flag to mark basic constraints valid when issuing non-CA certificates
	// Flag to mark basic constraints valid when issuing non-CA certificates.
	BasicConstraintsValidForNonCA *bool `json:"basicConstraintsValidForNonCa,omitempty" tf:"basic_constraints_valid_for_non_ca,omitempty"`

	// Flag to specify certificates for client use
	// Flag to specify certificates for client use.
	ClientFlag *bool `json:"clientFlag,omitempty" tf:"client_flag,omitempty"`

	// Flag to specify certificates for code signing use
	// Flag to specify certificates for code signing use.
	CodeSigningFlag *bool `json:"codeSigningFlag,omitempty" tf:"code_signing_flag,omitempty"`

	// The country of generated certificates
	// The country of generated certificates.
	Country []*string `json:"country,omitempty" tf:"country,omitempty"`

	// Flag to specify certificates for email protection use
	// Flag to specify certificates for email protection use.
	EmailProtectionFlag *bool `json:"emailProtectionFlag,omitempty" tf:"email_protection_flag,omitempty"`

	// Flag to allow only valid host names
	// Flag to allow only valid host names
	EnforceHostnames *bool `json:"enforceHostnames,omitempty" tf:"enforce_hostnames,omitempty"`

	// Specify the allowed extended key usage constraint on issued certificates
	// Specify the allowed extended key usage constraint on issued certificates.
	ExtKeyUsage []*string `json:"extKeyUsage,omitempty" tf:"ext_key_usage,omitempty"`

	// Specify the allowed extended key usage OIDs constraint on issued certificates
	// A list of extended key usage OIDs.
	ExtKeyUsageOids []*string `json:"extKeyUsageOids,omitempty" tf:"ext_key_usage_oids,omitempty"`

	// Flag to generate leases with certificates
	// Flag to generate leases with certificates.
	GenerateLease *bool `json:"generateLease,omitempty" tf:"generate_lease,omitempty"`

	ID *string `json:"id,omitempty" tf:"id,omitempty"`

	// Specifies the default issuer of this request. May
	// be the value default, a name, or an issuer ID. Use ACLs to prevent access to
	// the /pki/issuer/:issuer_ref/{issue,sign}/:name paths to prevent users
	// overriding the role's issuer_ref value.
	// Specifies the default issuer of this request.
	IssuerRef *string `json:"issuerRef,omitempty" tf:"issuer_ref,omitempty"`

	// The number of bits of generated keys
	// The number of bits of generated keys.
	KeyBits *float64 `json:"keyBits,omitempty" tf:"key_bits,omitempty"`

	// The generated key type, choices: rsa, ec, ed25519, any
	// Defaults to rsa
	// The generated key type.
	KeyType *string `json:"keyType,omitempty" tf:"key_type,omitempty"`

	// Specify the allowed key usage constraint on issued
	// certificates. Defaults to ["DigitalSignature", "KeyAgreement", "KeyEncipherment"]).
	// To specify no default key usage constraints, set this to an empty list [].
	// Specify the allowed key usage constraint on issued certificates.
	KeyUsage []*string `json:"keyUsage,omitempty" tf:"key_usage,omitempty"`

	// The locality of generated certificates
	// The locality of generated certificates.
	Locality []*string `json:"locality,omitempty" tf:"locality,omitempty"`

	// The maximum lease TTL, in seconds, for the role.
	// The maximum TTL.
	MaxTTL *string `json:"maxTtl,omitempty" tf:"max_ttl,omitempty"`

	// The name to identify this role within the backend. Must be unique within the backend.
	// Unique name for the role.
	Name *string `json:"name,omitempty" tf:"name,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// Flag to not store certificates in the storage backend
	// Flag to not store certificates in the storage backend.
	NoStore *bool `json:"noStore,omitempty" tf:"no_store,omitempty"`

	// Specifies the duration by which to backdate the NotBefore property.
	// Specifies the duration by which to backdate the NotBefore property.
	NotBeforeDuration *string `json:"notBeforeDuration,omitempty" tf:"not_before_duration,omitempty"`

	// The organization of generated certificates
	// The organization of generated certificates.
	Organization []*string `json:"organization,omitempty" tf:"organization,omitempty"`

	// The organization unit of generated certificates
	// The organization unit of generated certificates.
	Ou []*string `json:"ou,omitempty" tf:"ou,omitempty"`

	// (Vault 1.11+ only) A block for specifying policy identifers. The policy_identifier block can be repeated, and supports the following arguments:
	// Policy identifier block; can only be used with Vault 1.11+
	PolicyIdentifier []PolicyIdentifierObservation `json:"policyIdentifier,omitempty" tf:"policy_identifier,omitempty"`

	// Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use policy_identifier blocks instead
	// Specify the list of allowed policies OIDs.
	PolicyIdentifiers []*string `json:"policyIdentifiers,omitempty" tf:"policy_identifiers,omitempty"`

	// The postal code of generated certificates
	// The postal code of generated certificates.
	PostalCode []*string `json:"postalCode,omitempty" tf:"postal_code,omitempty"`

	// The province of generated certificates
	// The province of generated certificates.
	Province []*string `json:"province,omitempty" tf:"province,omitempty"`

	// Flag to force CN usage
	// Flag to force CN usage.
	RequireCn *bool `json:"requireCn,omitempty" tf:"require_cn,omitempty"`

	// Flag to specify certificates for server use
	// Flag to specify certificates for server use.
	ServerFlag *bool `json:"serverFlag,omitempty" tf:"server_flag,omitempty"`

	// The street address of generated certificates
	// The street address of generated certificates.
	StreetAddress []*string `json:"streetAddress,omitempty" tf:"street_address,omitempty"`

	// The TTL, in seconds, for any certificate issued against this role.
	// The TTL.
	TTL *string `json:"ttl,omitempty" tf:"ttl,omitempty"`

	// Flag to use the CN in the CSR
	// Flag to use the CN in the CSR.
	UseCsrCommonName *bool `json:"useCsrCommonName,omitempty" tf:"use_csr_common_name,omitempty"`

	// Flag to use the SANs in the CSR
	// Flag to use the SANs in the CSR.
	UseCsrSans *bool `json:"useCsrSans,omitempty" tf:"use_csr_sans,omitempty"`
}

func (*SecretBackendRoleObservation) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleObservation.

func (*SecretBackendRoleObservation) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendRoleParameters

type SecretBackendRoleParameters struct {

	// Flag to allow any name
	// Flag to allow any name
	// +kubebuilder:validation:Optional
	AllowAnyName *bool `json:"allowAnyName,omitempty" tf:"allow_any_name,omitempty"`

	// Flag to allow certificates matching the actual domain
	// Flag to allow certificates matching the actual domain.
	// +kubebuilder:validation:Optional
	AllowBareDomains *bool `json:"allowBareDomains,omitempty" tf:"allow_bare_domains,omitempty"`

	// Flag to allow names containing glob patterns.
	// Flag to allow names containing glob patterns.
	// +kubebuilder:validation:Optional
	AllowGlobDomains *bool `json:"allowGlobDomains,omitempty" tf:"allow_glob_domains,omitempty"`

	// Flag to allow IP SANs
	// Flag to allow IP SANs
	// +kubebuilder:validation:Optional
	AllowIPSans *bool `json:"allowIpSans,omitempty" tf:"allow_ip_sans,omitempty"`

	// Flag to allow certificates for localhost
	// Flag to allow certificates for localhost.
	// +kubebuilder:validation:Optional
	AllowLocalhost *bool `json:"allowLocalhost,omitempty" tf:"allow_localhost,omitempty"`

	// Flag to allow certificates matching subdomains
	// Flag to allow certificates matching subdomains.
	// +kubebuilder:validation:Optional
	AllowSubdomains *bool `json:"allowSubdomains,omitempty" tf:"allow_subdomains,omitempty"`

	// Flag to allow wildcard certificates.
	// Flag to allow wildcard certificates
	// +kubebuilder:validation:Optional
	AllowWildcardCertificates *bool `json:"allowWildcardCertificates,omitempty" tf:"allow_wildcard_certificates,omitempty"`

	// List of allowed domains for certificates
	// The domains of the role.
	// +kubebuilder:validation:Optional
	AllowedDomains []*string `json:"allowedDomains,omitempty" tf:"allowed_domains,omitempty"`

	// Flag, if set, allowed_domains can be specified using identity template expressions such as {{identity.entity.aliases.<mount accessor>.name}}.
	// Flag to indicate that `allowed_domains` specifies a template expression (e.g. {{identity.entity.aliases.<mount accessor>.name}})
	// +kubebuilder:validation:Optional
	AllowedDomainsTemplate *bool `json:"allowedDomainsTemplate,omitempty" tf:"allowed_domains_template,omitempty"`

	// Defines allowed custom SANs
	// Defines allowed custom SANs
	// +kubebuilder:validation:Optional
	AllowedOtherSans []*string `json:"allowedOtherSans,omitempty" tf:"allowed_other_sans,omitempty"`

	// An array of allowed serial numbers to put in Subject
	// Defines allowed Subject serial numbers.
	// +kubebuilder:validation:Optional
	AllowedSerialNumbers []*string `json:"allowedSerialNumbers,omitempty" tf:"allowed_serial_numbers,omitempty"`

	// Defines allowed URI SANs
	// Defines allowed URI SANs
	// +kubebuilder:validation:Optional
	AllowedURISans []*string `json:"allowedUriSans,omitempty" tf:"allowed_uri_sans,omitempty"`

	// Flag, if set, allowed_uri_sans can be specified using identity template expressions such as {{identity.entity.aliases.<mount accessor>.name}}.
	// Flag to indicate that `allowed_uri_sans` specifies a template expression (e.g. {{identity.entity.aliases.<mount accessor>.name}})
	// +kubebuilder:validation:Optional
	AllowedURISansTemplate *bool `json:"allowedUriSansTemplate,omitempty" tf:"allowed_uri_sans_template,omitempty"`

	// Defines allowed User IDs
	// The allowed User ID's.
	// +kubebuilder:validation:Optional
	AllowedUserIds []*string `json:"allowedUserIds,omitempty" tf:"allowed_user_ids,omitempty"`

