Documentation ¶
Overview ¶
+kubebuilder:object:generate=true +groupName=transit.vault.upbound.io +versionName=v1alpha1
Index ¶
- Constants
- Variables
- type SecretBackendKey
- func (in *SecretBackendKey) DeepCopy() *SecretBackendKey
- func (in *SecretBackendKey) DeepCopyInto(out *SecretBackendKey)
- func (in *SecretBackendKey) DeepCopyObject() runtime.Object
- func (mg *SecretBackendKey) GetCondition(ct xpv1.ConditionType) xpv1.Condition
- func (tr *SecretBackendKey) GetConnectionDetailsMapping() map[string]string
- func (mg *SecretBackendKey) GetDeletionPolicy() xpv1.DeletionPolicy
- func (tr *SecretBackendKey) GetID() string
- func (tr *SecretBackendKey) GetInitParameters() (map[string]any, error)
- func (mg *SecretBackendKey) GetManagementPolicies() xpv1.ManagementPolicies
- func (tr *SecretBackendKey) GetObservation() (map[string]any, error)
- func (tr *SecretBackendKey) GetParameters() (map[string]any, error)
- func (mg *SecretBackendKey) GetProviderConfigReference() *xpv1.Reference
- func (mg *SecretBackendKey) GetProviderReference() *xpv1.Reference
- func (mg *SecretBackendKey) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo
- func (mg *SecretBackendKey) GetTerraformResourceType() string
- func (tr *SecretBackendKey) GetTerraformSchemaVersion() int
- func (mg *SecretBackendKey) GetWriteConnectionSecretToReference() *xpv1.SecretReference
- func (tr *SecretBackendKey) LateInitialize(attrs []byte) (bool, error)
- func (mg *SecretBackendKey) SetConditions(c ...xpv1.Condition)
- func (mg *SecretBackendKey) SetDeletionPolicy(r xpv1.DeletionPolicy)
- func (mg *SecretBackendKey) SetManagementPolicies(r xpv1.ManagementPolicies)
- func (tr *SecretBackendKey) SetObservation(obs map[string]any) error
- func (tr *SecretBackendKey) SetParameters(params map[string]any) error
- func (mg *SecretBackendKey) SetProviderConfigReference(r *xpv1.Reference)
- func (mg *SecretBackendKey) SetProviderReference(r *xpv1.Reference)
- func (mg *SecretBackendKey) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)
- func (mg *SecretBackendKey) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)
- type SecretBackendKeyInitParameters
- type SecretBackendKeyList
- type SecretBackendKeyObservation
- type SecretBackendKeyParameters
- type SecretBackendKeySpec
- type SecretBackendKeyStatus
Constants ¶
const ( CRDGroup = "transit.vault.upbound.io" CRDVersion = "v1alpha1" )
Package type metadata.
Variables ¶
var ( // CRDGroupVersion is the API Group Version used to register the objects CRDGroupVersion = schema.GroupVersion{Group: CRDGroup, Version: CRDVersion} // SchemeBuilder is used to add go types to the GroupVersionKind scheme SchemeBuilder = &scheme.Builder{GroupVersion: CRDGroupVersion} // AddToScheme adds the types in this group-version to the given scheme. AddToScheme = SchemeBuilder.AddToScheme )
var ( SecretBackendKey_Kind = "SecretBackendKey" SecretBackendKey_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: SecretBackendKey_Kind}.String() SecretBackendKey_KindAPIVersion = SecretBackendKey_Kind + "." + CRDGroupVersion.String() SecretBackendKey_GroupVersionKind = CRDGroupVersion.WithKind(SecretBackendKey_Kind) )
Repository type metadata.
Functions ¶
This section is empty.
Types ¶
type SecretBackendKey ¶
type SecretBackendKey struct { metav1.TypeMeta `json:",inline"` metav1.ObjectMeta `json:"metadata,omitempty"` // +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.backend) || has(self.initProvider.backend)",message="backend is a required parameter" // +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.name) || has(self.initProvider.name)",message="name is a required parameter" Spec SecretBackendKeySpec `json:"spec"` Status SecretBackendKeyStatus `json:"status,omitempty"` }
SecretBackendKey is the Schema for the SecretBackendKeys API. Create an Encryption Keyring on a Transit Secret Backend for Vault. +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}
func (*SecretBackendKey) DeepCopy ¶
func (in *SecretBackendKey) DeepCopy() *SecretBackendKey
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendKey.