	// The path the PKI secret backend is mounted at, with no leading or trailing /s.
	// The path of the PKI secret backend the resource belongs to.
	// +kubebuilder:validation:Optional
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// Flag to mark basic constraints valid when issuing non-CA certificates
	// Flag to mark basic constraints valid when issuing non-CA certificates.
	// +kubebuilder:validation:Optional
	BasicConstraintsValidForNonCA *bool `json:"basicConstraintsValidForNonCa,omitempty" tf:"basic_constraints_valid_for_non_ca,omitempty"`

	// Flag to specify certificates for client use
	// Flag to specify certificates for client use.
	// +kubebuilder:validation:Optional
	ClientFlag *bool `json:"clientFlag,omitempty" tf:"client_flag,omitempty"`

	// Flag to specify certificates for code signing use
	// Flag to specify certificates for code signing use.
	// +kubebuilder:validation:Optional
	CodeSigningFlag *bool `json:"codeSigningFlag,omitempty" tf:"code_signing_flag,omitempty"`

	// The country of generated certificates
	// The country of generated certificates.
	// +kubebuilder:validation:Optional
	Country []*string `json:"country,omitempty" tf:"country,omitempty"`

	// Flag to specify certificates for email protection use
	// Flag to specify certificates for email protection use.
	// +kubebuilder:validation:Optional
	EmailProtectionFlag *bool `json:"emailProtectionFlag,omitempty" tf:"email_protection_flag,omitempty"`

	// Flag to allow only valid host names
	// Flag to allow only valid host names
	// +kubebuilder:validation:Optional
	EnforceHostnames *bool `json:"enforceHostnames,omitempty" tf:"enforce_hostnames,omitempty"`

	// Specify the allowed extended key usage constraint on issued certificates
	// Specify the allowed extended key usage constraint on issued certificates.
	// +kubebuilder:validation:Optional
	ExtKeyUsage []*string `json:"extKeyUsage,omitempty" tf:"ext_key_usage,omitempty"`

	// Specify the allowed extended key usage OIDs constraint on issued certificates
	// A list of extended key usage OIDs.
	// +kubebuilder:validation:Optional
	ExtKeyUsageOids []*string `json:"extKeyUsageOids,omitempty" tf:"ext_key_usage_oids,omitempty"`

	// Flag to generate leases with certificates
	// Flag to generate leases with certificates.
	// +kubebuilder:validation:Optional
	GenerateLease *bool `json:"generateLease,omitempty" tf:"generate_lease,omitempty"`

	// Specifies the default issuer of this request. May
	// be the value default, a name, or an issuer ID. Use ACLs to prevent access to
	// the /pki/issuer/:issuer_ref/{issue,sign}/:name paths to prevent users
	// overriding the role's issuer_ref value.
	// Specifies the default issuer of this request.
	// +kubebuilder:validation:Optional
	IssuerRef *string `json:"issuerRef,omitempty" tf:"issuer_ref,omitempty"`

	// The number of bits of generated keys
	// The number of bits of generated keys.
	// +kubebuilder:validation:Optional
	KeyBits *float64 `json:"keyBits,omitempty" tf:"key_bits,omitempty"`

	// The generated key type, choices: rsa, ec, ed25519, any
	// Defaults to rsa
	// The generated key type.
	// +kubebuilder:validation:Optional
	KeyType *string `json:"keyType,omitempty" tf:"key_type,omitempty"`

	// Specify the allowed key usage constraint on issued
	// certificates. Defaults to ["DigitalSignature", "KeyAgreement", "KeyEncipherment"]).
	// To specify no default key usage constraints, set this to an empty list [].
	// Specify the allowed key usage constraint on issued certificates.
	// +kubebuilder:validation:Optional
	KeyUsage []*string `json:"keyUsage,omitempty" tf:"key_usage,omitempty"`

	// The locality of generated certificates
	// The locality of generated certificates.
	// +kubebuilder:validation:Optional
	Locality []*string `json:"locality,omitempty" tf:"locality,omitempty"`

	// The maximum lease TTL, in seconds, for the role.
	// The maximum TTL.
	// +kubebuilder:validation:Optional
	MaxTTL *string `json:"maxTtl,omitempty" tf:"max_ttl,omitempty"`

	// The name to identify this role within the backend. Must be unique within the backend.
	// Unique name for the role.
	// +kubebuilder:validation:Optional
	Name *string `json:"name,omitempty" tf:"name,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	// +kubebuilder:validation:Optional
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// Flag to not store certificates in the storage backend
	// Flag to not store certificates in the storage backend.
	// +kubebuilder:validation:Optional
	NoStore *bool `json:"noStore,omitempty" tf:"no_store,omitempty"`

	// Specifies the duration by which to backdate the NotBefore property.
	// Specifies the duration by which to backdate the NotBefore property.
	// +kubebuilder:validation:Optional
	NotBeforeDuration *string `json:"notBeforeDuration,omitempty" tf:"not_before_duration,omitempty"`

	// The organization of generated certificates
	// The organization of generated certificates.
	// +kubebuilder:validation:Optional
	Organization []*string `json:"organization,omitempty" tf:"organization,omitempty"`

	// The organization unit of generated certificates
	// The organization unit of generated certificates.
	// +kubebuilder:validation:Optional
	Ou []*string `json:"ou,omitempty" tf:"ou,omitempty"`

	// (Vault 1.11+ only) A block for specifying policy identifers. The policy_identifier block can be repeated, and supports the following arguments:
	// Policy identifier block; can only be used with Vault 1.11+
	// +kubebuilder:validation:Optional
	PolicyIdentifier []PolicyIdentifierParameters `json:"policyIdentifier,omitempty" tf:"policy_identifier,omitempty"`

	// Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use policy_identifier blocks instead
	// Specify the list of allowed policies OIDs.
	// +kubebuilder:validation:Optional
	PolicyIdentifiers []*string `json:"policyIdentifiers,omitempty" tf:"policy_identifiers,omitempty"`

	// The postal code of generated certificates
	// The postal code of generated certificates.
	// +kubebuilder:validation:Optional
	PostalCode []*string `json:"postalCode,omitempty" tf:"postal_code,omitempty"`

	// The province of generated certificates
	// The province of generated certificates.
	// +kubebuilder:validation:Optional
	Province []*string `json:"province,omitempty" tf:"province,omitempty"`

	// Flag to force CN usage
	// Flag to force CN usage.
	// +kubebuilder:validation:Optional
	RequireCn *bool `json:"requireCn,omitempty" tf:"require_cn,omitempty"`

	// Flag to specify certificates for server use
	// Flag to specify certificates for server use.
	// +kubebuilder:validation:Optional
	ServerFlag *bool `json:"serverFlag,omitempty" tf:"server_flag,omitempty"`

	// The street address of generated certificates
	// The street address of generated certificates.
	// +kubebuilder:validation:Optional
	StreetAddress []*string `json:"streetAddress,omitempty" tf:"street_address,omitempty"`

	// The TTL, in seconds, for any certificate issued against this role.
	// The TTL.
	// +kubebuilder:validation:Optional
	TTL *string `json:"ttl,omitempty" tf:"ttl,omitempty"`

	// Flag to use the CN in the CSR
	// Flag to use the CN in the CSR.
	// +kubebuilder:validation:Optional
	UseCsrCommonName *bool `json:"useCsrCommonName,omitempty" tf:"use_csr_common_name,omitempty"`

	// Flag to use the SANs in the CSR
	// Flag to use the SANs in the CSR.
	// +kubebuilder:validation:Optional
	UseCsrSans *bool `json:"useCsrSans,omitempty" tf:"use_csr_sans,omitempty"`
}

func (*SecretBackendRoleParameters) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleParameters.

func (*SecretBackendRoleParameters) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendRoleSpec

type SecretBackendRoleSpec struct {
	v1.ResourceSpec `json:",inline"`
	ForProvider     SecretBackendRoleParameters `json:"forProvider"`
	// THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored
	// unless the relevant Crossplane feature flag is enabled, and may be
	// changed or removed without notice.
	// InitProvider holds the same fields as ForProvider, with the exception
	// of Identifier and other resource reference fields. The fields that are
	// in InitProvider are merged into ForProvider when the resource is created.
	// The same fields are also added to the terraform ignore_changes hook, to
	// avoid updating them after creation. This is useful for fields that are
	// required on creation, but we do not desire to update them after creation,
	// for example because of an external controller is managing them, like an
	// autoscaler.
	InitProvider SecretBackendRoleInitParameters `json:"initProvider,omitempty"`
}

SecretBackendRoleSpec defines the desired state of SecretBackendRole

func (*SecretBackendRoleSpec) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleSpec.

func (*SecretBackendRoleSpec) DeepCopyInto

func (in *SecretBackendRoleSpec) DeepCopyInto(out *SecretBackendRoleSpec)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendRoleStatus

type SecretBackendRoleStatus struct {
	v1.ResourceStatus `json:",inline"`
	AtProvider        SecretBackendRoleObservation `json:"atProvider,omitempty"`
}

SecretBackendRoleStatus defines the observed state of SecretBackendRole.

func (*SecretBackendRoleStatus) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleStatus.

func (*SecretBackendRoleStatus) DeepCopyInto

func (in *SecretBackendRoleStatus) DeepCopyInto(out *SecretBackendRoleStatus)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendRootCert

type SecretBackendRootCert struct {
	metav1.TypeMeta   `json:",inline"`
	metav1.ObjectMeta `json:"metadata,omitempty"`
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.backend) || has(self.initProvider.backend)",message="backend is a required parameter"
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.commonName) || has(self.initProvider.commonName)",message="commonName is a required parameter"
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.type) || has(self.initProvider.type)",message="type is a required parameter"
	Spec   SecretBackendRootCertSpec   `json:"spec"`
	Status SecretBackendRootCertStatus `json:"status,omitempty"`
}

SecretBackendRootCert is the Schema for the SecretBackendRootCerts API. Generate root. +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}

func (*SecretBackendRootCert) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRootCert.

func (*SecretBackendRootCert) DeepCopyInto

func (in *SecretBackendRootCert) DeepCopyInto(out *SecretBackendRootCert)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendRootCert) DeepCopyObject

func (in *SecretBackendRootCert) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendRootCert) GetCondition

func (mg *SecretBackendRootCert) GetCondition(ct xpv1.ConditionType) xpv1.Condition

GetCondition of this SecretBackendRootCert.

func (*SecretBackendRootCert) GetConnectionDetailsMapping

func (tr *SecretBackendRootCert) GetConnectionDetailsMapping() map[string]string

GetConnectionDetailsMapping for this SecretBackendRootCert

func (*SecretBackendRootCert) GetDeletionPolicy

func (mg *SecretBackendRootCert) GetDeletionPolicy() xpv1.DeletionPolicy

GetDeletionPolicy of this SecretBackendRootCert.

func (*SecretBackendRootCert) GetID

func (tr *SecretBackendRootCert) GetID() string

GetID returns ID of underlying Terraform resource of this SecretBackendRootCert

func (*SecretBackendRootCert) GetInitParameters added in v0.2.0

func (tr *SecretBackendRootCert) GetInitParameters() (map[string]any, error)

GetInitParameters of this SecretBackendRootCert

func (*SecretBackendRootCert) GetManagementPolicies added in v0.2.0

func (mg *SecretBackendRootCert) GetManagementPolicies() xpv1.ManagementPolicies

GetManagementPolicies of this SecretBackendRootCert.

func (*SecretBackendRootCert) GetObservation

func (tr *SecretBackendRootCert) GetObservation() (map[string]any, error)

GetObservation of this SecretBackendRootCert

func (*SecretBackendRootCert) GetParameters

func (tr *SecretBackendRootCert) GetParameters() (map[string]any, error)

GetParameters of this SecretBackendRootCert

func (*SecretBackendRootCert) GetProviderConfigReference

func (mg *SecretBackendRootCert) GetProviderConfigReference() *xpv1.Reference

GetProviderConfigReference of this SecretBackendRootCert.

func (*SecretBackendRootCert) GetProviderReference

func (mg *SecretBackendRootCert) GetProviderReference() *xpv1.Reference

GetProviderReference of this SecretBackendRootCert. Deprecated: Use GetProviderConfigReference.

func (*SecretBackendRootCert) GetPublishConnectionDetailsTo

func (mg *SecretBackendRootCert) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo

GetPublishConnectionDetailsTo of this SecretBackendRootCert.

func (*SecretBackendRootCert) GetTerraformResourceType

func (mg *SecretBackendRootCert) GetTerraformResourceType() string

GetTerraformResourceType returns Terraform resource type for this SecretBackendRootCert

func (*SecretBackendRootCert) GetTerraformSchemaVersion

func (tr *SecretBackendRootCert) GetTerraformSchemaVersion() int

GetTerraformSchemaVersion returns the associated Terraform schema version

func (*SecretBackendRootCert) GetWriteConnectionSecretToReference

func (mg *SecretBackendRootCert) GetWriteConnectionSecretToReference() *xpv1.SecretReference

GetWriteConnectionSecretToReference of this SecretBackendRootCert.

func (*SecretBackendRootCert) LateInitialize

func (tr *SecretBackendRootCert) LateInitialize(attrs []byte) (bool, error)

LateInitialize this SecretBackendRootCert using its observed tfState. returns True if there are any spec changes for the resource.

func (*SecretBackendRootCert) SetConditions

func (mg *SecretBackendRootCert) SetConditions(c ...xpv1.Condition)

SetConditions of this SecretBackendRootCert.

func (*SecretBackendRootCert) SetDeletionPolicy

func (mg *SecretBackendRootCert) SetDeletionPolicy(r xpv1.DeletionPolicy)

SetDeletionPolicy of this SecretBackendRootCert.

func (*SecretBackendRootCert) SetManagementPolicies added in v0.2.0

func (mg *SecretBackendRootCert) SetManagementPolicies(r xpv1.ManagementPolicies)

SetManagementPolicies of this SecretBackendRootCert.

func (*SecretBackendRootCert) SetObservation

func (tr *SecretBackendRootCert) SetObservation(obs map[string]any) error

SetObservation for this SecretBackendRootCert

func (*SecretBackendRootCert) SetParameters

func (tr *SecretBackendRootCert) SetParameters(params map[string]any) error

SetParameters for this SecretBackendRootCert

func (*SecretBackendRootCert) SetProviderConfigReference

func (mg *SecretBackendRootCert) SetProviderConfigReference(r *xpv1.Reference)

SetProviderConfigReference of this SecretBackendRootCert.

func (*SecretBackendRootCert) SetProviderReference

func (mg *SecretBackendRootCert) SetProviderReference(r *xpv1.Reference)

SetProviderReference of this SecretBackendRootCert. Deprecated: Use SetProviderConfigReference.

func (*SecretBackendRootCert) SetPublishConnectionDetailsTo

func (mg *SecretBackendRootCert) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)

SetPublishConnectionDetailsTo of this SecretBackendRootCert.

func (*SecretBackendRootCert) SetWriteConnectionSecretToReference

func (mg *SecretBackendRootCert) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)

SetWriteConnectionSecretToReference of this SecretBackendRootCert.

type SecretBackendRootCertInitParameters added in v0.2.0

type SecretBackendRootCertInitParameters struct {

	// List of alternative names
	// List of alternative names.
	AltNames []*string `json:"altNames,omitempty" tf:"alt_names,omitempty"`

	// The PKI secret backend the resource belongs to.
	// The PKI secret backend the resource belongs to.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// CN of intermediate to create
	// CN of root to create.
	CommonName *string `json:"commonName,omitempty" tf:"common_name,omitempty"`

	// The country
	// The country.
	Country *string `json:"country,omitempty" tf:"country,omitempty"`

	// Flag to exclude CN from SANs
	// Flag to exclude CN from SANs.
	ExcludeCnFromSans *bool `json:"excludeCnFromSans,omitempty" tf:"exclude_cn_from_sans,omitempty"`

	// The format of data
	// The format of data.
	Format *string `json:"format,omitempty" tf:"format,omitempty"`

	// List of alternative IPs
	// List of alternative IPs.
	IPSans []*string `json:"ipSans,omitempty" tf:"ip_sans,omitempty"`

	// Provides a name to the specified issuer. The name must be unique
	// across all issuers and not be the reserved value default
	// Provides a name to the specified issuer. The name must be unique across all issuers and not be the reserved value 'default'.
	IssuerName *string `json:"issuerName,omitempty" tf:"issuer_name,omitempty"`

	// The number of bits to use
	// The number of bits to use.
	KeyBits *float64 `json:"keyBits,omitempty" tf:"key_bits,omitempty"`

	// When a new key is created with this request, optionally specifies
	// the name for this. The global ref default may not be used as a name.
	// When a new key is created with this request, optionally specifies the name for this.
	KeyName *string `json:"keyName,omitempty" tf:"key_name,omitempty"`

	// Specifies the key (either default, by name, or by identifier) to use
	// for generating this request. Only suitable for type=existing requests.
	// Specifies the key to use for generating this request.
	KeyRef *string `json:"keyRef,omitempty" tf:"key_ref,omitempty"`

	// The desired key type
	// The desired key type.
	KeyType *string `json:"keyType,omitempty" tf:"key_type,omitempty"`

	// The locality
	// The locality.
	Locality *string `json:"locality,omitempty" tf:"locality,omitempty"`

	// The ID of the previously configured managed key. This field is
	// required if type is kms and it conflicts with managed_key_name
	// The ID of the previously configured managed key.
	ManagedKeyID *string `json:"managedKeyId,omitempty" tf:"managed_key_id,omitempty"`

	// The name of the previously configured managed key. This field is
	// required if type is kms  and it conflicts with managed_key_id
	// The name of the previously configured managed key.
	ManagedKeyName *string `json:"managedKeyName,omitempty" tf:"managed_key_name,omitempty"`

	// The maximum path length to encode in the generated certificate
	// The maximum path length to encode in the generated certificate.
	MaxPathLength *float64 `json:"maxPathLength,omitempty" tf:"max_path_length,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The organization
	// The organization.
	Organization *string `json:"organization,omitempty" tf:"organization,omitempty"`

	// List of other SANs
	// List of other SANs.
	OtherSans []*string `json:"otherSans,omitempty" tf:"other_sans,omitempty"`

	// The organization unit
	// The organization unit.
	Ou *string `json:"ou,omitempty" tf:"ou,omitempty"`

	// List of domains for which certificates are allowed to be issued
	// List of domains for which certificates are allowed to be issued.
	PermittedDNSDomains []*string `json:"permittedDnsDomains,omitempty" tf:"permitted_dns_domains,omitempty"`

	// The postal code
	// The postal code.
	PostalCode *string `json:"postalCode,omitempty" tf:"postal_code,omitempty"`

	// The private key format
	// The private key format.
	PrivateKeyFormat *string `json:"privateKeyFormat,omitempty" tf:"private_key_format,omitempty"`

	// The province
	// The province.
	Province *string `json:"province,omitempty" tf:"province,omitempty"`

	// The street address
	// The street address.
	StreetAddress *string `json:"streetAddress,omitempty" tf:"street_address,omitempty"`

	// Time to live
	// Time to live.
	TTL *string `json:"ttl,omitempty" tf:"ttl,omitempty"`

	// Type of intermediate to create. Must be either "exported", "internal"
	// or "kms"
	// Type of root to create. Must be either "existing", "exported", "internal" or "kms"
	Type *string `json:"type,omitempty" tf:"type,omitempty"`

	// List of alternative URIs
	// List of alternative URIs.
	URISans []*string `json:"uriSans,omitempty" tf:"uri_sans,omitempty"`
}

func (*SecretBackendRootCertInitParameters) DeepCopy added in v0.2.0

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRootCertInitParameters.

func (*SecretBackendRootCertInitParameters) DeepCopyInto added in v0.2.0

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendRootCertList

type SecretBackendRootCertList struct {
	metav1.TypeMeta `json:",inline"`
	metav1.ListMeta `json:"metadata,omitempty"`
	Items           []SecretBackendRootCert `json:"items"`
}