func (*SecretBackendKey) DeepCopyInto ¶
func (in *SecretBackendKey) DeepCopyInto(out *SecretBackendKey)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*SecretBackendKey) DeepCopyObject ¶
func (in *SecretBackendKey) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
func (*SecretBackendKey) GetCondition ¶
func (mg *SecretBackendKey) GetCondition(ct xpv1.ConditionType) xpv1.Condition
GetCondition of this SecretBackendKey.
func (*SecretBackendKey) GetConnectionDetailsMapping ¶
func (tr *SecretBackendKey) GetConnectionDetailsMapping() map[string]string
GetConnectionDetailsMapping for this SecretBackendKey
func (*SecretBackendKey) GetDeletionPolicy ¶
func (mg *SecretBackendKey) GetDeletionPolicy() xpv1.DeletionPolicy
GetDeletionPolicy of this SecretBackendKey.
func (*SecretBackendKey) GetID ¶
func (tr *SecretBackendKey) GetID() string
GetID returns ID of underlying Terraform resource of this SecretBackendKey
func (*SecretBackendKey) GetInitParameters ¶ added in v0.2.0
func (tr *SecretBackendKey) GetInitParameters() (map[string]any, error)
GetInitParameters of this SecretBackendKey
func (*SecretBackendKey) GetManagementPolicies ¶ added in v0.2.0
func (mg *SecretBackendKey) GetManagementPolicies() xpv1.ManagementPolicies
GetManagementPolicies of this SecretBackendKey.
func (*SecretBackendKey) GetObservation ¶
func (tr *SecretBackendKey) GetObservation() (map[string]any, error)
GetObservation of this SecretBackendKey
func (*SecretBackendKey) GetParameters ¶
func (tr *SecretBackendKey) GetParameters() (map[string]any, error)
GetParameters of this SecretBackendKey
func (*SecretBackendKey) GetProviderConfigReference ¶
func (mg *SecretBackendKey) GetProviderConfigReference() *xpv1.Reference
GetProviderConfigReference of this SecretBackendKey.
func (*SecretBackendKey) GetProviderReference ¶
func (mg *SecretBackendKey) GetProviderReference() *xpv1.Reference
GetProviderReference of this SecretBackendKey. Deprecated: Use GetProviderConfigReference.
func (*SecretBackendKey) GetPublishConnectionDetailsTo ¶
func (mg *SecretBackendKey) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo
GetPublishConnectionDetailsTo of this SecretBackendKey.
func (*SecretBackendKey) GetTerraformResourceType ¶
func (mg *SecretBackendKey) GetTerraformResourceType() string
GetTerraformResourceType returns Terraform resource type for this SecretBackendKey
func (*SecretBackendKey) GetTerraformSchemaVersion ¶
func (tr *SecretBackendKey) GetTerraformSchemaVersion() int
GetTerraformSchemaVersion returns the associated Terraform schema version
func (*SecretBackendKey) GetWriteConnectionSecretToReference ¶
func (mg *SecretBackendKey) GetWriteConnectionSecretToReference() *xpv1.SecretReference
GetWriteConnectionSecretToReference of this SecretBackendKey.
func (*SecretBackendKey) LateInitialize ¶
func (tr *SecretBackendKey) LateInitialize(attrs []byte) (bool, error)
LateInitialize this SecretBackendKey using its observed tfState. returns True if there are any spec changes for the resource.
func (*SecretBackendKey) SetConditions ¶
func (mg *SecretBackendKey) SetConditions(c ...xpv1.Condition)
SetConditions of this SecretBackendKey.
func (*SecretBackendKey) SetDeletionPolicy ¶
func (mg *SecretBackendKey) SetDeletionPolicy(r xpv1.DeletionPolicy)
SetDeletionPolicy of this SecretBackendKey.
func (*SecretBackendKey) SetManagementPolicies ¶ added in v0.2.0
func (mg *SecretBackendKey) SetManagementPolicies(r xpv1.ManagementPolicies)
SetManagementPolicies of this SecretBackendKey.
func (*SecretBackendKey) SetObservation ¶
func (tr *SecretBackendKey) SetObservation(obs map[string]any) error
SetObservation for this SecretBackendKey
func (*SecretBackendKey) SetParameters ¶
func (tr *SecretBackendKey) SetParameters(params map[string]any) error
SetParameters for this SecretBackendKey
func (*SecretBackendKey) SetProviderConfigReference ¶
func (mg *SecretBackendKey) SetProviderConfigReference(r *xpv1.Reference)
SetProviderConfigReference of this SecretBackendKey.