SecretBackendRootCertList contains a list of SecretBackendRootCerts

func (*SecretBackendRootCertList) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRootCertList.

func (*SecretBackendRootCertList) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendRootCertList) DeepCopyObject

func (in *SecretBackendRootCertList) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendRootCertList) GetItems

func (l *SecretBackendRootCertList) GetItems() []resource.Managed

GetItems of this SecretBackendRootCertList.

type SecretBackendRootCertObservation

type SecretBackendRootCertObservation struct {

	// List of alternative names
	// List of alternative names.
	AltNames []*string `json:"altNames,omitempty" tf:"alt_names,omitempty"`

	// The PKI secret backend the resource belongs to.
	// The PKI secret backend the resource belongs to.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// The certificate.
	// The certificate.
	Certificate *string `json:"certificate,omitempty" tf:"certificate,omitempty"`

	// CN of intermediate to create
	// CN of root to create.
	CommonName *string `json:"commonName,omitempty" tf:"common_name,omitempty"`

	// The country
	// The country.
	Country *string `json:"country,omitempty" tf:"country,omitempty"`

	// Flag to exclude CN from SANs
	// Flag to exclude CN from SANs.
	ExcludeCnFromSans *bool `json:"excludeCnFromSans,omitempty" tf:"exclude_cn_from_sans,omitempty"`

	// The format of data
	// The format of data.
	Format *string `json:"format,omitempty" tf:"format,omitempty"`

	ID *string `json:"id,omitempty" tf:"id,omitempty"`

	// List of alternative IPs
	// List of alternative IPs.
	IPSans []*string `json:"ipSans,omitempty" tf:"ip_sans,omitempty"`

	// The ID of the generated issuer.
	// The ID of the generated issuer.
	IssuerID *string `json:"issuerId,omitempty" tf:"issuer_id,omitempty"`

	// Provides a name to the specified issuer. The name must be unique
	// across all issuers and not be the reserved value default
	// Provides a name to the specified issuer. The name must be unique across all issuers and not be the reserved value 'default'.
	IssuerName *string `json:"issuerName,omitempty" tf:"issuer_name,omitempty"`

	// The issuing CA certificate.
	// The issuing CA.
	IssuingCA *string `json:"issuingCa,omitempty" tf:"issuing_ca,omitempty"`

	// The number of bits to use
	// The number of bits to use.
	KeyBits *float64 `json:"keyBits,omitempty" tf:"key_bits,omitempty"`

	// The ID of the generated key.
	// The ID of the generated key.
	KeyID *string `json:"keyId,omitempty" tf:"key_id,omitempty"`

	// When a new key is created with this request, optionally specifies
	// the name for this. The global ref default may not be used as a name.
	// When a new key is created with this request, optionally specifies the name for this.
	KeyName *string `json:"keyName,omitempty" tf:"key_name,omitempty"`

	// Specifies the key (either default, by name, or by identifier) to use
	// for generating this request. Only suitable for type=existing requests.
	// Specifies the key to use for generating this request.
	KeyRef *string `json:"keyRef,omitempty" tf:"key_ref,omitempty"`

	// The desired key type
	// The desired key type.
	KeyType *string `json:"keyType,omitempty" tf:"key_type,omitempty"`

	// The locality
	// The locality.
	Locality *string `json:"locality,omitempty" tf:"locality,omitempty"`

	// The ID of the previously configured managed key. This field is
	// required if type is kms and it conflicts with managed_key_name
	// The ID of the previously configured managed key.
	ManagedKeyID *string `json:"managedKeyId,omitempty" tf:"managed_key_id,omitempty"`

	// The name of the previously configured managed key. This field is
	// required if type is kms  and it conflicts with managed_key_id
	// The name of the previously configured managed key.
	ManagedKeyName *string `json:"managedKeyName,omitempty" tf:"managed_key_name,omitempty"`

	// The maximum path length to encode in the generated certificate
	// The maximum path length to encode in the generated certificate.
	MaxPathLength *float64 `json:"maxPathLength,omitempty" tf:"max_path_length,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The organization
	// The organization.
	Organization *string `json:"organization,omitempty" tf:"organization,omitempty"`

	// List of other SANs
	// List of other SANs.
	OtherSans []*string `json:"otherSans,omitempty" tf:"other_sans,omitempty"`

	// The organization unit
	// The organization unit.
	Ou *string `json:"ou,omitempty" tf:"ou,omitempty"`

	// List of domains for which certificates are allowed to be issued
	// List of domains for which certificates are allowed to be issued.
	PermittedDNSDomains []*string `json:"permittedDnsDomains,omitempty" tf:"permitted_dns_domains,omitempty"`

	// The postal code
	// The postal code.
	PostalCode *string `json:"postalCode,omitempty" tf:"postal_code,omitempty"`

	// The private key format
	// The private key format.
	PrivateKeyFormat *string `json:"privateKeyFormat,omitempty" tf:"private_key_format,omitempty"`

	// The province
	// The province.
	Province *string `json:"province,omitempty" tf:"province,omitempty"`

	// Deprecated, use serial_number instead.
	// The serial number.
	Serial *string `json:"serial,omitempty" tf:"serial,omitempty"`

	// The certificate's serial number, hex formatted.
	// The certificate's serial number, hex formatted.
	SerialNumber *string `json:"serialNumber,omitempty" tf:"serial_number,omitempty"`

	// The street address
	// The street address.
	StreetAddress *string `json:"streetAddress,omitempty" tf:"street_address,omitempty"`

	// Time to live
	// Time to live.
	TTL *string `json:"ttl,omitempty" tf:"ttl,omitempty"`

	// Type of intermediate to create. Must be either "exported", "internal"
	// or "kms"
	// Type of root to create. Must be either "existing", "exported", "internal" or "kms"
	Type *string `json:"type,omitempty" tf:"type,omitempty"`

	// List of alternative URIs
	// List of alternative URIs.
	URISans []*string `json:"uriSans,omitempty" tf:"uri_sans,omitempty"`
}

func (*SecretBackendRootCertObservation) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRootCertObservation.

func (*SecretBackendRootCertObservation) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendRootCertParameters

type SecretBackendRootCertParameters struct {

	// List of alternative names
	// List of alternative names.
	// +kubebuilder:validation:Optional
	AltNames []*string `json:"altNames,omitempty" tf:"alt_names,omitempty"`

	// The PKI secret backend the resource belongs to.
	// The PKI secret backend the resource belongs to.
	// +kubebuilder:validation:Optional
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// CN of intermediate to create
	// CN of root to create.
	// +kubebuilder:validation:Optional
	CommonName *string `json:"commonName,omitempty" tf:"common_name,omitempty"`

	// The country
	// The country.
	// +kubebuilder:validation:Optional
	Country *string `json:"country,omitempty" tf:"country,omitempty"`

	// Flag to exclude CN from SANs
	// Flag to exclude CN from SANs.
	// +kubebuilder:validation:Optional
	ExcludeCnFromSans *bool `json:"excludeCnFromSans,omitempty" tf:"exclude_cn_from_sans,omitempty"`

	// The format of data
	// The format of data.
	// +kubebuilder:validation:Optional
	Format *string `json:"format,omitempty" tf:"format,omitempty"`

	// List of alternative IPs
	// List of alternative IPs.
	// +kubebuilder:validation:Optional
	IPSans []*string `json:"ipSans,omitempty" tf:"ip_sans,omitempty"`

	// Provides a name to the specified issuer. The name must be unique
	// across all issuers and not be the reserved value default
	// Provides a name to the specified issuer. The name must be unique across all issuers and not be the reserved value 'default'.
	// +kubebuilder:validation:Optional
	IssuerName *string `json:"issuerName,omitempty" tf:"issuer_name,omitempty"`

	// The number of bits to use
	// The number of bits to use.
	// +kubebuilder:validation:Optional
	KeyBits *float64 `json:"keyBits,omitempty" tf:"key_bits,omitempty"`

	// When a new key is created with this request, optionally specifies
	// the name for this. The global ref default may not be used as a name.
	// When a new key is created with this request, optionally specifies the name for this.
	// +kubebuilder:validation:Optional
	KeyName *string `json:"keyName,omitempty" tf:"key_name,omitempty"`

	// Specifies the key (either default, by name, or by identifier) to use
	// for generating this request. Only suitable for type=existing requests.
	// Specifies the key to use for generating this request.
	// +kubebuilder:validation:Optional
	KeyRef *string `json:"keyRef,omitempty" tf:"key_ref,omitempty"`

	// The desired key type
	// The desired key type.
	// +kubebuilder:validation:Optional
	KeyType *string `json:"keyType,omitempty" tf:"key_type,omitempty"`

	// The locality
	// The locality.
	// +kubebuilder:validation:Optional
	Locality *string `json:"locality,omitempty" tf:"locality,omitempty"`

	// The ID of the previously configured managed key. This field is
	// required if type is kms and it conflicts with managed_key_name
	// The ID of the previously configured managed key.
	// +kubebuilder:validation:Optional
	ManagedKeyID *string `json:"managedKeyId,omitempty" tf:"managed_key_id,omitempty"`

	// The name of the previously configured managed key. This field is
	// required if type is kms  and it conflicts with managed_key_id
	// The name of the previously configured managed key.
	// +kubebuilder:validation:Optional
	ManagedKeyName *string `json:"managedKeyName,omitempty" tf:"managed_key_name,omitempty"`

	// The maximum path length to encode in the generated certificate
	// The maximum path length to encode in the generated certificate.
	// +kubebuilder:validation:Optional
	MaxPathLength *float64 `json:"maxPathLength,omitempty" tf:"max_path_length,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	// +kubebuilder:validation:Optional
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The organization
	// The organization.
	// +kubebuilder:validation:Optional
	Organization *string `json:"organization,omitempty" tf:"organization,omitempty"`

	// List of other SANs
	// List of other SANs.
	// +kubebuilder:validation:Optional
	OtherSans []*string `json:"otherSans,omitempty" tf:"other_sans,omitempty"`

	// The organization unit
	// The organization unit.
	// +kubebuilder:validation:Optional
	Ou *string `json:"ou,omitempty" tf:"ou,omitempty"`

	// List of domains for which certificates are allowed to be issued
	// List of domains for which certificates are allowed to be issued.
	// +kubebuilder:validation:Optional
	PermittedDNSDomains []*string `json:"permittedDnsDomains,omitempty" tf:"permitted_dns_domains,omitempty"`

	// The postal code
	// The postal code.
	// +kubebuilder:validation:Optional
	PostalCode *string `json:"postalCode,omitempty" tf:"postal_code,omitempty"`

	// The private key format
	// The private key format.
	// +kubebuilder:validation:Optional
	PrivateKeyFormat *string `json:"privateKeyFormat,omitempty" tf:"private_key_format,omitempty"`

	// The province
	// The province.
	// +kubebuilder:validation:Optional
	Province *string `json:"province,omitempty" tf:"province,omitempty"`

	// The street address
	// The street address.
	// +kubebuilder:validation:Optional
	StreetAddress *string `json:"streetAddress,omitempty" tf:"street_address,omitempty"`

	// Time to live
	// Time to live.
	// +kubebuilder:validation:Optional
	TTL *string `json:"ttl,omitempty" tf:"ttl,omitempty"`

	// Type of intermediate to create. Must be either "exported", "internal"
	// or "kms"
	// Type of root to create. Must be either "existing", "exported", "internal" or "kms"
	// +kubebuilder:validation:Optional
	Type *string `json:"type,omitempty" tf:"type,omitempty"`

	// List of alternative URIs
	// List of alternative URIs.
	// +kubebuilder:validation:Optional
	URISans []*string `json:"uriSans,omitempty" tf:"uri_sans,omitempty"`
}

func (*SecretBackendRootCertParameters) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRootCertParameters.

func (*SecretBackendRootCertParameters) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendRootCertSpec

type SecretBackendRootCertSpec struct {
	v1.ResourceSpec `json:",inline"`
	ForProvider     SecretBackendRootCertParameters `json:"forProvider"`
	// THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored
	// unless the relevant Crossplane feature flag is enabled, and may be
	// changed or removed without notice.
	// InitProvider holds the same fields as ForProvider, with the exception
	// of Identifier and other resource reference fields. The fields that are
	// in InitProvider are merged into ForProvider when the resource is created.
	// The same fields are also added to the terraform ignore_changes hook, to
	// avoid updating them after creation. This is useful for fields that are
	// required on creation, but we do not desire to update them after creation,
	// for example because of an external controller is managing them, like an
	// autoscaler.
	InitProvider SecretBackendRootCertInitParameters `json:"initProvider,omitempty"`
}

SecretBackendRootCertSpec defines the desired state of SecretBackendRootCert

func (*SecretBackendRootCertSpec) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRootCertSpec.

func (*SecretBackendRootCertSpec) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendRootCertStatus

type SecretBackendRootCertStatus struct {
	v1.ResourceStatus `json:",inline"`
	AtProvider        SecretBackendRootCertObservation `json:"atProvider,omitempty"`
}

SecretBackendRootCertStatus defines the observed state of SecretBackendRootCert.

func (*SecretBackendRootCertStatus) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRootCertStatus.

func (*SecretBackendRootCertStatus) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendRootSignIntermediate

type SecretBackendRootSignIntermediate struct {
	metav1.TypeMeta   `json:",inline"`
	metav1.ObjectMeta `json:"metadata,omitempty"`
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.backend) || has(self.initProvider.backend)",message="backend is a required parameter"
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.commonName) || has(self.initProvider.commonName)",message="commonName is a required parameter"
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.csr) || has(self.initProvider.csr)",message="csr is a required parameter"
	Spec   SecretBackendRootSignIntermediateSpec   `json:"spec"`
	Status SecretBackendRootSignIntermediateStatus `json:"status,omitempty"`
}

SecretBackendRootSignIntermediate is the Schema for the SecretBackendRootSignIntermediates API. <no value> +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}

func (*SecretBackendRootSignIntermediate) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRootSignIntermediate.

func (*SecretBackendRootSignIntermediate) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendRootSignIntermediate) DeepCopyObject

func (in *SecretBackendRootSignIntermediate) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendRootSignIntermediate) GetCondition

GetCondition of this SecretBackendRootSignIntermediate.

func (*SecretBackendRootSignIntermediate) GetConnectionDetailsMapping

func (tr *SecretBackendRootSignIntermediate) GetConnectionDetailsMapping() map[string]string

GetConnectionDetailsMapping for this SecretBackendRootSignIntermediate

func (*SecretBackendRootSignIntermediate) GetDeletionPolicy

func (mg *SecretBackendRootSignIntermediate) GetDeletionPolicy() xpv1.DeletionPolicy

GetDeletionPolicy of this SecretBackendRootSignIntermediate.

func (*SecretBackendRootSignIntermediate) GetID

GetID returns ID of underlying Terraform resource of this SecretBackendRootSignIntermediate

func (*SecretBackendRootSignIntermediate) GetInitParameters added in v0.2.0

func (tr *SecretBackendRootSignIntermediate) GetInitParameters() (map[string]any, error)

GetInitParameters of this SecretBackendRootSignIntermediate

func (*SecretBackendRootSignIntermediate) GetManagementPolicies added in v0.2.0

func (mg *SecretBackendRootSignIntermediate) GetManagementPolicies() xpv1.ManagementPolicies

GetManagementPolicies of this SecretBackendRootSignIntermediate.

func (*SecretBackendRootSignIntermediate) GetObservation

func (tr *SecretBackendRootSignIntermediate) GetObservation() (map[string]any, error)

GetObservation of this SecretBackendRootSignIntermediate

func (*SecretBackendRootSignIntermediate) GetParameters

func (tr *SecretBackendRootSignIntermediate) GetParameters() (map[string]any, error)

GetParameters of this SecretBackendRootSignIntermediate

func (*SecretBackendRootSignIntermediate) GetProviderConfigReference

func (mg *SecretBackendRootSignIntermediate) GetProviderConfigReference() *xpv1.Reference

GetProviderConfigReference of this SecretBackendRootSignIntermediate.

func (*SecretBackendRootSignIntermediate) GetProviderReference

func (mg *SecretBackendRootSignIntermediate) GetProviderReference() *xpv1.Reference

GetProviderReference of this SecretBackendRootSignIntermediate. Deprecated: Use GetProviderConfigReference.

func (*SecretBackendRootSignIntermediate) GetPublishConnectionDetailsTo

func (mg *SecretBackendRootSignIntermediate) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo

GetPublishConnectionDetailsTo of this SecretBackendRootSignIntermediate.

func (*SecretBackendRootSignIntermediate) GetTerraformResourceType

func (mg *SecretBackendRootSignIntermediate) GetTerraformResourceType() string

GetTerraformResourceType returns Terraform resource type for this SecretBackendRootSignIntermediate

func (*SecretBackendRootSignIntermediate) GetTerraformSchemaVersion

func (tr *SecretBackendRootSignIntermediate) GetTerraformSchemaVersion() int

GetTerraformSchemaVersion returns the associated Terraform schema version

func (*SecretBackendRootSignIntermediate) GetWriteConnectionSecretToReference

func (mg *SecretBackendRootSignIntermediate) GetWriteConnectionSecretToReference() *xpv1.SecretReference

GetWriteConnectionSecretToReference of this SecretBackendRootSignIntermediate.

func (*SecretBackendRootSignIntermediate) LateInitialize

func (tr *SecretBackendRootSignIntermediate) LateInitialize(attrs []byte) (bool, error)

LateInitialize this SecretBackendRootSignIntermediate using its observed tfState. returns True if there are any spec changes for the resource.

func (*SecretBackendRootSignIntermediate) SetConditions

func (mg *SecretBackendRootSignIntermediate) SetConditions(c ...xpv1.Condition)

SetConditions of this SecretBackendRootSignIntermediate.

func (*SecretBackendRootSignIntermediate) SetDeletionPolicy

func (mg *SecretBackendRootSignIntermediate) SetDeletionPolicy(r xpv1.DeletionPolicy)

SetDeletionPolicy of this SecretBackendRootSignIntermediate.

func (*SecretBackendRootSignIntermediate) SetManagementPolicies added in v0.2.0

func (mg *SecretBackendRootSignIntermediate) SetManagementPolicies(r xpv1.ManagementPolicies)

SetManagementPolicies of this SecretBackendRootSignIntermediate.

func (*SecretBackendRootSignIntermediate) SetObservation

func (tr *SecretBackendRootSignIntermediate) SetObservation(obs map[string]any) error

SetObservation for this SecretBackendRootSignIntermediate

func (*SecretBackendRootSignIntermediate) SetParameters

func (tr *SecretBackendRootSignIntermediate) SetParameters(params map[string]any) error

SetParameters for this SecretBackendRootSignIntermediate

func (*SecretBackendRootSignIntermediate) SetProviderConfigReference

func (mg *SecretBackendRootSignIntermediate) SetProviderConfigReference(r *xpv1.Reference)

SetProviderConfigReference of this SecretBackendRootSignIntermediate.

func (*SecretBackendRootSignIntermediate) SetProviderReference

func (mg *SecretBackendRootSignIntermediate) SetProviderReference(r *xpv1.Reference)

SetProviderReference of this SecretBackendRootSignIntermediate. Deprecated: Use SetProviderConfigReference.

func (*SecretBackendRootSignIntermediate) SetPublishConnectionDetailsTo

func (mg *SecretBackendRootSignIntermediate) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)

SetPublishConnectionDetailsTo of this SecretBackendRootSignIntermediate.

func (*SecretBackendRootSignIntermediate) SetWriteConnectionSecretToReference

func (mg *SecretBackendRootSignIntermediate) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)

SetWriteConnectionSecretToReference of this SecretBackendRootSignIntermediate.

type SecretBackendRootSignIntermediateInitParameters added in v0.2.0

type SecretBackendRootSignIntermediateInitParameters struct {

	// List of alternative names.
	AltNames []*string `json:"altNames,omitempty" tf:"alt_names,omitempty"`

	// The PKI secret backend the resource belongs to.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// CN of intermediate to create.
	CommonName *string `json:"commonName,omitempty" tf:"common_name,omitempty"`