func (*SecretBackendKey) SetProviderReference ¶
func (mg *SecretBackendKey) SetProviderReference(r *xpv1.Reference)
SetProviderReference of this SecretBackendKey. Deprecated: Use SetProviderConfigReference.
func (*SecretBackendKey) SetPublishConnectionDetailsTo ¶
func (mg *SecretBackendKey) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)
SetPublishConnectionDetailsTo of this SecretBackendKey.
func (*SecretBackendKey) SetWriteConnectionSecretToReference ¶
func (mg *SecretBackendKey) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)
SetWriteConnectionSecretToReference of this SecretBackendKey.
type SecretBackendKeyInitParameters ¶ added in v0.2.0
type SecretBackendKeyInitParameters struct { // Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled. // If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled. AllowPlaintextBackup *bool `json:"allowPlaintextBackup,omitempty" tf:"allow_plaintext_backup,omitempty"` // Replaced by auto_rotate_period. // Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key. AutoRotateInterval *float64 `json:"autoRotateInterval,omitempty" tf:"auto_rotate_interval,omitempty"` // Amount of seconds the key should live before being automatically rotated. // A value of 0 disables automatic rotation for the key. // Amount of seconds the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key. AutoRotatePeriod *float64 `json:"autoRotatePeriod,omitempty" tf:"auto_rotate_period,omitempty"` // The path the transit secret backend is mounted at, with no leading or trailing /s. // The Transit secret backend the resource belongs to. Backend *string `json:"backend,omitempty" tf:"backend,omitempty"` // Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires derived to be set to true. // Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires derived to be set to true. ConvergentEncryption *bool `json:"convergentEncryption,omitempty" tf:"convergent_encryption,omitempty"` // Specifies if the keyring is allowed to be deleted. // Specifies if the key is allowed to be deleted. DeletionAllowed *bool `json:"deletionAllowed,omitempty" tf:"deletion_allowed,omitempty"` // Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation. // Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation. Derived *bool `json:"derived,omitempty" tf:"derived,omitempty"` // Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled. // Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported. Once set, this cannot be disabled. Exportable *bool `json:"exportable,omitempty" tf:"exportable,omitempty"` // The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes. // The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC; this value must be between 32 and 512. KeySize *float64 `json:"keySize,omitempty" tf:"key_size,omitempty"` // Minimum key version to use for decryption. // Minimum key version to use for decryption. MinDecryptionVersion *float64 `json:"minDecryptionVersion,omitempty" tf:"min_decryption_version,omitempty"` // Minimum key version to use for encryption // Minimum key version to use for encryption MinEncryptionVersion *float64 `json:"minEncryptionVersion,omitempty" tf:"min_encryption_version,omitempty"` // The name to identify this key within the backend. Must be unique within the backend. // Name of the encryption key to create. Name *string `json:"name,omitempty" tf:"name,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96 (default), chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072 and rsa-4096. // Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96, chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072, rsa-4096 Type *string `json:"type,omitempty" tf:"type,omitempty"` }
func (*SecretBackendKeyInitParameters) DeepCopy ¶ added in v0.2.0
func (in *SecretBackendKeyInitParameters) DeepCopy() *SecretBackendKeyInitParameters
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendKeyInitParameters.
func (*SecretBackendKeyInitParameters) DeepCopyInto ¶ added in v0.2.0
func (in *SecretBackendKeyInitParameters) DeepCopyInto(out *SecretBackendKeyInitParameters)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendKeyList ¶
type SecretBackendKeyList struct { metav1.TypeMeta `json:",inline"` metav1.ListMeta `json:"metadata,omitempty"` Items []SecretBackendKey `json:"items"` }
SecretBackendKeyList contains a list of SecretBackendKeys
func (*SecretBackendKeyList) DeepCopy ¶
func (in *SecretBackendKeyList) DeepCopy() *SecretBackendKeyList
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendKeyList.
func (*SecretBackendKeyList) DeepCopyInto ¶
func (in *SecretBackendKeyList) DeepCopyInto(out *SecretBackendKeyList)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*SecretBackendKeyList) DeepCopyObject ¶
func (in *SecretBackendKeyList) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
func (*SecretBackendKeyList) GetItems ¶
func (l *SecretBackendKeyList) GetItems() []resource.Managed
GetItems of this SecretBackendKeyList.
type SecretBackendKeyObservation ¶
type SecretBackendKeyObservation struct { // Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled. // If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled. AllowPlaintextBackup *bool `json:"allowPlaintextBackup,omitempty" tf:"allow_plaintext_backup,omitempty"` // Replaced by auto_rotate_period. // Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key. AutoRotateInterval *float64 `json:"autoRotateInterval,omitempty" tf:"auto_rotate_interval,omitempty"` // Amount of seconds the key should live before being automatically rotated. // A value of 0 disables automatic rotation for the key. // Amount of seconds the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key. AutoRotatePeriod *float64 `json:"autoRotatePeriod,omitempty" tf:"auto_rotate_period,omitempty"` // The path the transit secret backend is mounted at, with no leading or trailing /s. // The Transit secret backend the resource belongs to. Backend *string `json:"backend,omitempty" tf:"backend,omitempty"` // Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires derived to be set to true. // Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires derived to be set to true. ConvergentEncryption *bool `json:"convergentEncryption,omitempty" tf:"convergent_encryption,omitempty"` // Specifies if the keyring is allowed to be deleted. // Specifies if the key is allowed to be deleted. DeletionAllowed *bool `json:"deletionAllowed,omitempty" tf:"deletion_allowed,omitempty"` // Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation. // Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation. Derived *bool `json:"derived,omitempty" tf:"derived,omitempty"` // Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled. // Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported. Once set, this cannot be disabled. Exportable *bool `json:"exportable,omitempty" tf:"exportable,omitempty"` ID *string `json:"id,omitempty" tf:"id,omitempty"` // The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes. // The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC; this value must be between 32 and 512. KeySize *float64 `json:"keySize,omitempty" tf:"key_size,omitempty"` // List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the type of the encryption key. // List of key versions in the keyring. Keys []map[string]*string `json:"keys,omitempty" tf:"keys,omitempty"` // Latest key version available. This value is 1-indexed, so if latest_version is 1, then the key's information can be referenced from keys by selecting element 0 // Latest key version in use in the keyring LatestVersion *float64 `json:"latestVersion,omitempty" tf:"latest_version,omitempty"` // Minimum key version available for use. If keys have been archived by increasing min_decryption_version, this attribute will reflect that change. // Minimum key version available for use. MinAvailableVersion *float64 `json:"minAvailableVersion,omitempty" tf:"min_available_version,omitempty"` // Minimum key version to use for decryption. // Minimum key version to use for decryption. MinDecryptionVersion *float64 `json:"minDecryptionVersion,omitempty" tf:"min_decryption_version,omitempty"` // Minimum key version to use for encryption // Minimum key version to use for encryption MinEncryptionVersion *float64 `json:"minEncryptionVersion,omitempty" tf:"min_encryption_version,omitempty"` // The name to identify this key within the backend. Must be unique within the backend. // Name of the encryption key to create. Name *string `json:"name,omitempty" tf:"name,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // Whether or not the key supports decryption, based on key type. // Whether or not the key supports decryption, based on key type. SupportsDecryption *bool `json:"supportsDecryption,omitempty" tf:"supports_decryption,omitempty"` // Whether or not the key supports derivation, based on key type. // Whether or not the key supports derivation, based on key type. SupportsDerivation *bool `json:"supportsDerivation,omitempty" tf:"supports_derivation,omitempty"` // Whether or not the key supports encryption, based on key type. // Whether or not the key supports encryption, based on key type. SupportsEncryption *bool `json:"supportsEncryption,omitempty" tf:"supports_encryption,omitempty"` // Whether or not the key supports signing, based on key type. // Whether or not the key supports signing, based on key type. SupportsSigning *bool `json:"supportsSigning,omitempty" tf:"supports_signing,omitempty"` // Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96 (default), chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072 and rsa-4096. // Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96, chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072, rsa-4096 Type *string `json:"type,omitempty" tf:"type,omitempty"` }
func (*SecretBackendKeyObservation) DeepCopy ¶
func (in *SecretBackendKeyObservation) DeepCopy() *SecretBackendKeyObservation
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendKeyObservation.