	// The country.
	Country *string `json:"country,omitempty" tf:"country,omitempty"`

	// The CSR.
	Csr *string `json:"csr,omitempty" tf:"csr,omitempty"`

	// Flag to exclude CN from SANs.
	ExcludeCnFromSans *bool `json:"excludeCnFromSans,omitempty" tf:"exclude_cn_from_sans,omitempty"`

	// The format of data.
	Format *string `json:"format,omitempty" tf:"format,omitempty"`

	// List of alternative IPs.
	IPSans []*string `json:"ipSans,omitempty" tf:"ip_sans,omitempty"`

	// Specifies the default issuer of this request.
	IssuerRef *string `json:"issuerRef,omitempty" tf:"issuer_ref,omitempty"`

	// The locality.
	Locality *string `json:"locality,omitempty" tf:"locality,omitempty"`

	// The maximum path length to encode in the generated certificate.
	MaxPathLength *float64 `json:"maxPathLength,omitempty" tf:"max_path_length,omitempty"`

	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The organization.
	Organization *string `json:"organization,omitempty" tf:"organization,omitempty"`

	// List of other SANs.
	OtherSans []*string `json:"otherSans,omitempty" tf:"other_sans,omitempty"`

	// The organization unit.
	Ou *string `json:"ou,omitempty" tf:"ou,omitempty"`

	// List of domains for which certificates are allowed to be issued.
	PermittedDNSDomains []*string `json:"permittedDnsDomains,omitempty" tf:"permitted_dns_domains,omitempty"`

	// The postal code.
	PostalCode *string `json:"postalCode,omitempty" tf:"postal_code,omitempty"`

	// The province.
	Province *string `json:"province,omitempty" tf:"province,omitempty"`

	// Revoke the certificate upon resource destruction.
	Revoke *bool `json:"revoke,omitempty" tf:"revoke,omitempty"`

	// The street address.
	StreetAddress *string `json:"streetAddress,omitempty" tf:"street_address,omitempty"`

	// Time to live.
	TTL *string `json:"ttl,omitempty" tf:"ttl,omitempty"`

	// List of alternative URIs.
	URISans []*string `json:"uriSans,omitempty" tf:"uri_sans,omitempty"`

	// Preserve CSR values.
	UseCsrValues *bool `json:"useCsrValues,omitempty" tf:"use_csr_values,omitempty"`
}

func (*SecretBackendRootSignIntermediateInitParameters) DeepCopy added in v0.2.0

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRootSignIntermediateInitParameters.

func (*SecretBackendRootSignIntermediateInitParameters) DeepCopyInto added in v0.2.0

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendRootSignIntermediateList

type SecretBackendRootSignIntermediateList struct {
	metav1.TypeMeta `json:",inline"`
	metav1.ListMeta `json:"metadata,omitempty"`
	Items           []SecretBackendRootSignIntermediate `json:"items"`
}

SecretBackendRootSignIntermediateList contains a list of SecretBackendRootSignIntermediates

func (*SecretBackendRootSignIntermediateList) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRootSignIntermediateList.

func (*SecretBackendRootSignIntermediateList) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendRootSignIntermediateList) DeepCopyObject

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendRootSignIntermediateList) GetItems

GetItems of this SecretBackendRootSignIntermediateList.

type SecretBackendRootSignIntermediateObservation

type SecretBackendRootSignIntermediateObservation struct {

	// List of alternative names.
	AltNames []*string `json:"altNames,omitempty" tf:"alt_names,omitempty"`

	// The PKI secret backend the resource belongs to.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// The CA chain as a list of format specific certificates
	CAChain []*string `json:"caChain,omitempty" tf:"ca_chain,omitempty"`

	// The signed intermediate CA certificate.
	Certificate *string `json:"certificate,omitempty" tf:"certificate,omitempty"`

	// The concatenation of the intermediate and issuing CA certificates (PEM encoded). Requires the format to be set to any of: pem, pem_bundle. The value will be empty for all other formats.
	CertificateBundle *string `json:"certificateBundle,omitempty" tf:"certificate_bundle,omitempty"`

	// CN of intermediate to create.
	CommonName *string `json:"commonName,omitempty" tf:"common_name,omitempty"`

	// The country.
	Country *string `json:"country,omitempty" tf:"country,omitempty"`

	// The CSR.
	Csr *string `json:"csr,omitempty" tf:"csr,omitempty"`

	// Flag to exclude CN from SANs.
	ExcludeCnFromSans *bool `json:"excludeCnFromSans,omitempty" tf:"exclude_cn_from_sans,omitempty"`

	// The format of data.
	Format *string `json:"format,omitempty" tf:"format,omitempty"`

	ID *string `json:"id,omitempty" tf:"id,omitempty"`

	// List of alternative IPs.
	IPSans []*string `json:"ipSans,omitempty" tf:"ip_sans,omitempty"`

	// Specifies the default issuer of this request.
	IssuerRef *string `json:"issuerRef,omitempty" tf:"issuer_ref,omitempty"`

	// The issuing CA certificate.
	IssuingCA *string `json:"issuingCa,omitempty" tf:"issuing_ca,omitempty"`

	// The locality.
	Locality *string `json:"locality,omitempty" tf:"locality,omitempty"`

	// The maximum path length to encode in the generated certificate.
	MaxPathLength *float64 `json:"maxPathLength,omitempty" tf:"max_path_length,omitempty"`

	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The organization.
	Organization *string `json:"organization,omitempty" tf:"organization,omitempty"`

	// List of other SANs.
	OtherSans []*string `json:"otherSans,omitempty" tf:"other_sans,omitempty"`

	// The organization unit.
	Ou *string `json:"ou,omitempty" tf:"ou,omitempty"`

	// List of domains for which certificates are allowed to be issued.
	PermittedDNSDomains []*string `json:"permittedDnsDomains,omitempty" tf:"permitted_dns_domains,omitempty"`

	// The postal code.
	PostalCode *string `json:"postalCode,omitempty" tf:"postal_code,omitempty"`

	// The province.
	Province *string `json:"province,omitempty" tf:"province,omitempty"`

	// Revoke the certificate upon resource destruction.
	Revoke *bool `json:"revoke,omitempty" tf:"revoke,omitempty"`

	// The serial number.
	Serial *string `json:"serial,omitempty" tf:"serial,omitempty"`

	// The certificate's serial number, hex formatted.
	SerialNumber *string `json:"serialNumber,omitempty" tf:"serial_number,omitempty"`

	// The street address.
	StreetAddress *string `json:"streetAddress,omitempty" tf:"street_address,omitempty"`

	// Time to live.
	TTL *string `json:"ttl,omitempty" tf:"ttl,omitempty"`

	// List of alternative URIs.
	URISans []*string `json:"uriSans,omitempty" tf:"uri_sans,omitempty"`

	// Preserve CSR values.
	UseCsrValues *bool `json:"useCsrValues,omitempty" tf:"use_csr_values,omitempty"`
}

func (*SecretBackendRootSignIntermediateObservation) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRootSignIntermediateObservation.

func (*SecretBackendRootSignIntermediateObservation) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendRootSignIntermediateParameters

type SecretBackendRootSignIntermediateParameters struct {

	// List of alternative names.
	// +kubebuilder:validation:Optional
	AltNames []*string `json:"altNames,omitempty" tf:"alt_names,omitempty"`

	// The PKI secret backend the resource belongs to.
	// +kubebuilder:validation:Optional
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// CN of intermediate to create.
	// +kubebuilder:validation:Optional
	CommonName *string `json:"commonName,omitempty" tf:"common_name,omitempty"`

	// The country.
	// +kubebuilder:validation:Optional
	Country *string `json:"country,omitempty" tf:"country,omitempty"`

	// The CSR.
	// +kubebuilder:validation:Optional
	Csr *string `json:"csr,omitempty" tf:"csr,omitempty"`

	// Flag to exclude CN from SANs.
	// +kubebuilder:validation:Optional
	ExcludeCnFromSans *bool `json:"excludeCnFromSans,omitempty" tf:"exclude_cn_from_sans,omitempty"`

	// The format of data.
	// +kubebuilder:validation:Optional
	Format *string `json:"format,omitempty" tf:"format,omitempty"`

	// List of alternative IPs.
	// +kubebuilder:validation:Optional
	IPSans []*string `json:"ipSans,omitempty" tf:"ip_sans,omitempty"`

	// Specifies the default issuer of this request.
	// +kubebuilder:validation:Optional
	IssuerRef *string `json:"issuerRef,omitempty" tf:"issuer_ref,omitempty"`

	// The locality.
	// +kubebuilder:validation:Optional
	Locality *string `json:"locality,omitempty" tf:"locality,omitempty"`

	// The maximum path length to encode in the generated certificate.
	// +kubebuilder:validation:Optional
	MaxPathLength *float64 `json:"maxPathLength,omitempty" tf:"max_path_length,omitempty"`

	// Target namespace. (requires Enterprise)
	// +kubebuilder:validation:Optional
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The organization.
	// +kubebuilder:validation:Optional
	Organization *string `json:"organization,omitempty" tf:"organization,omitempty"`

	// List of other SANs.
	// +kubebuilder:validation:Optional
	OtherSans []*string `json:"otherSans,omitempty" tf:"other_sans,omitempty"`

	// The organization unit.
	// +kubebuilder:validation:Optional
	Ou *string `json:"ou,omitempty" tf:"ou,omitempty"`

	// List of domains for which certificates are allowed to be issued.
	// +kubebuilder:validation:Optional
	PermittedDNSDomains []*string `json:"permittedDnsDomains,omitempty" tf:"permitted_dns_domains,omitempty"`

	// The postal code.
	// +kubebuilder:validation:Optional
	PostalCode *string `json:"postalCode,omitempty" tf:"postal_code,omitempty"`

	// The province.
	// +kubebuilder:validation:Optional
	Province *string `json:"province,omitempty" tf:"province,omitempty"`

	// Revoke the certificate upon resource destruction.
	// +kubebuilder:validation:Optional
	Revoke *bool `json:"revoke,omitempty" tf:"revoke,omitempty"`