func (*SecretBackendKeyObservation) DeepCopyInto ¶
func (in *SecretBackendKeyObservation) DeepCopyInto(out *SecretBackendKeyObservation)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendKeyParameters ¶
type SecretBackendKeyParameters struct { // Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled. // If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled. // +kubebuilder:validation:Optional AllowPlaintextBackup *bool `json:"allowPlaintextBackup,omitempty" tf:"allow_plaintext_backup,omitempty"` // Replaced by auto_rotate_period. // Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key. // +kubebuilder:validation:Optional AutoRotateInterval *float64 `json:"autoRotateInterval,omitempty" tf:"auto_rotate_interval,omitempty"` // Amount of seconds the key should live before being automatically rotated. // A value of 0 disables automatic rotation for the key. // Amount of seconds the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key. // +kubebuilder:validation:Optional AutoRotatePeriod *float64 `json:"autoRotatePeriod,omitempty" tf:"auto_rotate_period,omitempty"` // The path the transit secret backend is mounted at, with no leading or trailing /s. // The Transit secret backend the resource belongs to. // +kubebuilder:validation:Optional Backend *string `json:"backend,omitempty" tf:"backend,omitempty"` // Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires derived to be set to true. // Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires derived to be set to true. // +kubebuilder:validation:Optional ConvergentEncryption *bool `json:"convergentEncryption,omitempty" tf:"convergent_encryption,omitempty"` // Specifies if the keyring is allowed to be deleted. // Specifies if the key is allowed to be deleted. // +kubebuilder:validation:Optional DeletionAllowed *bool `json:"deletionAllowed,omitempty" tf:"deletion_allowed,omitempty"` // Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation. // Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation. // +kubebuilder:validation:Optional Derived *bool `json:"derived,omitempty" tf:"derived,omitempty"` // Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled. // Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported. Once set, this cannot be disabled. // +kubebuilder:validation:Optional Exportable *bool `json:"exportable,omitempty" tf:"exportable,omitempty"` // The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes. // The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC; this value must be between 32 and 512. // +kubebuilder:validation:Optional KeySize *float64 `json:"keySize,omitempty" tf:"key_size,omitempty"` // Minimum key version to use for decryption. // Minimum key version to use for decryption. // +kubebuilder:validation:Optional MinDecryptionVersion *float64 `json:"minDecryptionVersion,omitempty" tf:"min_decryption_version,omitempty"` // Minimum key version to use for encryption // Minimum key version to use for encryption // +kubebuilder:validation:Optional MinEncryptionVersion *float64 `json:"minEncryptionVersion,omitempty" tf:"min_encryption_version,omitempty"` // The name to identify this key within the backend. Must be unique within the backend. // Name of the encryption key to create. // +kubebuilder:validation:Optional Name *string `json:"name,omitempty" tf:"name,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) // +kubebuilder:validation:Optional Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96 (default), chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072 and rsa-4096. // Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96, chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072, rsa-4096 // +kubebuilder:validation:Optional Type *string `json:"type,omitempty" tf:"type,omitempty"` }
func (*SecretBackendKeyParameters) DeepCopy ¶
func (in *SecretBackendKeyParameters) DeepCopy() *SecretBackendKeyParameters
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendKeyParameters.
func (*SecretBackendKeyParameters) DeepCopyInto ¶
func (in *SecretBackendKeyParameters) DeepCopyInto(out *SecretBackendKeyParameters)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendKeySpec ¶
type SecretBackendKeySpec struct { v1.ResourceSpec `json:",inline"` ForProvider SecretBackendKeyParameters `json:"forProvider"` // THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored // unless the relevant Crossplane feature flag is enabled, and may be // changed or removed without notice. // InitProvider holds the same fields as ForProvider, with the exception // of Identifier and other resource reference fields. The fields that are // in InitProvider are merged into ForProvider when the resource is created. // The same fields are also added to the terraform ignore_changes hook, to // avoid updating them after creation. This is useful for fields that are // required on creation, but we do not desire to update them after creation, // for example because of an external controller is managing them, like an // autoscaler. InitProvider SecretBackendKeyInitParameters `json:"initProvider,omitempty"` }
SecretBackendKeySpec defines the desired state of SecretBackendKey
func (*SecretBackendKeySpec) DeepCopy ¶
func (in *SecretBackendKeySpec) DeepCopy() *SecretBackendKeySpec
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendKeySpec.
func (*SecretBackendKeySpec) DeepCopyInto ¶
func (in *SecretBackendKeySpec) DeepCopyInto(out *SecretBackendKeySpec)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendKeyStatus ¶
type SecretBackendKeyStatus struct { v1.ResourceStatus `json:",inline"` AtProvider SecretBackendKeyObservation `json:"atProvider,omitempty"` }
SecretBackendKeyStatus defines the observed state of SecretBackendKey.
func (*SecretBackendKeyStatus) DeepCopy ¶
func (in *SecretBackendKeyStatus) DeepCopy() *SecretBackendKeyStatus
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendKeyStatus.
func (*SecretBackendKeyStatus) DeepCopyInto ¶
func (in *SecretBackendKeyStatus) DeepCopyInto(out *SecretBackendKeyStatus)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.