	// The street address.
	// +kubebuilder:validation:Optional
	StreetAddress *string `json:"streetAddress,omitempty" tf:"street_address,omitempty"`

	// Time to live.
	// +kubebuilder:validation:Optional
	TTL *string `json:"ttl,omitempty" tf:"ttl,omitempty"`

	// List of alternative URIs.
	// +kubebuilder:validation:Optional
	URISans []*string `json:"uriSans,omitempty" tf:"uri_sans,omitempty"`

	// Preserve CSR values.
	// +kubebuilder:validation:Optional
	UseCsrValues *bool `json:"useCsrValues,omitempty" tf:"use_csr_values,omitempty"`
}

func (*SecretBackendRootSignIntermediateParameters) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRootSignIntermediateParameters.

func (*SecretBackendRootSignIntermediateParameters) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendRootSignIntermediateSpec

type SecretBackendRootSignIntermediateSpec struct {
	v1.ResourceSpec `json:",inline"`
	ForProvider     SecretBackendRootSignIntermediateParameters `json:"forProvider"`
	// THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored
	// unless the relevant Crossplane feature flag is enabled, and may be
	// changed or removed without notice.
	// InitProvider holds the same fields as ForProvider, with the exception
	// of Identifier and other resource reference fields. The fields that are
	// in InitProvider are merged into ForProvider when the resource is created.
	// The same fields are also added to the terraform ignore_changes hook, to
	// avoid updating them after creation. This is useful for fields that are
	// required on creation, but we do not desire to update them after creation,
	// for example because of an external controller is managing them, like an
	// autoscaler.
	InitProvider SecretBackendRootSignIntermediateInitParameters `json:"initProvider,omitempty"`
}

SecretBackendRootSignIntermediateSpec defines the desired state of SecretBackendRootSignIntermediate

func (*SecretBackendRootSignIntermediateSpec) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRootSignIntermediateSpec.

func (*SecretBackendRootSignIntermediateSpec) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendRootSignIntermediateStatus

type SecretBackendRootSignIntermediateStatus struct {
	v1.ResourceStatus `json:",inline"`
	AtProvider        SecretBackendRootSignIntermediateObservation `json:"atProvider,omitempty"`
}

SecretBackendRootSignIntermediateStatus defines the observed state of SecretBackendRootSignIntermediate.

func (*SecretBackendRootSignIntermediateStatus) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRootSignIntermediateStatus.

func (*SecretBackendRootSignIntermediateStatus) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendSign

type SecretBackendSign struct {
	metav1.TypeMeta   `json:",inline"`
	metav1.ObjectMeta `json:"metadata,omitempty"`
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.backend) || has(self.initProvider.backend)",message="backend is a required parameter"
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.commonName) || has(self.initProvider.commonName)",message="commonName is a required parameter"
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.csr) || has(self.initProvider.csr)",message="csr is a required parameter"
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.name) || has(self.initProvider.name)",message="name is a required parameter"
	Spec   SecretBackendSignSpec   `json:"spec"`
	Status SecretBackendSignStatus `json:"status,omitempty"`
}

SecretBackendSign is the Schema for the SecretBackendSigns API. Sign a new certificate based on the CSR by the PKI. +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}

func (*SecretBackendSign) DeepCopy

func (in *SecretBackendSign) DeepCopy() *SecretBackendSign

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendSign.

func (*SecretBackendSign) DeepCopyInto

func (in *SecretBackendSign) DeepCopyInto(out *SecretBackendSign)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendSign) DeepCopyObject

func (in *SecretBackendSign) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendSign) GetCondition

func (mg *SecretBackendSign) GetCondition(ct xpv1.ConditionType) xpv1.Condition

GetCondition of this SecretBackendSign.

func (*SecretBackendSign) GetConnectionDetailsMapping

func (tr *SecretBackendSign) GetConnectionDetailsMapping() map[string]string

GetConnectionDetailsMapping for this SecretBackendSign

func (*SecretBackendSign) GetDeletionPolicy

func (mg *SecretBackendSign) GetDeletionPolicy() xpv1.DeletionPolicy

GetDeletionPolicy of this SecretBackendSign.

func (*SecretBackendSign) GetID

func (tr *SecretBackendSign) GetID() string

GetID returns ID of underlying Terraform resource of this SecretBackendSign

func (*SecretBackendSign) GetInitParameters added in v0.2.0

func (tr *SecretBackendSign) GetInitParameters() (map[string]any, error)

GetInitParameters of this SecretBackendSign

func (*SecretBackendSign) GetManagementPolicies added in v0.2.0

func (mg *SecretBackendSign) GetManagementPolicies() xpv1.ManagementPolicies

GetManagementPolicies of this SecretBackendSign.

func (*SecretBackendSign) GetObservation

func (tr *SecretBackendSign) GetObservation() (map[string]any, error)

GetObservation of this SecretBackendSign

func (*SecretBackendSign) GetParameters

func (tr *SecretBackendSign) GetParameters() (map[string]any, error)

GetParameters of this SecretBackendSign

func (*SecretBackendSign) GetProviderConfigReference

func (mg *SecretBackendSign) GetProviderConfigReference() *xpv1.Reference

GetProviderConfigReference of this SecretBackendSign.

func (*SecretBackendSign) GetProviderReference

func (mg *SecretBackendSign) GetProviderReference() *xpv1.Reference

GetProviderReference of this SecretBackendSign. Deprecated: Use GetProviderConfigReference.

func (*SecretBackendSign) GetPublishConnectionDetailsTo

func (mg *SecretBackendSign) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo

GetPublishConnectionDetailsTo of this SecretBackendSign.

func (*SecretBackendSign) GetTerraformResourceType

func (mg *SecretBackendSign) GetTerraformResourceType() string

GetTerraformResourceType returns Terraform resource type for this SecretBackendSign

func (*SecretBackendSign) GetTerraformSchemaVersion

func (tr *SecretBackendSign) GetTerraformSchemaVersion() int

GetTerraformSchemaVersion returns the associated Terraform schema version

func (*SecretBackendSign) GetWriteConnectionSecretToReference

func (mg *SecretBackendSign) GetWriteConnectionSecretToReference() *xpv1.SecretReference

GetWriteConnectionSecretToReference of this SecretBackendSign.

func (*SecretBackendSign) LateInitialize

func (tr *SecretBackendSign) LateInitialize(attrs []byte) (bool, error)

LateInitialize this SecretBackendSign using its observed tfState. returns True if there are any spec changes for the resource.

func (*SecretBackendSign) SetConditions

func (mg *SecretBackendSign) SetConditions(c ...xpv1.Condition)

SetConditions of this SecretBackendSign.

func (*SecretBackendSign) SetDeletionPolicy

func (mg *SecretBackendSign) SetDeletionPolicy(r xpv1.DeletionPolicy)

SetDeletionPolicy of this SecretBackendSign.

func (*SecretBackendSign) SetManagementPolicies added in v0.2.0

func (mg *SecretBackendSign) SetManagementPolicies(r xpv1.ManagementPolicies)

SetManagementPolicies of this SecretBackendSign.

func (*SecretBackendSign) SetObservation

func (tr *SecretBackendSign) SetObservation(obs map[string]any) error

SetObservation for this SecretBackendSign

func (*SecretBackendSign) SetParameters

func (tr *SecretBackendSign) SetParameters(params map[string]any) error

SetParameters for this SecretBackendSign

func (*SecretBackendSign) SetProviderConfigReference

func (mg *SecretBackendSign) SetProviderConfigReference(r *xpv1.Reference)

SetProviderConfigReference of this SecretBackendSign.

func (*SecretBackendSign) SetProviderReference

func (mg *SecretBackendSign) SetProviderReference(r *xpv1.Reference)

SetProviderReference of this SecretBackendSign. Deprecated: Use SetProviderConfigReference.

func (*SecretBackendSign) SetPublishConnectionDetailsTo

func (mg *SecretBackendSign) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)

SetPublishConnectionDetailsTo of this SecretBackendSign.

func (*SecretBackendSign) SetWriteConnectionSecretToReference

func (mg *SecretBackendSign) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)

SetWriteConnectionSecretToReference of this SecretBackendSign.

type SecretBackendSignInitParameters added in v0.2.0

type SecretBackendSignInitParameters struct {

	// List of alternative names
	// List of alternative names.
	AltNames []*string `json:"altNames,omitempty" tf:"alt_names,omitempty"`

	// If set to true, certs will be renewed if the expiration is within min_seconds_remaining. Default false
	// If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining
	AutoRenew *bool `json:"autoRenew,omitempty" tf:"auto_renew,omitempty"`

	// The PKI secret backend the resource belongs to.
	// The PKI secret backend the resource belongs to.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// CN of certificate to create
	// CN of intermediate to create.
	CommonName *string `json:"commonName,omitempty" tf:"common_name,omitempty"`

	// The CSR
	// The CSR.
	Csr *string `json:"csr,omitempty" tf:"csr,omitempty"`

	// Flag to exclude CN from SANs
	// Flag to exclude CN from SANs.
	ExcludeCnFromSans *bool `json:"excludeCnFromSans,omitempty" tf:"exclude_cn_from_sans,omitempty"`

	// The format of data
	// The format of data.
	Format *string `json:"format,omitempty" tf:"format,omitempty"`

	// List of alternative IPs
	// List of alternative IPs.
	IPSans []*string `json:"ipSans,omitempty" tf:"ip_sans,omitempty"`

	// Specifies the default issuer of this request. Can
	// be the value default, a name, or an issuer ID. Use ACLs to prevent access to
	// the /pki/issuer/:issuer_ref/{issue,sign}/:name paths to prevent users
	// overriding the role's issuer_ref value.
	// Specifies the default issuer of this request.
	IssuerRef *string `json:"issuerRef,omitempty" tf:"issuer_ref,omitempty"`

	// Generate a new certificate when the expiration is within this number of seconds, default is 604800 (7 days)
	// Generate a new certificate when the expiration is within this number of seconds
	MinSecondsRemaining *float64 `json:"minSecondsRemaining,omitempty" tf:"min_seconds_remaining,omitempty"`

	// Name of the role to create the certificate against
	// Name of the role to create the certificate against.
	Name *string `json:"name,omitempty" tf:"name,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// List of other SANs
	// List of other SANs.
	OtherSans []*string `json:"otherSans,omitempty" tf:"other_sans,omitempty"`

	// Time to live
	// Time to live.
	TTL *string `json:"ttl,omitempty" tf:"ttl,omitempty"`

	// List of alternative URIs
	// List of alternative URIs.
	URISans []*string `json:"uriSans,omitempty" tf:"uri_sans,omitempty"`
}

func (*SecretBackendSignInitParameters) DeepCopy added in v0.2.0

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendSignInitParameters.

func (*SecretBackendSignInitParameters) DeepCopyInto added in v0.2.0

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendSignList

type SecretBackendSignList struct {
	metav1.TypeMeta `json:",inline"`
	metav1.ListMeta `json:"metadata,omitempty"`
	Items           []SecretBackendSign `json:"items"`
}

SecretBackendSignList contains a list of SecretBackendSigns

func (*SecretBackendSignList) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendSignList.

func (*SecretBackendSignList) DeepCopyInto

func (in *SecretBackendSignList) DeepCopyInto(out *SecretBackendSignList)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendSignList) DeepCopyObject

func (in *SecretBackendSignList) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendSignList) GetItems

func (l *SecretBackendSignList) GetItems() []resource.Managed

GetItems of this SecretBackendSignList.

type SecretBackendSignObservation

type SecretBackendSignObservation struct {

	// List of alternative names
	// List of alternative names.
	AltNames []*string `json:"altNames,omitempty" tf:"alt_names,omitempty"`

	// If set to true, certs will be renewed if the expiration is within min_seconds_remaining. Default false
	// If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining
	AutoRenew *bool `json:"autoRenew,omitempty" tf:"auto_renew,omitempty"`

	// The PKI secret backend the resource belongs to.
	// The PKI secret backend the resource belongs to.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// The CA chain
	// The CA chain.
	CAChain []*string `json:"caChain,omitempty" tf:"ca_chain,omitempty"`

	// The certificate
	// The certicate.
	Certificate *string `json:"certificate,omitempty" tf:"certificate,omitempty"`

	// CN of certificate to create
	// CN of intermediate to create.
	CommonName *string `json:"commonName,omitempty" tf:"common_name,omitempty"`

	// The CSR
	// The CSR.
	Csr *string `json:"csr,omitempty" tf:"csr,omitempty"`

	// Flag to exclude CN from SANs
	// Flag to exclude CN from SANs.
	ExcludeCnFromSans *bool `json:"excludeCnFromSans,omitempty" tf:"exclude_cn_from_sans,omitempty"`

	// The expiration date of the certificate in unix epoch format
	// The certificate expiration as a Unix-style timestamp.
	Expiration *float64 `json:"expiration,omitempty" tf:"expiration,omitempty"`

	// The format of data
	// The format of data.
	Format *string `json:"format,omitempty" tf:"format,omitempty"`

	ID *string `json:"id,omitempty" tf:"id,omitempty"`

	// List of alternative IPs
	// List of alternative IPs.
	IPSans []*string `json:"ipSans,omitempty" tf:"ip_sans,omitempty"`

	// Specifies the default issuer of this request. Can
	// be the value default, a name, or an issuer ID. Use ACLs to prevent access to
	// the /pki/issuer/:issuer_ref/{issue,sign}/:name paths to prevent users
	// overriding the role's issuer_ref value.
	// Specifies the default issuer of this request.
	IssuerRef *string `json:"issuerRef,omitempty" tf:"issuer_ref,omitempty"`

	// The issuing CA
	// The issuing CA.
	IssuingCA *string `json:"issuingCa,omitempty" tf:"issuing_ca,omitempty"`

	// Generate a new certificate when the expiration is within this number of seconds, default is 604800 (7 days)
	// Generate a new certificate when the expiration is within this number of seconds
	MinSecondsRemaining *float64 `json:"minSecondsRemaining,omitempty" tf:"min_seconds_remaining,omitempty"`

	// Name of the role to create the certificate against
	// Name of the role to create the certificate against.
	Name *string `json:"name,omitempty" tf:"name,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// List of other SANs
	// List of other SANs.
	OtherSans []*string `json:"otherSans,omitempty" tf:"other_sans,omitempty"`

	// true if the current time (during refresh) is after the start of the early renewal window declared by min_seconds_remaining, and false otherwise; if auto_renew is set to true then the provider will plan to replace the certificate once renewal is pending.
	// Initially false, and then set to true during refresh once the expiration is less than min_seconds_remaining in the future.
	RenewPending *bool `json:"renewPending,omitempty" tf:"renew_pending,omitempty"`

	// Use serial_number instead.
	// The serial number.
	Serial *string `json:"serial,omitempty" tf:"serial,omitempty"`

	// The certificate's serial number, hex formatted.
	// The certificate's serial number, hex formatted.
	SerialNumber *string `json:"serialNumber,omitempty" tf:"serial_number,omitempty"`

	// Time to live
	// Time to live.
	TTL *string `json:"ttl,omitempty" tf:"ttl,omitempty"`

	// List of alternative URIs
	// List of alternative URIs.
	URISans []*string `json:"uriSans,omitempty" tf:"uri_sans,omitempty"`
}

func (*SecretBackendSignObservation) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendSignObservation.

func (*SecretBackendSignObservation) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendSignParameters

type SecretBackendSignParameters struct {

	// List of alternative names
	// List of alternative names.
	// +kubebuilder:validation:Optional
	AltNames []*string `json:"altNames,omitempty" tf:"alt_names,omitempty"`

	// If set to true, certs will be renewed if the expiration is within min_seconds_remaining. Default false
	// If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining
	// +kubebuilder:validation:Optional
	AutoRenew *bool `json:"autoRenew,omitempty" tf:"auto_renew,omitempty"`

	// The PKI secret backend the resource belongs to.
	// The PKI secret backend the resource belongs to.
	// +kubebuilder:validation:Optional
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// CN of certificate to create
	// CN of intermediate to create.
	// +kubebuilder:validation:Optional
	CommonName *string `json:"commonName,omitempty" tf:"common_name,omitempty"`

	// The CSR
	// The CSR.
	// +kubebuilder:validation:Optional
	Csr *string `json:"csr,omitempty" tf:"csr,omitempty"`

	// Flag to exclude CN from SANs
	// Flag to exclude CN from SANs.
	// +kubebuilder:validation:Optional
	ExcludeCnFromSans *bool `json:"excludeCnFromSans,omitempty" tf:"exclude_cn_from_sans,omitempty"`

	// The format of data
	// The format of data.
	// +kubebuilder:validation:Optional
	Format *string `json:"format,omitempty" tf:"format,omitempty"`

	// List of alternative IPs
	// List of alternative IPs.
	// +kubebuilder:validation:Optional
	IPSans []*string `json:"ipSans,omitempty" tf:"ip_sans,omitempty"`

	// Specifies the default issuer of this request. Can
	// be the value default, a name, or an issuer ID. Use ACLs to prevent access to
	// the /pki/issuer/:issuer_ref/{issue,sign}/:name paths to prevent users
	// overriding the role's issuer_ref value.
	// Specifies the default issuer of this request.
	// +kubebuilder:validation:Optional
	IssuerRef *string `json:"issuerRef,omitempty" tf:"issuer_ref,omitempty"`

	// Generate a new certificate when the expiration is within this number of seconds, default is 604800 (7 days)
	// Generate a new certificate when the expiration is within this number of seconds
	// +kubebuilder:validation:Optional
	MinSecondsRemaining *float64 `json:"minSecondsRemaining,omitempty" tf:"min_seconds_remaining,omitempty"`

	// Name of the role to create the certificate against
	// Name of the role to create the certificate against.
	// +kubebuilder:validation:Optional
	Name *string `json:"name,omitempty" tf:"name,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	// +kubebuilder:validation:Optional
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// List of other SANs
	// List of other SANs.
	// +kubebuilder:validation:Optional
	OtherSans []*string `json:"otherSans,omitempty" tf:"other_sans,omitempty"`

	// Time to live
	// Time to live.
	// +kubebuilder:validation:Optional
	TTL *string `json:"ttl,omitempty" tf:"ttl,omitempty"`

	// List of alternative URIs
	// List of alternative URIs.
	// +kubebuilder:validation:Optional
	URISans []*string `json:"uriSans,omitempty" tf:"uri_sans,omitempty"`
}

func (*SecretBackendSignParameters) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendSignParameters.

func (*SecretBackendSignParameters) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendSignSpec

type SecretBackendSignSpec struct {
	v1.ResourceSpec `json:",inline"`
	ForProvider     SecretBackendSignParameters `json:"forProvider"`
	// THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored
	// unless the relevant Crossplane feature flag is enabled, and may be
	// changed or removed without notice.
	// InitProvider holds the same fields as ForProvider, with the exception
	// of Identifier and other resource reference fields. The fields that are
	// in InitProvider are merged into ForProvider when the resource is created.
	// The same fields are also added to the terraform ignore_changes hook, to
	// avoid updating them after creation. This is useful for fields that are
	// required on creation, but we do not desire to update them after creation,
	// for example because of an external controller is managing them, like an
	// autoscaler.
	InitProvider SecretBackendSignInitParameters `json:"initProvider,omitempty"`
}

SecretBackendSignSpec defines the desired state of SecretBackendSign

func (*SecretBackendSignSpec) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendSignSpec.

func (*SecretBackendSignSpec) DeepCopyInto

func (in *SecretBackendSignSpec) DeepCopyInto(out *SecretBackendSignSpec)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendSignStatus

type SecretBackendSignStatus struct {
	v1.ResourceStatus `json:",inline"`
	AtProvider        SecretBackendSignObservation `json:"atProvider,omitempty"`
}

SecretBackendSignStatus defines the observed state of SecretBackendSign.

func (*SecretBackendSignStatus) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendSignStatus.

func (*SecretBackendSignStatus) DeepCopyInto

func (in *SecretBackendSignStatus) DeepCopyInto(out *SecretBackendSignStatus)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL